Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
setup.exe

Overview

General Information

Sample name:setup.exe
Analysis ID:1553146
MD5:1274cbcd6329098f79a3be6d76ab8b97
SHA1:53c870d62dcd6154052445dc03888cdc6cffd370
SHA256:bbe5544c408a6eb95dd9980c61a63c4ebc8ccbeecade4de4fae8332361e27278
Tags:exetronbruteforce-onlineuser-aachum
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Stop multiple services
System process connects to network (likely due to code injection or exploit)
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Stops critical windows services
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates or modifies windows services
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Powershell Defender Exclusion
Sigma detected: Uncommon Svchost Parent Process
Suricata IDS alerts with low severity for network traffic
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • setup.exe (PID: 4924 cmdline: "C:\Users\user\Desktop\setup.exe" MD5: 1274CBCD6329098F79A3BE6D76AB8B97)
    • dialer.exe (PID: 1172 cmdline: C:\Windows\System32\dialer.exe MD5: B2626BDCF079C6516FC016AC5646DF93)
      • winlogon.exe (PID: 560 cmdline: winlogon.exe MD5: F8B41A1B3E569E7E6F990567F21DCE97)
      • lsass.exe (PID: 652 cmdline: C:\Windows\system32\lsass.exe MD5: A1CC00332BBF370654EE3DC8CDC8C95A)
      • svchost.exe (PID: 928 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • dwm.exe (PID: 996 cmdline: "dwm.exe" MD5: 5C27608411832C5B39BA04E33D53536C)
      • svchost.exe (PID: 436 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 376 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 60 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 980 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1064 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1140 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1192 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1248 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1328 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1344 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s nsi MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1356 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1448 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1496 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1516 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1560 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1640 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1648 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1784 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1872 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1900 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1980 cmdline: C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 1988 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 2000 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • powershell.exe (PID: 2432 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 1656 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WmiPrvSE.exe (PID: 2216 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
  • cmd.exe (PID: 2404 cmdline: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 3816 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 3476 cmdline: sc stop UsoSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 800 cmdline: sc stop WaaSMedicSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 2024 cmdline: sc stop wuauserv MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 592 cmdline: sc stop bits MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 4328 cmdline: sc stop dosvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
  • updater.exe (PID: 5484 cmdline: "C:\Program Files\Google\Chrome\updater.exe" MD5: 1274CBCD6329098F79A3BE6D76AB8B97)
  • cleanup
No configs have been found
No yara matches

Operating System Destruction

barindex
Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, CommandLine: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, ProcessId: 2404, ProcessName: cmd.exe

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, ProcessId: 2432, ProcessName: powershell.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, ProcessId: 2432, ProcessName: powershell.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: C:\Windows\System32\dialer.exe, ParentImage: C:\Windows\System32\dialer.exe, ParentProcessId: 1172, ParentProcessName: dialer.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, ProcessId: 928, ProcessName: svchost.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, ProcessId: 2432, ProcessName: powershell.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-11-10T12:38:17.092545+010020229301A Network Trojan was detected4.245.163.56443192.168.2.649751TCP
2024-11-10T12:38:52.557754+010020229301A Network Trojan was detected52.149.20.212443192.168.2.660889TCP
2024-11-10T12:38:53.820122+010020229301A Network Trojan was detected52.149.20.212443192.168.2.660896TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmpAvira: detection malicious, Label: RKIT/Agent.dvyic
Source: C:\Program Files\Google\Chrome\updater.exeReversingLabs: Detection: 76%
Source: C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmpReversingLabs: Detection: 87%
Source: setup.exeReversingLabs: Detection: 76%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: C:\Program Files\Google\Chrome\updater.exeJoe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmpJoe Sandbox ML: detected
Source: setup.exeJoe Sandbox ML: detected
Source: setup.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 0000001D.00000000.2178288513.0000022595840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382734593.0000022595840000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 0000001D.00000000.2178248889.000002259582B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382137488.000002259582B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: d.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 0000001D.00000000.2178288513.0000022595840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382734593.0000022595840000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 0000001D.00000000.2178288513.0000022595840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382734593.0000022595840000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 0000001D.00000000.2178288513.0000022595840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382734593.0000022595840000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 0000001D.00000002.3383305724.000002259585D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000000.2178341597.000002259585D000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: +@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 0000001D.00000000.2178248889.000002259582B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382137488.000002259582B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 0000001D.00000000.2178248889.000002259582B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382137488.000002259582B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 0000001D.00000000.2178248889.000002259582B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382137488.000002259582B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 0000001D.00000002.3383305724.000002259585D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000000.2178341597.000002259585D000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb* source: svchost.exe, 0000001D.00000000.2178288513.0000022595840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382734593.0000022595840000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 0000001D.00000000.2178288513.0000022595840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382734593.0000022595840000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 0000001D.00000002.3383305724.000002259585D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000000.2178341597.000002259585D000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdbcache source: svchost.exe, 0000001D.00000002.3383305724.000002259585D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000000.2178341597.000002259585D000.00000004.00000001.00020000.00000000.sdmp
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001B1C6ACDCE0 FindFirstFileExW,4_2_000001B1C6ACDCE0
Source: C:\Windows\System32\winlogon.exeCode function: 17_2_000002D0165EDCE0 FindFirstFileExW,17_2_000002D0165EDCE0
Source: C:\Windows\System32\lsass.exeCode function: 21_2_000002D6F151DCE0 FindFirstFileExW,21_2_000002D6F151DCE0
Source: C:\Windows\System32\svchost.exeCode function: 22_2_0000014E41FDDCE0 FindFirstFileExW,22_2_0000014E41FDDCE0
Source: C:\Windows\System32\dwm.exeCode function: 23_2_000001D15B04DCE0 FindFirstFileExW,23_2_000001D15B04DCE0
Source: C:\Windows\System32\svchost.exeCode function: 24_2_0000023AF32EDCE0 FindFirstFileExW,24_2_0000023AF32EDCE0
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000023C9FD9DCE0 FindFirstFileExW,25_2_0000023C9FD9DCE0
Source: C:\Windows\System32\svchost.exeCode function: 26_2_000001A1CA71DCE0 FindFirstFileExW,26_2_000001A1CA71DCE0
Source: C:\Windows\System32\svchost.exeCode function: 27_2_00000246EDE6DCE0 FindFirstFileExW,27_2_00000246EDE6DCE0
Source: C:\Windows\System32\svchost.exeCode function: 28_2_00000200A19BDCE0 FindFirstFileExW,28_2_00000200A19BDCE0
Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002259668DCE0 FindFirstFileExW,29_2_000002259668DCE0
Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000022E670FDCE0 FindFirstFileExW,30_2_0000022E670FDCE0
Source: C:\Windows\System32\svchost.exeCode function: 31_2_000001FE4A4EDCE0 FindFirstFileExW,31_2_000001FE4A4EDCE0
Source: C:\Windows\System32\svchost.exeCode function: 32_2_0000024C19A7DCE0 FindFirstFileExW,32_2_0000024C19A7DCE0
Source: C:\Windows\System32\svchost.exeCode function: 33_2_00000275D266DCE0 FindFirstFileExW,33_2_00000275D266DCE0
Source: C:\Windows\System32\svchost.exeCode function: 34_2_0000023BBDCCDCE0 FindFirstFileExW,34_2_0000023BBDCCDCE0
Source: C:\Windows\System32\svchost.exeCode function: 35_2_00000227D954DCE0 FindFirstFileExW,35_2_00000227D954DCE0
Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002DED2CADCE0 FindFirstFileExW,36_2_000002DED2CADCE0
Source: C:\Windows\System32\svchost.exeCode function: 37_2_0000014ACE6EDCE0 FindFirstFileExW,37_2_0000014ACE6EDCE0
Source: C:\Windows\System32\svchost.exeCode function: 38_2_00000220AF66DCE0 FindFirstFileExW,38_2_00000220AF66DCE0
Source: C:\Windows\System32\svchost.exeCode function: 39_2_00000241B697DCE0 FindFirstFileExW,39_2_00000241B697DCE0

Networking

barindex
Source: C:\Windows\System32\svchost.exeDomain query: 241.42.69.40.in-addr.arpa
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.245.163.56:443 -> 192.168.2.6:49751
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.6:60889
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.6:60896
Source: unknownDNS traffic detected: query: 241.42.69.40.in-addr.arpa replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: 241.42.69.40.in-addr.arpa
Source: Microsoft-Windows-LiveId%4Operational.evtx.30.drString found in binary or memory: http://Passport.NET/tb
Source: lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0DA5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3402475967.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146987040.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
Source: lsass.exe, 00000015.00000002.3400721788.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146907635.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3389734995.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146426037.000002D6F0688000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
Source: lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146568788.000002D6F0C46000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3393594679.000002D6F0C44000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0D51000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
Source: lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3398167999.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146757082.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3402475967.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2397368366.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146987040.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
Source: lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3389734995.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B
Source: lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0DA5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3398167999.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146757082.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3402475967.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2397368366.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146987040.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0D51000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
Source: lsass.exe, 00000015.00000002.3400721788.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146907635.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3389734995.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146426037.000002D6F0688000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
Source: lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0DA5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3402475967.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146987040.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
Source: lsass.exe, 00000015.00000002.3400721788.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146907635.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3389734995.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146426037.000002D6F0688000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
Source: lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3398167999.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146757082.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3402475967.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2397368366.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146987040.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
Source: lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146568788.000002D6F0C46000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3393594679.000002D6F0C44000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0D51000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
Source: lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3389734995.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0
Source: lsass.exe, 00000015.00000002.3400721788.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146907635.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3389734995.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146426037.000002D6F0688000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
Source: lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0DA5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3398167999.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146757082.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3402475967.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2397368366.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146987040.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0D51000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
Source: lsass.exe, 00000015.00000000.2146757082.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
Source: lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0DA5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3402475967.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146987040.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
Source: lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146568788.000002D6F0C46000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3393594679.000002D6F0C44000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0D51000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
Source: lsass.exe, 00000015.00000002.3400721788.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146907635.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3389734995.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146426037.000002D6F0688000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
Source: lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0DA5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3398167999.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146757082.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3402475967.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2397368366.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146987040.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0D51000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0~
Source: lsass.exe, 00000015.00000002.3389734995.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146426037.000002D6F0688000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
Source: lsass.exe, 00000015.00000000.2146568788.000002D6F0C00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3393594679.000002D6F0C00000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702
Source: lsass.exe, 00000015.00000000.2146371271.000002D6F064E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3388396962.000002D6F064E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512
Source: lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
Source: lsass.exe, 00000015.00000002.3400721788.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0DA5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3398167999.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146757082.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146568788.000002D6F0C46000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146907635.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3389734995.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146426037.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3402475967.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2397368366.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146987040.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3393594679.000002D6F0C44000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0D51000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
Source: lsass.exe, 00000015.00000000.2146757082.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0:
Source: lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0DA5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3398167999.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146757082.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3402475967.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2397368366.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146987040.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0D51000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0H
Source: lsass.exe, 00000015.00000002.3400721788.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146907635.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3389734995.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146426037.000002D6F0688000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0I
Source: lsass.exe, 00000015.00000000.2146757082.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146426037.000002D6F0688000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.msocsp.com0
Source: lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
Source: lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
Source: lsass.exe, 00000015.00000000.2146371271.000002D6F064E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3388396962.000002D6F064E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy
Source: lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
Source: lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/erties
Source: lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/
Source: lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/P
Source: lsass.exe, 00000015.00000002.3400721788.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3399487185.000002D6F0D9A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0DA5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3398167999.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146757082.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146907635.000002D6F0DBD000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3389734995.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146426037.000002D6F0688000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3402475967.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2397368366.000002D6F0CEB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146987040.000002D6F0E00000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000003.2387433085.000002D6F0D72000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146802943.000002D6F0D51000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
Source: svchost.exe, 00000029.00000000.2208243745.0000014D25483000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000029.00000002.3421210700.0000014D25483000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.msftconnecttest.com/
Source: C:\Windows\System32\dialer.exeCode function: 12_2_00007FF6AFBE10C0 OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,12_2_00007FF6AFBE10C0
Source: C:\Windows\System32\winlogon.exeCode function: 17_2_000002D0165E28C8 NtEnumerateValueKey,NtEnumerateValueKey,17_2_000002D0165E28C8
Source: C:\Windows\System32\lsass.exeCode function: 21_2_000002D6F151253C NtQueryDirectoryFileEx,GetFileType,StrCpyW,21_2_000002D6F151253C
Source: C:\Windows\System32\lsass.exeCode function: 21_2_000002D6F151202C NtQuerySystemInformation,StrCmpNIW,21_2_000002D6F151202C
Source: C:\Windows\System32\dwm.exeCode function: 23_2_000001D15B0428C8 NtEnumerateValueKey,NtEnumerateValueKey,23_2_000001D15B0428C8
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001B1C6A91F2C4_2_000001B1C6A91F2C
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001B1C6AA38A84_2_000001B1C6AA38A8
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001B1C6A9D0E04_2_000001B1C6A9D0E0
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001B1C6AC2B2C4_2_000001B1C6AC2B2C
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001B1C6AD44A84_2_000001B1C6AD44A8
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001B1C6ACDCE04_2_000001B1C6ACDCE0
Source: C:\Windows\System32\dialer.exeCode function: 12_2_00007FF6AFBE14D812_2_00007FF6AFBE14D8
Source: C:\Windows\System32\dialer.exeCode function: 12_2_00007FF6AFBE226C12_2_00007FF6AFBE226C
Source: C:\Windows\System32\dialer.exeCode function: 12_2_00007FF6AFBE256012_2_00007FF6AFBE2560
Source: C:\Windows\System32\winlogon.exeCode function: 17_2_000002D016581F2C17_2_000002D016581F2C
Source: C:\Windows\System32\winlogon.exeCode function: 17_2_000002D0165938A817_2_000002D0165938A8
Source: C:\Windows\System32\winlogon.exeCode function: 17_2_000002D01658D0E017_2_000002D01658D0E0
Source: C:\Windows\System32\winlogon.exeCode function: 17_2_000002D0165E2B2C17_2_000002D0165E2B2C
Source: C:\Windows\System32\winlogon.exeCode function: 17_2_000002D0165F44A817_2_000002D0165F44A8
Source: C:\Windows\System32\winlogon.exeCode function: 17_2_000002D0165EDCE017_2_000002D0165EDCE0
Source: C:\Windows\System32\lsass.exeCode function: 21_2_000002D6F14ED0E021_2_000002D6F14ED0E0
Source: C:\Windows\System32\lsass.exeCode function: 21_2_000002D6F14F38A821_2_000002D6F14F38A8
Source: C:\Windows\System32\lsass.exeCode function: 21_2_000002D6F14E1F2C21_2_000002D6F14E1F2C
Source: C:\Windows\System32\lsass.exeCode function: 21_2_000002D6F151DCE021_2_000002D6F151DCE0
Source: C:\Windows\System32\lsass.exeCode function: 21_2_000002D6F15244A821_2_000002D6F15244A8
Source: C:\Windows\System32\lsass.exeCode function: 21_2_000002D6F1512B2C21_2_000002D6F1512B2C
Source: C:\Windows\System32\svchost.exeCode function: 22_2_0000014E41FAD0E022_2_0000014E41FAD0E0
Source: C:\Windows\System32\svchost.exeCode function: 22_2_0000014E41FB38A822_2_0000014E41FB38A8
Source: C:\Windows\System32\svchost.exeCode function: 22_2_0000014E41FA1F2C22_2_0000014E41FA1F2C
Source: C:\Windows\System32\svchost.exeCode function: 22_2_0000014E41FDDCE022_2_0000014E41FDDCE0
Source: C:\Windows\System32\svchost.exeCode function: 22_2_0000014E41FE44A822_2_0000014E41FE44A8
Source: C:\Windows\System32\svchost.exeCode function: 22_2_0000014E41FD2B2C22_2_0000014E41FD2B2C
Source: C:\Windows\System32\dwm.exeCode function: 23_2_000001D15B011F2C23_2_000001D15B011F2C
Source: C:\Windows\System32\dwm.exeCode function: 23_2_000001D15B01D0E023_2_000001D15B01D0E0
Source: C:\Windows\System32\dwm.exeCode function: 23_2_000001D15B0238A823_2_000001D15B0238A8
Source: C:\Windows\System32\dwm.exeCode function: 23_2_000001D15B042B2C23_2_000001D15B042B2C
Source: C:\Windows\System32\dwm.exeCode function: 23_2_000001D15B04DCE023_2_000001D15B04DCE0
Source: C:\Windows\System32\dwm.exeCode function: 23_2_000001D15B0544A823_2_000001D15B0544A8
Source: C:\Windows\System32\svchost.exeCode function: 24_2_0000023AF32C38A824_2_0000023AF32C38A8
Source: C:\Windows\System32\svchost.exeCode function: 24_2_0000023AF32BD0E024_2_0000023AF32BD0E0
Source: C:\Windows\System32\svchost.exeCode function: 24_2_0000023AF32B1F2C24_2_0000023AF32B1F2C
Source: C:\Windows\System32\svchost.exeCode function: 24_2_0000023AF32F44A824_2_0000023AF32F44A8
Source: C:\Windows\System32\svchost.exeCode function: 24_2_0000023AF32EDCE024_2_0000023AF32EDCE0
Source: C:\Windows\System32\svchost.exeCode function: 24_2_0000023AF32E2B2C24_2_0000023AF32E2B2C
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000023C9FD6D0E025_2_0000023C9FD6D0E0
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000023C9FD738A825_2_0000023C9FD738A8
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000023C9FD61F2C25_2_0000023C9FD61F2C
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000023C9FD9DCE025_2_0000023C9FD9DCE0
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000023C9FDA44A825_2_0000023C9FDA44A8
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000023C9FD92B2C25_2_0000023C9FD92B2C
Source: C:\Windows\System32\svchost.exeCode function: 26_2_000001A1CA6ED0E026_2_000001A1CA6ED0E0
Source: C:\Windows\System32\svchost.exeCode function: 26_2_000001A1CA6F38A826_2_000001A1CA6F38A8
Source: C:\Windows\System32\svchost.exeCode function: 26_2_000001A1CA6E1F2C26_2_000001A1CA6E1F2C
Source: C:\Windows\System32\svchost.exeCode function: 26_2_000001A1CA71DCE026_2_000001A1CA71DCE0
Source: C:\Windows\System32\svchost.exeCode function: 26_2_000001A1CA7244A826_2_000001A1CA7244A8
Source: C:\Windows\System32\svchost.exeCode function: 26_2_000001A1CA712B2C26_2_000001A1CA712B2C
Source: C:\Windows\System32\svchost.exeCode function: 27_2_00000246ED7B1F2C27_2_00000246ED7B1F2C
Source: C:\Windows\System32\svchost.exeCode function: 27_2_00000246ED7BD0E027_2_00000246ED7BD0E0
Source: C:\Windows\System32\svchost.exeCode function: 27_2_00000246ED7C38A827_2_00000246ED7C38A8
Source: C:\Windows\System32\svchost.exeCode function: 27_2_00000246EDE62B2C27_2_00000246EDE62B2C
Source: C:\Windows\System32\svchost.exeCode function: 27_2_00000246EDE6DCE027_2_00000246EDE6DCE0
Source: C:\Windows\System32\svchost.exeCode function: 27_2_00000246EDE744A827_2_00000246EDE744A8
Source: C:\Windows\System32\svchost.exeCode function: 28_2_00000200A19B2B2C28_2_00000200A19B2B2C
Source: C:\Windows\System32\svchost.exeCode function: 28_2_00000200A19C44A828_2_00000200A19C44A8
Source: C:\Windows\System32\svchost.exeCode function: 28_2_00000200A19BDCE028_2_00000200A19BDCE0
Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002259668DCE029_2_000002259668DCE0
Source: C:\Windows\System32\svchost.exeCode function: 29_2_00000225966944A829_2_00000225966944A8
Source: C:\Windows\System32\svchost.exeCode function: 29_2_0000022596682B2C29_2_0000022596682B2C
Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000022E670C1F2C30_2_0000022E670C1F2C
Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000022E670D38A830_2_0000022E670D38A8
Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000022E670CD0E030_2_0000022E670CD0E0
Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000022E670F2B2C30_2_0000022E670F2B2C
Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000022E671044A830_2_0000022E671044A8
Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000022E670FDCE030_2_0000022E670FDCE0
Source: C:\Windows\System32\svchost.exeCode function: 31_2_000001FE4A4C38A831_2_000001FE4A4C38A8
Source: C:\Windows\System32\svchost.exeCode function: 31_2_000001FE4A4BD0E031_2_000001FE4A4BD0E0
Source: C:\Windows\System32\svchost.exeCode function: 31_2_000001FE4A4B1F2C31_2_000001FE4A4B1F2C
Source: C:\Windows\System32\svchost.exeCode function: 31_2_000001FE4A4F44A831_2_000001FE4A4F44A8
Source: C:\Windows\System32\svchost.exeCode function: 31_2_000001FE4A4EDCE031_2_000001FE4A4EDCE0
Source: C:\Windows\System32\svchost.exeCode function: 31_2_000001FE4A4E2B2C31_2_000001FE4A4E2B2C
Source: C:\Windows\System32\svchost.exeCode function: 32_2_0000024C19A4D0E032_2_0000024C19A4D0E0
Source: C:\Windows\System32\svchost.exeCode function: 32_2_0000024C19A538A832_2_0000024C19A538A8
Source: C:\Windows\System32\svchost.exeCode function: 32_2_0000024C19A41F2C32_2_0000024C19A41F2C
Source: C:\Windows\System32\svchost.exeCode function: 32_2_0000024C19A7DCE032_2_0000024C19A7DCE0
Source: C:\Windows\System32\svchost.exeCode function: 32_2_0000024C19A844A832_2_0000024C19A844A8
Source: C:\Windows\System32\svchost.exeCode function: 32_2_0000024C19A72B2C32_2_0000024C19A72B2C
Source: C:\Windows\System32\svchost.exeCode function: 33_2_00000275D1FCD0E033_2_00000275D1FCD0E0
Source: C:\Windows\System32\svchost.exeCode function: 33_2_00000275D1FD38A833_2_00000275D1FD38A8
Source: C:\Windows\System32\svchost.exeCode function: 33_2_00000275D1FC1F2C33_2_00000275D1FC1F2C
Source: C:\Windows\System32\svchost.exeCode function: 33_2_00000275D2662B2C33_2_00000275D2662B2C
Source: C:\Windows\System32\svchost.exeCode function: 33_2_00000275D26744A833_2_00000275D26744A8
Source: C:\Windows\System32\svchost.exeCode function: 33_2_00000275D266DCE033_2_00000275D266DCE0
Source: C:\Windows\System32\svchost.exeCode function: 34_2_0000023BBDCA38A834_2_0000023BBDCA38A8
Source: C:\Windows\System32\svchost.exeCode function: 34_2_0000023BBDC91F2C34_2_0000023BBDC91F2C
Source: C:\Windows\System32\svchost.exeCode function: 34_2_0000023BBDC9D0E034_2_0000023BBDC9D0E0
Source: C:\Windows\System32\svchost.exeCode function: 34_2_0000023BBDCD44A834_2_0000023BBDCD44A8
Source: C:\Windows\System32\svchost.exeCode function: 34_2_0000023BBDCC2B2C34_2_0000023BBDCC2B2C
Source: C:\Windows\System32\svchost.exeCode function: 34_2_0000023BBDCCDCE034_2_0000023BBDCCDCE0
Source: C:\Windows\System32\svchost.exeCode function: 35_2_00000227D9542B2C35_2_00000227D9542B2C
Source: C:\Windows\System32\svchost.exeCode function: 35_2_00000227D95544A835_2_00000227D95544A8
Source: C:\Windows\System32\svchost.exeCode function: 35_2_00000227D954DCE035_2_00000227D954DCE0
Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002DED2C71F2C36_2_000002DED2C71F2C
Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002DED2C7D0E036_2_000002DED2C7D0E0
Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002DED2C838A836_2_000002DED2C838A8
Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002DED2CA2B2C36_2_000002DED2CA2B2C
Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002DED2CADCE036_2_000002DED2CADCE0
Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002DED2CB44A836_2_000002DED2CB44A8
Source: C:\Windows\System32\svchost.exeCode function: 37_2_0000014ACE6B1F2C37_2_0000014ACE6B1F2C
Source: C:\Windows\System32\svchost.exeCode function: 37_2_0000014ACE6BD0E037_2_0000014ACE6BD0E0
Source: C:\Windows\System32\svchost.exeCode function: 37_2_0000014ACE6C38A837_2_0000014ACE6C38A8
Source: C:\Windows\System32\svchost.exeCode function: 37_2_0000014ACE6E2B2C37_2_0000014ACE6E2B2C
Source: C:\Windows\System32\svchost.exeCode function: 37_2_0000014ACE6EDCE037_2_0000014ACE6EDCE0
Source: C:\Windows\System32\svchost.exeCode function: 37_2_0000014ACE6F44A837_2_0000014ACE6F44A8
Source: C:\Windows\System32\svchost.exeCode function: 38_2_00000220AEFDD0E038_2_00000220AEFDD0E0
Source: C:\Windows\System32\svchost.exeCode function: 38_2_00000220AEFE38A838_2_00000220AEFE38A8
Source: C:\Windows\System32\svchost.exeCode function: 38_2_00000220AEFD1F2C38_2_00000220AEFD1F2C
Source: C:\Windows\System32\svchost.exeCode function: 38_2_00000220AF66DCE038_2_00000220AF66DCE0
Source: C:\Windows\System32\svchost.exeCode function: 38_2_00000220AF6744A838_2_00000220AF6744A8
Source: C:\Windows\System32\svchost.exeCode function: 38_2_00000220AF662B2C38_2_00000220AF662B2C
Source: C:\Windows\System32\svchost.exeCode function: 39_2_00000241B69538A839_2_00000241B69538A8
Source: C:\Windows\System32\svchost.exeCode function: 39_2_00000241B694D0E039_2_00000241B694D0E0
Source: C:\Windows\System32\svchost.exeCode function: 39_2_00000241B6941F2C39_2_00000241B6941F2C
Source: C:\Windows\System32\svchost.exeCode function: 39_2_00000241B69844A839_2_00000241B69844A8
Source: C:\Windows\System32\svchost.exeCode function: 39_2_00000241B697DCE039_2_00000241B697DCE0
Source: C:\Windows\System32\svchost.exeCode function: 39_2_00000241B6972B2C39_2_00000241B6972B2C
Source: Joe Sandbox ViewDropped File: C:\Program Files\Google\Chrome\updater.exe BBE5544C408A6EB95DD9980C61A63C4EBC8CCBEECADE4DE4FAE8332361E27278
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmp F7E1E53A6FB24A2BD9206305C59448A8F99B6F5847A6ACB18EB0FD9F7383FFB4
Source: wxyubnjmnlae.tmp.0.drStatic PE information: Resource name: DLL type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Source: updater.exe.0.drStatic PE information: Number of sections : 11 > 10
Source: setup.exeStatic PE information: Number of sections : 11 > 10
Source: Microsoft-Windows-Security-Mitigations%4KernelMode.evtx.30.drBinary string: 4\Device\HarddiskVolume3\Windows\System32\dllhost.exeQC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}(
Source: System.evtx.30.drBinary string: \Device\HarddiskVolume3\Windows\SysWOW64\tzutil.exe`
Source: Microsoft-Windows-SMBServer%4Operational.evtx.30.drBinary string: \Device\NetbiosSmb
Source: System.evtx.30.drBinary string: \\?\Volume{5d0fa9fb-e2e8-4263-a849-b22baad6d1d8}\Device\HarddiskVolume4lt
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.30.drBinary string: 9\Device\HarddiskVolume3\Windows\System32\msvcp110_win.dll?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
Source: System.evtx.30.drBinary string: C:\Device\HarddiskVolume3`&
Source: System.evtx.30.drBinary string: C:\Device\HarddiskVolume3
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.30.drBinary string: 1\Device\HarddiskVolume3\Windows\System32\curl.exe?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exeP**
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.30.drBinary string: 1\Device\HarddiskVolume3\Windows\SysWOW64\curl.exe?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
Source: Security.evtx.30.drBinary string: \Device\HarddiskVolume3\Program Files (x86)\Joebox\driver\joeboxdriver.sys
Source: Microsoft-Windows-Security-Mitigations%4KernelMode.evtx.30.drBinary string: 4\Device\HarddiskVolume3\Windows\System32\spoolsv.exe
Source: Security.evtx.30.drBinary string: \Device\HarddiskVolume3\Windows\System32\drivers\filetrace.sysnvi
Source: System.evtx.30.drBinary string: \Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
Source: Microsoft-Windows-SMBServer%4Operational.evtx.30.drBinary string: :\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
Source: Microsoft-Windows-SMBServer%4Operational.evtx.30.drBinary string: WIN-77KHDDR6TT1 WORKGROUP:\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
Source: Microsoft-Windows-SMBServer%4Operational.evtx.30.drBinary string: user-PC WORKGROUP:\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
Source: System.evtx.30.drBinary string: \\?\Volume{5d0fa9fb-e2e8-4263-a849-b22baad6d1d8}\Device\HarddiskVolume4A
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.30.drBinary string: 1\Device\HarddiskVolume3\Windows\System32\curl.exe?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
Source: Microsoft-Windows-UAC-FileVirtualization%4Operational.evtx.30.drBinary string: 9\Device\HarddiskVolume3\Windows\SysWOW64\msvcp110_win.dll?\Device\HarddiskVolume3\Program Files (x86)\AutoIt3\AutoIt3.exe
Source: Microsoft-Windows-SMBServer%4Operational.evtx.30.drBinary string: DESKTOP-AGET0TR WORKGROUP:\Device\NetBT_Tcpip_{E3B92EAA-F5C7-47F8-A487-F466F42035A1}
Source: setup.exe, updater.exe.0.drBinary or memory string: .SlnIX
Source: classification engineClassification label: mal100.evad.winEXE@24/65@1/0
Source: C:\Windows\System32\dialer.exeCode function: 12_2_00007FF6AFBE226C GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,FindResourceExA,SizeofResource,LoadResource,LockResource,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,SleepEx,12_2_00007FF6AFBE226C
Source: C:\Windows\System32\dialer.exeCode function: 12_2_00007FF6AFBE19C4 SysAllocString,SysAllocString,CoInitializeEx,CoInitializeSecurity,CoCreateInstance,VariantInit,CoUninitialize,SysFreeString,SysFreeString,12_2_00007FF6AFBE19C4
Source: C:\Windows\System32\dialer.exeCode function: 12_2_00007FF6AFBE226C GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,FindResourceExA,SizeofResource,LoadResource,LockResource,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,SleepEx,12_2_00007FF6AFBE226C
Source: C:\Users\user\Desktop\setup.exeFile created: C:\Program Files\Google\Chrome\updater.exeJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3816:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1656:120:WilError_03
Source: C:\Users\user\Desktop\setup.exeFile created: C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmpJump to behavior
Source: setup.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\setup.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: setup.exeReversingLabs: Detection: 76%
Source: setup.exeString found in binary or memory: <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>
Source: setup.exeString found in binary or memory: <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>
Source: setup.exeString found in binary or memory: <StopOnIdleEnd>false</StopOnIdleEnd>
Source: setup.exeString found in binary or memory: <StopOnIdleEnd>false</StopOnIdleEnd>
Source: C:\Users\user\Desktop\setup.exeFile read: C:\Users\user\Desktop\setup.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\setup.exe "C:\Users\user\Desktop\setup.exe"
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc
Source: C:\Users\user\Desktop\setup.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exe
Source: unknownProcess created: C:\Program Files\Google\Chrome\updater.exe "C:\Program Files\Google\Chrome\updater.exe"
Source: C:\Users\user\Desktop\setup.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
Source: C:\Users\user\Desktop\setup.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvcJump to behavior
Source: C:\Users\user\Desktop\setup.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exeJump to behavior
Source: C:\Users\user\Desktop\setup.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\setup.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\setup.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvcJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvcJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauservJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bitsJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvcJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\dialer.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: setup.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: setup.exeStatic file information: File size 5617152 > 1048576
Source: setup.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x550200
Source: setup.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 0000001D.00000000.2178288513.0000022595840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382734593.0000022595840000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 0000001D.00000000.2178248889.000002259582B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382137488.000002259582B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: d.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 0000001D.00000000.2178288513.0000022595840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382734593.0000022595840000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 0000001D.00000000.2178288513.0000022595840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382734593.0000022595840000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 0000001D.00000000.2178288513.0000022595840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382734593.0000022595840000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 0000001D.00000002.3383305724.000002259585D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000000.2178341597.000002259585D000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: +@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 0000001D.00000000.2178248889.000002259582B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382137488.000002259582B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 0000001D.00000000.2178248889.000002259582B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382137488.000002259582B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 0000001D.00000000.2178248889.000002259582B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382137488.000002259582B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 0000001D.00000002.3383305724.000002259585D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000000.2178341597.000002259585D000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb* source: svchost.exe, 0000001D.00000000.2178288513.0000022595840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382734593.0000022595840000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 0000001D.00000000.2178288513.0000022595840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.3382734593.0000022595840000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 0000001D.00000002.3383305724.000002259585D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000000.2178341597.000002259585D000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdbcache source: svchost.exe, 0000001D.00000002.3383305724.000002259585D000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000000.2178341597.000002259585D000.00000004.00000001.00020000.00000000.sdmp
Source: wxyubnjmnlae.tmp.0.drStatic PE information: real checksum: 0x0 should be: 0x316d6
Source: updater.exe.0.drStatic PE information: real checksum: 0x55ddc3 should be: 0x56311d
Source: setup.exeStatic PE information: real checksum: 0x55ddc3 should be: 0x56311d
Source: setup.exeStatic PE information: section name: .xdata
Source: updater.exe.0.drStatic PE information: section name: .xdata
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001B1C6AAACDD push rcx; retf 003Fh4_2_000001B1C6AAACDE
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001B1C6ADC6DD push rcx; retf 003Fh4_2_000001B1C6ADC6DE
Source: C:\Windows\System32\winlogon.exeCode function: 17_2_000002D01659ACDD push rcx; retf 003Fh17_2_000002D01659ACDE
Source: C:\Windows\System32\winlogon.exeCode function: 17_2_000002D0165FC6DD push rcx; retf 003Fh17_2_000002D0165FC6DE
Source: C:\Windows\System32\lsass.exeCode function: 21_2_000002D6F14FACDD push rcx; retf 003Fh21_2_000002D6F14FACDE
Source: C:\Windows\System32\lsass.exeCode function: 21_2_000002D6F152C6DD push rcx; retf 003Fh21_2_000002D6F152C6DE
Source: C:\Windows\System32\svchost.exeCode function: 22_2_0000014E41FBACDD push rcx; retf 003Fh22_2_0000014E41FBACDE
Source: C:\Windows\System32\svchost.exeCode function: 22_2_0000014E41FEC6DD push rcx; retf 003Fh22_2_0000014E41FEC6DE
Source: C:\Windows\System32\dwm.exeCode function: 23_2_000001D15B02ACDD push rcx; retf 003Fh23_2_000001D15B02ACDE
Source: C:\Windows\System32\dwm.exeCode function: 23_2_000001D15B05C6DD push rcx; retf 003Fh23_2_000001D15B05C6DE
Source: C:\Windows\System32\svchost.exeCode function: 24_2_0000023AF32CACDD push rcx; retf 003Fh24_2_0000023AF32CACDE
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000023C9FD7ACDD push rcx; retf 003Fh25_2_0000023C9FD7ACDE
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000023C9FDAC6DD push rcx; retf 003Fh25_2_0000023C9FDAC6DE
Source: C:\Windows\System32\svchost.exeCode function: 26_2_000001A1CA6FACDD push rcx; retf 003Fh26_2_000001A1CA6FACDE
Source: C:\Windows\System32\svchost.exeCode function: 26_2_000001A1CA72C6DD push rcx; retf 003Fh26_2_000001A1CA72C6DE
Source: C:\Windows\System32\svchost.exeCode function: 27_2_00000246ED7CACDD push rcx; retf 003Fh27_2_00000246ED7CACDE
Source: C:\Windows\System32\svchost.exeCode function: 27_2_00000246EDE7C6DD push rcx; retf 003Fh27_2_00000246EDE7C6DE
Source: C:\Windows\System32\svchost.exeCode function: 28_2_00000200A19CC6DD push rcx; retf 003Fh28_2_00000200A19CC6DE
Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002259669C6DD push rcx; retf 003Fh29_2_000002259669C6DE
Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000022E670DACDD push rcx; retf 003Fh30_2_0000022E670DACDE
Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000022E6710C6DD push rcx; retf 003Fh30_2_0000022E6710C6DE
Source: C:\Windows\System32\svchost.exeCode function: 31_2_000001FE4A4CACDD push rcx; retf 003Fh31_2_000001FE4A4CACDE
Source: C:\Windows\System32\svchost.exeCode function: 31_2_000001FE4A4FC6DD push rcx; retf 003Fh31_2_000001FE4A4FC6DE
Source: C:\Windows\System32\svchost.exeCode function: 32_2_0000024C19A5ACDD push rcx; retf 003Fh32_2_0000024C19A5ACDE
Source: C:\Windows\System32\svchost.exeCode function: 32_2_0000024C19A8C6DD push rcx; retf 003Fh32_2_0000024C19A8C6DE
Source: C:\Windows\System32\svchost.exeCode function: 33_2_00000275D1FDACDD push rcx; retf 003Fh33_2_00000275D1FDACDE
Source: C:\Windows\System32\svchost.exeCode function: 33_2_00000275D267C6DD push rcx; retf 003Fh33_2_00000275D267C6DE
Source: C:\Windows\System32\svchost.exeCode function: 34_2_0000023BBDCAACDD push rcx; retf 003Fh34_2_0000023BBDCAACDE
Source: C:\Windows\System32\svchost.exeCode function: 34_2_0000023BBDCDC6DD push rcx; retf 003Fh34_2_0000023BBDCDC6DE
Source: C:\Windows\System32\svchost.exeCode function: 35_2_00000227D955C6DD push rcx; retf 003Fh35_2_00000227D955C6DE
Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002DED2C8ACDD push rcx; retf 003Fh36_2_000002DED2C8ACDE
Source: C:\Users\user\Desktop\setup.exeFile created: C:\Program Files\Google\Chrome\updater.exeJump to dropped file
Source: C:\Users\user\Desktop\setup.exeFile created: C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmpJump to dropped file
Source: C:\Windows\System32\svchost.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Dnscache\Parameters\DnsPolicyConfig\DNS_RESILIENCY_fe3cr.delivery.mp.microsoft.comJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\setup.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\WXYUBNJMNLAE.TMP
Source: winlogon.exeIAT, EAT, inline or SSDT hook detected: function: NtQueryDirectoryFile
Source: winlogon.exeIAT, EAT, inline or SSDT hook detected: function: NtQuerySystemInformation
Source: winlogon.exeIAT, EAT, inline or SSDT hook detected: function: ZwEnumerateValueKey
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: winlogon.exeUser mode code has changed: module: ntdll.dll function: ZwEnumerateKey new code: 0xE9 0x9C 0xC3 0x32 0x2C 0xCF
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\dialer.exeCode function: OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,CloseHandle,CloseHandle,12_2_00007FF6AFBE10C0
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5145Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4745Jump to behavior
Source: C:\Windows\System32\dialer.exeWindow / User API: threadDelayed 1711Jump to behavior
Source: C:\Windows\System32\dialer.exeWindow / User API: threadDelayed 657Jump to behavior
Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 6588Jump to behavior
Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 3412Jump to behavior
Source: C:\Windows\System32\lsass.exeWindow / User API: threadDelayed 8026Jump to behavior
Source: C:\Windows\System32\lsass.exeWindow / User API: threadDelayed 1903Jump to behavior
Source: C:\Windows\System32\dwm.exeWindow / User API: threadDelayed 9864Jump to behavior
Source: C:\Users\user\Desktop\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmpJump to dropped file
Source: C:\Windows\System32\wbem\WmiPrvSE.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_4-15085
Source: C:\Windows\System32\svchost.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_22-15146
Source: C:\Windows\System32\dialer.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_12-431
Source: C:\Windows\System32\wbem\WmiPrvSE.exeAPI coverage: 4.9 %
Source: C:\Windows\System32\lsass.exeAPI coverage: 8.0 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 4.9 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 4.7 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 5.2 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 4.9 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 4.9 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 5.7 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 4.6 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 7.0 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 4.9 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 6.5 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 4.9 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 6.3 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 5.9 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 5.0 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 4.9 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 4.9 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 6.5 %
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2548Thread sleep count: 5145 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5660Thread sleep count: 4745 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5476Thread sleep time: -7378697629483816s >= -30000sJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exe TID: 5660Thread sleep count: 252 > 30Jump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exe TID: 5660Thread sleep time: -252000s >= -30000sJump to behavior
Source: C:\Windows\System32\dialer.exe TID: 3544Thread sleep count: 1711 > 30Jump to behavior
Source: C:\Windows\System32\dialer.exe TID: 3544Thread sleep time: -171100s >= -30000sJump to behavior
Source: C:\Windows\System32\dialer.exe TID: 1008Thread sleep count: 657 > 30Jump to behavior
Source: C:\Windows\System32\dialer.exe TID: 1008Thread sleep time: -65700s >= -30000sJump to behavior
Source: C:\Windows\System32\winlogon.exe TID: 2820Thread sleep count: 6588 > 30Jump to behavior
Source: C:\Windows\System32\winlogon.exe TID: 2820Thread sleep time: -6588000s >= -30000sJump to behavior
Source: C:\Windows\System32\winlogon.exe TID: 2820Thread sleep count: 3412 > 30Jump to behavior
Source: C:\Windows\System32\winlogon.exe TID: 2820Thread sleep time: -3412000s >= -30000sJump to behavior
Source: C:\Windows\System32\lsass.exe TID: 3800Thread sleep count: 8026 > 30Jump to behavior
Source: C:\Windows\System32\lsass.exe TID: 3800Thread sleep time: -8026000s >= -30000sJump to behavior
Source: C:\Windows\System32\lsass.exe TID: 3800Thread sleep count: 1903 > 30Jump to behavior
Source: C:\Windows\System32\lsass.exe TID: 3800Thread sleep time: -1903000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 1584Thread sleep count: 245 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 1584Thread sleep time: -245000s >= -30000sJump to behavior
Source: C:\Windows\System32\dwm.exe TID: 1804Thread sleep count: 9864 > 30Jump to behavior
Source: C:\Windows\System32\dwm.exe TID: 1804Thread sleep time: -9864000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2268Thread sleep count: 255 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2268Thread sleep time: -255000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6108Thread sleep count: 255 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6108Thread sleep time: -255000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5476Thread sleep count: 244 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5476Thread sleep time: -244000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6336Thread sleep count: 244 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6336Thread sleep time: -244000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5960Thread sleep count: 203 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5960Thread sleep time: -203000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 3472Thread sleep count: 254 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 3472Thread sleep time: -254000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6512Thread sleep count: 241 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6512Thread sleep time: -241000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4208Thread sleep count: 248 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4208Thread sleep time: -248000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6540Thread sleep count: 252 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6540Thread sleep time: -252000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 404Thread sleep count: 242 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 404Thread sleep time: -242000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4044Thread sleep count: 255 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4044Thread sleep time: -255000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2896Thread sleep count: 255 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2896Thread sleep time: -255000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 592Thread sleep count: 238 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 592Thread sleep time: -238000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 3700Thread sleep count: 255 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 3700Thread sleep time: -255000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 3816Thread sleep count: 252 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 3816Thread sleep time: -252000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5696Thread sleep count: 256 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5696Thread sleep time: -256000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 7008Thread sleep count: 256 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 7008Thread sleep time: -256000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 340Thread sleep count: 245 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 340Thread sleep time: -245000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2620Thread sleep count: 200 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2620Thread sleep time: -200000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6136Thread sleep count: 252 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6136Thread sleep time: -252000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 1052Thread sleep count: 239 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 1052Thread sleep time: -239000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6876Thread sleep count: 253 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6876Thread sleep time: -253000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4864Thread sleep count: 254 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4864Thread sleep time: -254000s >= -30000sJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeLast function: Thread delayed
Source: C:\Windows\System32\wbem\WmiPrvSE.exeLast function: Thread delayed
Source: C:\Windows\System32\dialer.exeLast function: Thread delayed
Source: C:\Windows\System32\dialer.exeLast function: Thread delayed
Source: C:\Windows\System32\lsass.exeLast function: Thread delayed
Source: C:\Windows\System32\lsass.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\dwm.exeLast function: Thread delayed
Source: C:\Windows\System32\dwm.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001B1C6ACDCE0 FindFirstFileExW,4_2_000001B1C6ACDCE0
Source: C:\Windows\System32\winlogon.exeCode function: 17_2_000002D0165EDCE0 FindFirstFileExW,17_2_000002D0165EDCE0
Source: C:\Windows\System32\lsass.exeCode function: 21_2_000002D6F151DCE0 FindFirstFileExW,21_2_000002D6F151DCE0
Source: C:\Windows\System32\svchost.exeCode function: 22_2_0000014E41FDDCE0 FindFirstFileExW,22_2_0000014E41FDDCE0
Source: C:\Windows\System32\dwm.exeCode function: 23_2_000001D15B04DCE0 FindFirstFileExW,23_2_000001D15B04DCE0
Source: C:\Windows\System32\svchost.exeCode function: 24_2_0000023AF32EDCE0 FindFirstFileExW,24_2_0000023AF32EDCE0
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000023C9FD9DCE0 FindFirstFileExW,25_2_0000023C9FD9DCE0
Source: C:\Windows\System32\svchost.exeCode function: 26_2_000001A1CA71DCE0 FindFirstFileExW,26_2_000001A1CA71DCE0
Source: C:\Windows\System32\svchost.exeCode function: 27_2_00000246EDE6DCE0 FindFirstFileExW,27_2_00000246EDE6DCE0
Source: C:\Windows\System32\svchost.exeCode function: 28_2_00000200A19BDCE0 FindFirstFileExW,28_2_00000200A19BDCE0
Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002259668DCE0 FindFirstFileExW,29_2_000002259668DCE0
Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000022E670FDCE0 FindFirstFileExW,30_2_0000022E670FDCE0
Source: C:\Windows\System32\svchost.exeCode function: 31_2_000001FE4A4EDCE0 FindFirstFileExW,31_2_000001FE4A4EDCE0
Source: C:\Windows\System32\svchost.exeCode function: 32_2_0000024C19A7DCE0 FindFirstFileExW,32_2_0000024C19A7DCE0
Source: C:\Windows\System32\svchost.exeCode function: 33_2_00000275D266DCE0 FindFirstFileExW,33_2_00000275D266DCE0
Source: C:\Windows\System32\svchost.exeCode function: 34_2_0000023BBDCCDCE0 FindFirstFileExW,34_2_0000023BBDCCDCE0
Source: C:\Windows\System32\svchost.exeCode function: 35_2_00000227D954DCE0 FindFirstFileExW,35_2_00000227D954DCE0
Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002DED2CADCE0 FindFirstFileExW,36_2_000002DED2CADCE0
Source: C:\Windows\System32\svchost.exeCode function: 37_2_0000014ACE6EDCE0 FindFirstFileExW,37_2_0000014ACE6EDCE0
Source: C:\Windows\System32\svchost.exeCode function: 38_2_00000220AF66DCE0 FindFirstFileExW,38_2_00000220AF66DCE0
Source: C:\Windows\System32\svchost.exeCode function: 39_2_00000241B697DCE0 FindFirstFileExW,39_2_00000241B697DCE0
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: dwm.exe, 00000017.00000002.3428646036.000001D156AA0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000gB
Source: svchost.exe, 0000001E.00000002.3400792914.0000022E66A2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001E.00000000.2182071509.0000022E66A2B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @Microsoft-Windows-Hyper-V-Hypervisor
Source: lsass.exe, 00000015.00000000.2146426037.000002D6F0688000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicvssNT SERVICE
Source: svchost.exe, 0000001E.00000002.3401934481.0000022E66A43000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: (@vmci
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.30.drBinary or memory string: VMware SATA CD00
Source: svchost.exe, 0000001C.00000002.3387853671.00000200A122B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: zSCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000_0r
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.30.drBinary or memory string: NECVMWarVMware SATA CD00
Source: svchost.exe, 0000001E.00000002.3407425356.0000022E67060000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: D8VMwareVirtual disk6000c29c2bea38880a8a16ee9f37bec9
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.30.drBinary or memory string: LSI_SASVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
Source: svchost.exe, 0000001E.00000000.2183261964.0000022E67584000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a8
Source: svchost.exe, 0000001E.00000003.2262517067.0000022E6759C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk2.06000c2942fce4d06663969f532e45d1aPCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.30.drBinary or memory string: storahciNECVMWarVMware SATA CD00
Source: Microsoft-Windows-Storsvc%4Diagnostic.evtx.30.drBinary or memory string: VMware Virtual disk 2.0 6000c2942fce4d06663969f532e45d1aPCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS
Source: svchost.exe, 0000001E.00000000.2183261964.0000022E67584000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1ap
Source: Microsoft-Windows-PowerShell%4Operational.evtx.30.drBinary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware Virtual disk", $value).replace("VMware", $value).replace("HARDDISK", "WDC").replace("VIRTUAL_DISK", $value)
Source: svchost.exe, 0000001E.00000000.2183261964.0000022E67584000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: D8VMwareVirtual disk6000c29c2bea38880a8a16ee9f37bec98
Source: lsass.exe, 00000015.00000002.3387178705.000002D6F0613000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146320539.000002D6F0613000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000000.2148868592.0000014E41C13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3382740118.0000014E41C13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.3385466857.0000023C9FE2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.2168682482.0000023C9FE2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001A.00000002.3380926986.000001A1CA02A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001A.00000000.2169895372.000001A1CA034000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001C.00000002.3388754633.00000200A1241000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001C.00000000.2174065757.00000200A1241000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001E.00000000.2182141150.0000022E66A43000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.30.drBinary or memory string: LSI_SASVMware Virtual disk 6000c29c2bea38880a8a16ee9f37bec9
Source: svchost.exe, 00000016.00000002.3382740118.0000014E41C13000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
Source: System.evtx.30.drBinary or memory string: VMCI: Using capabilities (0x1c).
Source: lsass.exe, 00000015.00000000.2146426037.000002D6F0688000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicshutdownNT SERVICE
Source: Microsoft-Windows-PowerShell%4Operational.evtx.30.drBinary or memory string: $value = $pr.Value.replace("VEN_80EE", $value).replace("VEN_15AD", $value).replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("82801FB", $value).replace("82441FX", $value).replace("82371SB", $value).replace("OpenHCD", $value).replace("VMWare", $value).replace("VMware", $value)
Source: Microsoft-Windows-Storsvc%4Diagnostic.evtx.30.drBinary or memory string: VMware Virtual disk 2.0 6000c29c2bea38880a8a16ee9f37bec9PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.30.drBinary or memory string: nonicNECVMWarVMware SATA CD00
Source: svchost.exe, 0000001E.00000000.2183261964.0000022E67584000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a@
Source: svchost.exe, 00000023.00000002.3380795225.00000227D882B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTVMWare
Source: Microsoft-Windows-PowerShell%4Operational.evtx.30.drBinary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware", $value).replace("VirtualBox", $value).replace("Oracle Corporation", $value).replace("Microsoft Basic Display Adapter", $value)
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.30.drBinary or memory string: nonicVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
Source: svchost.exe, 00000028.00000000.2206212871.00000202A1C02000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
Source: svchost.exe, 0000001E.00000002.3414254414.0000022E6747B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmciAP<
Source: lsass.exe, 00000015.00000000.2146426037.000002D6F0688000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicheartbeatNT SERVICE
Source: svchost.exe, 0000001E.00000000.2183094778.0000022E6749C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: dowvmci
Source: Microsoft-Windows-Storsvc%4Diagnostic.evtx.30.drBinary or memory string: VMware
Source: svchost.exe, 0000001E.00000000.2182457632.0000022E67080000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
Source: Microsoft-Windows-PowerShell%4Operational.evtx.30.drBinary or memory string: if(($pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "AdapterCompatibility" -or $pr.Name -eq "Description" -or $pr.Name -eq "InfSection" -or $pr.Name -eq "VideoProcessor") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VirtualBox' -or $pr.Value -match 'VMware' -or $pr.Value -match 'Oracle Corporation' -or $pr.Value -match 'Microsoft Basic Display Adapter'))
Source: Microsoft-Windows-Storage-Storport%4Operational.evtx.30.drBinary or memory string: nonicVMware Virtual disk 6000c29c2bea38880a8a16ee9f37bec9
Source: Microsoft-Windows-PowerShell%4Operational.evtx.30.drBinary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Model" -or $pr.Name -eq "PNPDeviceID") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMware'))
Source: dwm.exe, 00000017.00000002.3428646036.000001D156B0A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
Source: svchost.exe, 0000001E.00000002.3407425356.0000022E67060000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk2.06000c29c2bea38880a8a16ee9f37bec9PCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00
Source: Microsoft-Windows-PowerShell%4Operational.evtx.30.drBinary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "Service" -or $pr.Name -eq "Description") -and ($pr.Value -match 'VEN_80EE' -or $pr.Value -match 'VEN_15AD' -or $pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMWare' -or $pr.Value -match 'VMware' -or $pr.Value -match '82801FB' -or $pr.Value -match '82441FX' -or $pr.Value -match '82371SB' -or $pr.Value -match 'OpenHCD'))
Source: C:\Windows\System32\dialer.exeAPI call chain: ExitProcess graph end nodegraph_12-486
Source: C:\Users\user\Desktop\setup.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001B1C6ACD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_000001B1C6ACD2A4
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001B1C6AC1628 GetProcessHeap,HeapAlloc,RegOpenKeyExW,RegOpenKeyExW,RegCloseKey,RegOpenKeyExW,RegCloseKey,RegOpenKeyExW,RegCloseKey,RegOpenKeyExW,RegCloseKey,RegOpenKeyExW,RegCloseKey,RegOpenKeyExW,RegCloseKey,RegOpenKeyExW,RegCloseKey,RegOpenKeyExW,RegCloseKey,RegCloseKey,4_2_000001B1C6AC1628
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\dialer.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001B1C6ACD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_000001B1C6ACD2A4
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001B1C6AC7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_000001B1C6AC7D90
Source: C:\Windows\System32\winlogon.exeCode function: 17_2_000002D0165E7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,17_2_000002D0165E7D90
Source: C:\Windows\System32\winlogon.exeCode function: 17_2_000002D0165F6218 SetUnhandledExceptionFilter,17_2_000002D0165F6218
Source: C:\Windows\System32\winlogon.exeCode function: 17_2_000002D0165ED2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,17_2_000002D0165ED2A4
Source: C:\Windows\System32\lsass.exeCode function: 21_2_000002D6F1517D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_000002D6F1517D90
Source: C:\Windows\System32\lsass.exeCode function: 21_2_000002D6F151D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_000002D6F151D2A4
Source: C:\Windows\System32\svchost.exeCode function: 22_2_0000014E41FDD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,22_2_0000014E41FDD2A4
Source: C:\Windows\System32\svchost.exeCode function: 22_2_0000014E41FD7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,22_2_0000014E41FD7D90
Source: C:\Windows\System32\dwm.exeCode function: 23_2_000001D15B056218 SetUnhandledExceptionFilter,23_2_000001D15B056218
Source: C:\Windows\System32\dwm.exeCode function: 23_2_000001D15B04D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,23_2_000001D15B04D2A4
Source: C:\Windows\System32\dwm.exeCode function: 23_2_000001D15B047D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,23_2_000001D15B047D90
Source: C:\Windows\System32\svchost.exeCode function: 24_2_0000023AF32ED2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,24_2_0000023AF32ED2A4
Source: C:\Windows\System32\svchost.exeCode function: 24_2_0000023AF32E7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,24_2_0000023AF32E7D90
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000023C9FD9D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,25_2_0000023C9FD9D2A4
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000023C9FD97D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,25_2_0000023C9FD97D90
Source: C:\Windows\System32\svchost.exeCode function: 26_2_000001A1CA717D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,26_2_000001A1CA717D90
Source: C:\Windows\System32\svchost.exeCode function: 26_2_000001A1CA71D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,26_2_000001A1CA71D2A4
Source: C:\Windows\System32\svchost.exeCode function: 27_2_00000246EDE6D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,27_2_00000246EDE6D2A4
Source: C:\Windows\System32\svchost.exeCode function: 27_2_00000246EDE67D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,27_2_00000246EDE67D90
Source: C:\Windows\System32\svchost.exeCode function: 28_2_00000200A19BD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,28_2_00000200A19BD2A4
Source: C:\Windows\System32\svchost.exeCode function: 28_2_00000200A19C6218 SetUnhandledExceptionFilter,28_2_00000200A19C6218
Source: C:\Windows\System32\svchost.exeCode function: 28_2_00000200A19B7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,28_2_00000200A19B7D90
Source: C:\Windows\System32\svchost.exeCode function: 29_2_0000022596687D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,29_2_0000022596687D90
Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002259668D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,29_2_000002259668D2A4
Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000022E670FD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,30_2_0000022E670FD2A4
Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000022E670F7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,30_2_0000022E670F7D90
Source: C:\Windows\System32\svchost.exeCode function: 31_2_000001FE4A4E7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,31_2_000001FE4A4E7D90
Source: C:\Windows\System32\svchost.exeCode function: 31_2_000001FE4A4ED2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,31_2_000001FE4A4ED2A4
Source: C:\Windows\System32\svchost.exeCode function: 32_2_0000024C19A7D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,32_2_0000024C19A7D2A4
Source: C:\Windows\System32\svchost.exeCode function: 32_2_0000024C19A77D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,32_2_0000024C19A77D90
Source: C:\Windows\System32\svchost.exeCode function: 33_2_00000275D266D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,33_2_00000275D266D2A4
Source: C:\Windows\System32\svchost.exeCode function: 33_2_00000275D2667D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,33_2_00000275D2667D90
Source: C:\Windows\System32\svchost.exeCode function: 34_2_0000023BBDCCD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,34_2_0000023BBDCCD2A4
Source: C:\Windows\System32\svchost.exeCode function: 34_2_0000023BBDCD6218 SetUnhandledExceptionFilter,34_2_0000023BBDCD6218
Source: C:\Windows\System32\svchost.exeCode function: 34_2_0000023BBDCC7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,34_2_0000023BBDCC7D90
Source: C:\Windows\System32\svchost.exeCode function: 35_2_00000227D954D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,35_2_00000227D954D2A4
Source: C:\Windows\System32\svchost.exeCode function: 35_2_00000227D9547D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,35_2_00000227D9547D90
Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002DED2CAD2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,36_2_000002DED2CAD2A4
Source: C:\Windows\System32\svchost.exeCode function: 36_2_000002DED2CA7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,36_2_000002DED2CA7D90
Source: C:\Windows\System32\svchost.exeCode function: 37_2_0000014ACE6ED2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,37_2_0000014ACE6ED2A4
Source: C:\Windows\System32\svchost.exeCode function: 37_2_0000014ACE6E7D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,37_2_0000014ACE6E7D90
Source: C:\Windows\System32\svchost.exeCode function: 38_2_00000220AF667D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,38_2_00000220AF667D90
Source: C:\Windows\System32\svchost.exeCode function: 38_2_00000220AF66D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,38_2_00000220AF66D2A4
Source: C:\Windows\System32\svchost.exeCode function: 39_2_00000241B6977D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,39_2_00000241B6977D90
Source: C:\Windows\System32\svchost.exeCode function: 39_2_00000241B697D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,39_2_00000241B697D2A4

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\svchost.exeDomain query: 241.42.69.40.in-addr.arpa
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
Source: C:\Users\user\Desktop\setup.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\winlogon.exe base: 2D016580000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\lsass.exe base: 2D6F14E0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 14E41FA0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dwm.exe base: 1D15B010000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 23AF32B0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 23C9FD60000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1A1CA6E0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 246ED7B0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 200A1980000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 22595FB0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 22E670C0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1FE4A4B0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 24C19A40000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 275D1FC0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 23BBDC90000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 227D8FC0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2DED2C70000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 14ACE6B0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 220AEFD0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 241B6940000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 202A22A0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 14D25AA0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1BD1A2F0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 21A63950000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1834ABA0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2D8F03D0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 18BAF3C0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 256EBEB0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2568E1B0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 226A7DC0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\spoolsv.exe base: 12A0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1E2C0F50000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2EE0D7C0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 22B68FC0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 207EA5B0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 1EBCE9B0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 11CD6340000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1AFDEB70000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 207C0460000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 245A2150000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 24708EB0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 22F60740000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 26E569B0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2CA8FE60000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\sihost.exe base: 1D63DC20000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1A799B20000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1F6963C0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 26481BB0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 166D2D90000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\ctfmon.exe base: 128DE440000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2101D0E0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\explorer.exe base: 86A0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 192D1E50000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 26DD2000000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 257155B0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dasHost.exe base: 16443E50000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 2C8A6FC0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1E968280000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1A9452E0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dllhost.exe base: 29227D20000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 283E5C00000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\smartscreen.exe base: 14BB07C0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 22C4F660000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1DBAE850000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\ApplicationFrameHost.exe base: 27B1B9F0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 27FF3CD0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 281CF7C0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 28843650000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 2761C420000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 1ED974C0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 14FE9140000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1BB54D40000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 22F380C0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 234F31D0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1B1C6A90000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WMIADAP.exe base: 1D4049E0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WMIADAP.exe base: 1D404D90000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\dialer.exeCode function: 12_2_00007FF6AFBE1C88 CreateProcessW,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAlloc,GetThreadContext,WriteProcessMemory,SetThreadContext,ResumeThread,OpenProcess,TerminateProcess,12_2_00007FF6AFBE1C88
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\winlogon.exe EIP: 1658273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\lsass.exe EIP: F14E273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 41FA273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\dwm.exe EIP: 5B01273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: F32B273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 9FD6273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: CA6E273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: ED7B273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: A198273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 95FB273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 670C273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 4A4B273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 19A4273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: D1FC273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: BDC9273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: D8FC273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: D2C7273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: CE6B273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: AEFD273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: B694273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: A22A273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 25AA273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 1A2F273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 6395273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 4ABA273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: F03D273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: AF3C273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: EBEB273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8E1B273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A7DC273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 12A273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C0F5273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D7C273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 68FC273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: EA5B273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: CE9B273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D634273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: DEB7273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C046273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A215273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8EB273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6074273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 569B273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8FE6273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 3DC2273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 99B2273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 963C273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 81BB273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D2D9273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: DE44273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1D0E273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 86A273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D1E5273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D200273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 155B273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 43E5273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A6FC273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6828273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 452E273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 27D2273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: E5C0273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: B07C273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4F66273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: AE85273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1B9F273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F3CD273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: CF7C273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4365273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1C42273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 974C273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: E914273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 54D4273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 380C273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F31D273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C6A9273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 49E273CJump to behavior
Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4D9273CJump to behavior
Source: C:\Users\user\Desktop\setup.exeNtQuerySystemInformation: Direct from: 0x7FF6E94A42AEJump to behavior
Source: C:\Program Files\Google\Chrome\updater.exeNtCreateMutant: Direct from: 0x7FF63DE742AEJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 2D016580000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 2D6F14E0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 14E41FA0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 1D15B010000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23AF32B0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23C9FD60000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A1CA6E0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 246ED7B0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 200A1980000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22595FB0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22E670C0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1FE4A4B0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24C19A40000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 275D1FC0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23BBDC90000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 227D8FC0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2DED2C70000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 14ACE6B0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 220AEFD0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 241B6940000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 202A22A0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 14D25AA0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BD1A2F0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21A63950000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1834ABA0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2D8F03D0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 18BAF3C0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 256EBEB0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2568E1B0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 226A7DC0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\spoolsv.exe base: 12A0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E2C0F50000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2EE0D7C0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22B68FC0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 207EA5B0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 1EBCE9B0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 11CD6340000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1AFDEB70000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 207C0460000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 245A2150000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24708EB0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22F60740000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26E569B0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2CA8FE60000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\sihost.exe base: 1D63DC20000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A799B20000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F6963C0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26481BB0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 166D2D90000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ctfmon.exe base: 128DE440000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2101D0E0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\explorer.exe base: 86A0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 192D1E50000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26DD2000000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 257155B0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dasHost.exe base: 16443E50000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2C8A6FC0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1E968280000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A9452E0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 29227D20000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 283E5C00000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\smartscreen.exe base: 14BB07C0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22C4F660000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1DBAE850000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 27B1B9F0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 27FF3CD0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 281CF7C0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 28843650000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 2761C420000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1ED974C0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 14FE9140000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1BB54D40000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22F380C0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 234F31D0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1B1C6A90000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1D4049E0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1D404D90000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: PID: 4004 base: 86A0000 value: 4DJump to behavior
Source: C:\Users\user\Desktop\setup.exeSection loaded: NULL target: C:\Windows\System32\dialer.exe protection: readonlyJump to behavior
Source: C:\Users\user\Desktop\setup.exeThread register set: target process: 1172Jump to behavior
Source: C:\Users\user\Desktop\setup.exeMemory written: C:\Windows\System32\dialer.exe base: A832518010Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 2D016580000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 2D6F14E0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 14E41FA0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 1D15B010000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23AF32B0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23C9FD60000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A1CA6E0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 246ED7B0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 200A1980000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22595FB0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22E670C0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1FE4A4B0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24C19A40000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 275D1FC0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23BBDC90000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 227D8FC0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2DED2C70000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 14ACE6B0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 220AEFD0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 241B6940000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 202A22A0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 14D25AA0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BD1A2F0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21A63950000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1834ABA0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2D8F03D0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 18BAF3C0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 256EBEB0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2568E1B0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 226A7DC0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\spoolsv.exe base: 12A0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E2C0F50000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2EE0D7C0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22B68FC0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 207EA5B0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 1EBCE9B0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 11CD6340000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1AFDEB70000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 207C0460000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 245A2150000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24708EB0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22F60740000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26E569B0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2CA8FE60000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\sihost.exe base: 1D63DC20000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A799B20000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F6963C0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26481BB0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 166D2D90000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ctfmon.exe base: 128DE440000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2101D0E0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\explorer.exe base: 86A0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 192D1E50000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26DD2000000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 257155B0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dasHost.exe base: 16443E50000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2C8A6FC0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1E968280000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A9452E0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 29227D20000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 283E5C00000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\smartscreen.exe base: 14BB07C0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22C4F660000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1DBAE850000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 27B1B9F0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 27FF3CD0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 281CF7C0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 28843650000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 2761C420000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1ED974C0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 14FE9140000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1BB54D40000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 22F380C0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 234F31D0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1B1C6A90000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1D4049E0000Jump to behavior
Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1D404D90000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 207EA610000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 207EA610000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 207EA610000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 207EA610000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 207EA610000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 207EA610000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 207EA610000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 207EA610000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 207EA610000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 207EA610000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 207EA610000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1834B270000Jump to behavior
Source: C:\Users\user\Desktop\setup.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvcJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvcJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauservJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bitsJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvcJump to behavior
Source: C:\Windows\System32\dialer.exeCode function: 12_2_00007FF6AFBE1B54 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,12_2_00007FF6AFBE1B54
Source: C:\Windows\System32\dialer.exeCode function: 12_2_00007FF6AFBE1B54 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,12_2_00007FF6AFBE1B54
Source: winlogon.exe, 00000011.00000000.2142953238.000002D016A60000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000011.00000002.3399964337.000002D016A61000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 00000017.00000002.3424272166.000001D154AB1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: IProgram Manager
Source: dwm.exe, 00000017.00000000.2159577755.000001D159439000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 00000017.00000002.3435659457.000001D159439000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: winlogon.exe, 00000011.00000000.2142953238.000002D016A60000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000011.00000002.3399964337.000002D016A61000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 00000017.00000002.3424272166.000001D154AB1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
Source: winlogon.exe, 00000011.00000000.2142953238.000002D016A60000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000011.00000002.3399964337.000002D016A61000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 00000017.00000002.3424272166.000001D154AB1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
Source: winlogon.exe, 00000011.00000000.2142953238.000002D016A60000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000011.00000002.3399964337.000002D016A61000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 00000017.00000002.3424272166.000001D154AB1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001B1C6AA36F0 cpuid 4_2_000001B1C6AA36F0
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\dialer.exeCode function: 12_2_00007FF6AFBE1B54 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,12_2_00007FF6AFBE1B54
Source: C:\Windows\System32\wbem\WmiPrvSE.exeCode function: 4_2_000001B1C6AC7960 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,4_2_000001B1C6AC7960

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc
Source: Microsoft-Windows-Diagnostics-Performance%4Operational.evtx.30.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
11
DLL Side-Loading
1
Abuse Elevation Control Mechanism
2
Disable or Modify Tools
1
Credential API Hooking
1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
11
Windows Service
11
DLL Side-Loading
1
Abuse Elevation Control Mechanism
LSASS Memory1
File and Directory Discovery
Remote Desktop Protocol1
Credential API Hooking
1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Service Execution
Logon Script (Windows)1
Access Token Manipulation
1
Obfuscated Files or Information
Security Account Manager22
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook11
Windows Service
11
DLL Side-Loading
NTDS231
Security Software Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script913
Process Injection
4
Rootkit
LSA Secrets2
Process Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Masquerading
Cached Domain Credentials21
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
Virtualization/Sandbox Evasion
DCSync1
Application Window Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Access Token Manipulation
Proc Filesystem1
Remote System Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt913
Process Injection
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
Hidden Files and Directories
Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1553146 Sample: setup.exe Startdate: 10/11/2024 Architecture: WINDOWS Score: 100 60 Antivirus detection for dropped file 2->60 62 Multi AV Scanner detection for dropped file 2->62 64 Multi AV Scanner detection for submitted file 2->64 66 10 other signatures 2->66 7 setup.exe 3 2->7         started        11 cmd.exe 1 2->11         started        13 powershell.exe 23 2->13         started        15 updater.exe 2->15         started        process3 file4 42 C:\Users\user\AppData\...\wxyubnjmnlae.tmp, PE32+ 7->42 dropped 44 C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+ 7->44 dropped 68 Writes to foreign memory regions 7->68 70 Modifies the context of a thread in another process (thread injection) 7->70 72 Found hidden mapped module (file has been removed from disk) 7->72 80 2 other signatures 7->80 17 dialer.exe 1 7->17         started        74 Stops critical windows services 11->74 20 conhost.exe 11->20         started        22 sc.exe 1 11->22         started        24 sc.exe 1 11->24         started        30 3 other processes 11->30 76 Loading BitLocker PowerShell Module 13->76 26 WmiPrvSE.exe 13->26         started        28 conhost.exe 13->28         started        78 Found direct / indirect Syscall (likely to bypass EDR) 15->78 signatures5 process6 signatures7 52 Injects code into the Windows Explorer (explorer.exe) 17->52 54 Contains functionality to inject code into remote processes 17->54 56 Writes to foreign memory regions 17->56 58 4 other signatures 17->58 32 lsass.exe 17->32 injected 35 svchost.exe 17->35 injected 37 svchost.exe 4 17->37 injected 40 24 other processes 17->40 process8 dnsIp9 48 Writes to foreign memory regions 32->48 50 System process connects to network (likely due to code injection or exploit) 35->50 46 241.42.69.40.in-addr.arpa 37->46 signatures10

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
setup.exe76%ReversingLabsWin64.Trojan.SilentCryptoMiner
setup.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmp100%AviraRKIT/Agent.dvyic
C:\Program Files\Google\Chrome\updater.exe100%Joe Sandbox ML
C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmp100%Joe Sandbox ML
C:\Program Files\Google\Chrome\updater.exe76%ReversingLabsWin64.Trojan.SilentCryptoMiner
C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmp88%ReversingLabsWin64.Trojan.SilentCryptoMiner
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
241.42.69.40.in-addr.arpa
unknown
unknownfalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    http://schemas.xmlsoap.org/wsdl/soap12/Plsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpfalse
      high
      http://schemas.xmlsoap.org/ws/2005/07/securitypolicylsass.exe, 00000015.00000000.2146371271.000002D6F064E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3388396962.000002D6F064E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpfalse
        high
        http://Passport.NET/tbMicrosoft-Windows-LiveId%4Operational.evtx.30.drfalse
          high
          http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpfalse
            high
            http://schemas.xmlsoap.org/ws/2005/02/trustlsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpfalse
              high
              http://docs.oasis-open.org/ws-sx/ws-trust/200512lsass.exe, 00000015.00000000.2146371271.000002D6F064E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3388396962.000002D6F064E000.00000004.00000001.00020000.00000000.sdmpfalse
                high
                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdlsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpfalse
                  high
                  http://schemas.xmlsoap.org/ws/2004/09/policylsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpfalse
                    high
                    http://schemas.xmlsoap.org/wsdl/ertieslsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpfalse
                      high
                      http://schemas.xmlsoap.org/wsdl/soap12/lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpfalse
                        high
                        http://schemas.xmlsoap.org/wsdl/lsass.exe, 00000015.00000000.2146345009.000002D6F062F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000015.00000002.3387852004.000002D6F062F000.00000004.00000001.00020000.00000000.sdmpfalse
                          high
                          No contacted IP infos
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1553146
                          Start date and time:2024-11-10 12:37:09 +01:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 9m 47s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:20
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:27
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:setup.exe
                          Detection:MAL
                          Classification:mal100.evad.winEXE@24/65@1/0
                          EGA Information:
                          • Successful, ratio: 91.7%
                          HCA Information:
                          • Successful, ratio: 75%
                          • Number of executed functions: 60
                          • Number of non-executed functions: 362
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): dllhost.exe, conhost.exe, schtasks.exe
                          • Excluded IPs from analysis (whitelisted): 40.126.31.69, 20.190.159.2, 20.190.159.23, 20.190.159.0, 40.126.31.71, 40.126.31.67, 20.190.159.4, 20.190.159.64
                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, prdv4a.aadg.msidentity.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, www.tm.v4.a.prd.aadg.akadns.net, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
                          • Execution Graph export aborted for target setup.exe, PID 4924 because it is empty
                          • Execution Graph export aborted for target updater.exe, PID 5484 because it is empty
                          • Not all processes where analyzed, report is missing behavior information
                          • Report creation exceeded maximum time and may have missing disassembly code information.
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size exceeded maximum capacity and may have missing disassembly code.
                          • Report size getting too big, too many NtCreateKey calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                          • VT rate limit hit for: setup.exe
                          TimeTypeDescription
                          06:37:57API Interceptor1x Sleep call for process: setup.exe modified
                          06:37:59API Interceptor15x Sleep call for process: powershell.exe modified
                          06:38:35API Interceptor299626x Sleep call for process: lsass.exe modified
                          06:38:35API Interceptor5380x Sleep call for process: svchost.exe modified
                          06:38:35API Interceptor383958x Sleep call for process: winlogon.exe modified
                          06:38:35API Interceptor1894x Sleep call for process: dialer.exe modified
                          06:38:37API Interceptor371943x Sleep call for process: dwm.exe modified
                          06:38:43API Interceptor225x Sleep call for process: WmiPrvSE.exe modified
                          12:38:02Task SchedulerRun new task: GoogleUpdateTaskMachineQC path: %ProgramFiles%\Google\Chrome\updater.exe
                          No context
                          No context
                          No context
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmpiqA8j9yGcd.exeGet hashmaliciousHackBrowser, DCRat, Discord Token Stealer, Millenuim RAT, PureLog Stealer, zgRATBrowse
                            VaTlw2kNGc.exeGet hashmaliciousBlank Grabber, DCRat, PureLog Stealer, Xmrig, zgRATBrowse
                              87Bym0x4Fy.exeGet hashmaliciousBlank Grabber, DCRat, Discord Rat, PureLog Stealer, Xmrig, zgRATBrowse
                                8Ck8T5qRcC.exeGet hashmaliciousBlank Grabber, DCRat, PureLog Stealer, Xmrig, zgRATBrowse
                                  TS-240605-Millenium1.exeGet hashmaliciousBlank Grabber, Discord Token Stealer, Millenuim RAT, XmrigBrowse
                                    DevxExecutor.exeGet hashmaliciousPython Stealer, Blank Grabber, CStealer, Discord Token Stealer, Millenuim RATBrowse
                                      hacn.exeGet hashmaliciousDiscord Token Stealer, Millenuim RAT, XmrigBrowse
                                        SecuriteInfo.com.Win64.Evo-gen.25073.24639.exeGet hashmaliciousUnknownBrowse
                                          file.exeGet hashmaliciousRHADAMANTHYS, RedLine, XmrigBrowse
                                            WinrarInstaller.exeGet hashmaliciousXmrigBrowse
                                              C:\Program Files\Google\Chrome\updater.exeiqA8j9yGcd.exeGet hashmaliciousHackBrowser, DCRat, Discord Token Stealer, Millenuim RAT, PureLog Stealer, zgRATBrowse
                                                VaTlw2kNGc.exeGet hashmaliciousBlank Grabber, DCRat, PureLog Stealer, Xmrig, zgRATBrowse
                                                  87Bym0x4Fy.exeGet hashmaliciousBlank Grabber, DCRat, Discord Rat, PureLog Stealer, Xmrig, zgRATBrowse
                                                    8Ck8T5qRcC.exeGet hashmaliciousBlank Grabber, DCRat, PureLog Stealer, Xmrig, zgRATBrowse
                                                      TS-240605-Millenium1.exeGet hashmaliciousBlank Grabber, Discord Token Stealer, Millenuim RAT, XmrigBrowse
                                                        DevxExecutor.exeGet hashmaliciousPython Stealer, Blank Grabber, CStealer, Discord Token Stealer, Millenuim RATBrowse
                                                          hacn.exeGet hashmaliciousDiscord Token Stealer, Millenuim RAT, XmrigBrowse
                                                            Process:C:\Users\user\Desktop\setup.exe
                                                            File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):5617152
                                                            Entropy (8bit):7.71585644239634
                                                            Encrypted:false
                                                            SSDEEP:98304:Dei3W2HJn8hqIOLmRLRSo+QqvCRs19A3JIkLJQrAtjRQii7yXdmMpy2N:6Z2i4OcxQECE6ZIkLJIAt8y4
                                                            MD5:1274CBCD6329098F79A3BE6D76AB8B97
                                                            SHA1:53C870D62DCD6154052445DC03888CDC6CFFD370
                                                            SHA-256:BBE5544C408A6EB95DD9980C61A63C4EBC8CCBEECADE4DE4FAE8332361E27278
                                                            SHA-512:A0FEBBD4915791D3C32531FB3CF177EE288DD80CE1C8A1E71FA9AD59A4EBDDEEF69B6BE7F3D19E687B96DC59C8A8FA80AFFF8378A71431C3133F361B28E0D967
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: ReversingLabs, Detection: 76%
                                                            Joe Sandbox View:
                                                            • Filename: iqA8j9yGcd.exe, Detection: malicious, Browse
                                                            • Filename: VaTlw2kNGc.exe, Detection: malicious, Browse
                                                            • Filename: 87Bym0x4Fy.exe, Detection: malicious, Browse
                                                            • Filename: 8Ck8T5qRcC.exe, Detection: malicious, Browse
                                                            • Filename: TS-240605-Millenium1.exe, Detection: malicious, Browse
                                                            • Filename: DevxExecutor.exe, Detection: malicious, Browse
                                                            • Filename: hacn.exe, Detection: malicious, Browse
                                                            Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$.......PE..d......................(.v....U................@.............................PV.......U...`... ...............................................V......0V.......U..............@V.x.............................U.(.....................V.X............................text....u.......v..................`..`.data...`.U.......U..z..............@....rdata..`.....U......|U.............@..@.pdata........U.......U.............@..@.xdata........U.......U.............@..@.bss.... .....U..........................idata........V.......U.............@....CRT....`.....V.......U.............@....tls......... V.......U.............@....rsrc........0V.......U.............@....reloc..x....@V.......U.............@..B........................................................................................................................................................................
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):64
                                                            Entropy (8bit):1.1940658735648508
                                                            Encrypted:false
                                                            SSDEEP:3:Nlllultnxj:NllU
                                                            MD5:F93358E626551B46E6ED5A0A9D29BD51
                                                            SHA1:9AECA90CCBFD1BEC2649D66DF8EBE64C13BACF03
                                                            SHA-256:0347D1DE5FEA380ADFD61737ECD6068CB69FC466AC9C77F3056275D5FCAFDC0D
                                                            SHA-512:D609B72F20BF726FD14D3F2EE91CCFB2A281FAD6BC88C083BFF7FCD177D2E59613E7E4E086DB73037E2B0B8702007C8F7524259D109AF64942F3E60BFCC49853
                                                            Malicious:false
                                                            Preview:@...e................................................@..........
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Users\user\Desktop\setup.exe
                                                            File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):161792
                                                            Entropy (8bit):5.8318794599287465
                                                            Encrypted:false
                                                            SSDEEP:3072:lQbW78Kb89UMmY8MA1cRWr7BiKcOO1Sf7lHn4mr3yo4f8P2:lQK75bobwfBiKCYfhHLU5
                                                            MD5:1667C96053EAA078109F8B0C9500FC9D
                                                            SHA1:E0F567763BAAAA757F66F96951D9810F45F69F30
                                                            SHA-256:F7E1E53A6FB24A2BD9206305C59448A8F99B6F5847A6ACB18EB0FD9F7383FFB4
                                                            SHA-512:6285ADE5CB85B71814EDD57EDDC512A031596043B7FCE4FCC909A0B78ECFE161C062AD0637EC82CBDAA36675AD32FBD0C94DDD96BB575BE8B1FBB47DF706AAE1
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Avira, Detection: 100%
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: ReversingLabs, Detection: 88%
                                                            Joe Sandbox View:
                                                            • Filename: iqA8j9yGcd.exe, Detection: malicious, Browse
                                                            • Filename: VaTlw2kNGc.exe, Detection: malicious, Browse
                                                            • Filename: 87Bym0x4Fy.exe, Detection: malicious, Browse
                                                            • Filename: 8Ck8T5qRcC.exe, Detection: malicious, Browse
                                                            • Filename: TS-240605-Millenium1.exe, Detection: malicious, Browse
                                                            • Filename: DevxExecutor.exe, Detection: malicious, Browse
                                                            • Filename: hacn.exe, Detection: malicious, Browse
                                                            • Filename: SecuriteInfo.com.Win64.Evo-gen.25073.24639.exe, Detection: malicious, Browse
                                                            • Filename: file.exe, Detection: malicious, Browse
                                                            • Filename: WinrarInstaller.exe, Detection: malicious, Browse
                                                            Preview:MZ......................@.......................................sr......!..L.!This program cannot be run in DOS mode....$.......K...............D.......D...........o...9A......9A9.....9A......Rich............PE..d....t.d.........."....%.....X......X".........@..........................................`..................................................8.......p..`>...`..8....................5..8............................................0...............................text............................... ..`.rdata.......0......."..............@..@.data........P......................@....pdata..8....`.......6..............@..@.rsrc...`>...p...@...8..............@..@........................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\setup.exe
                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1490
                                                            Entropy (8bit):5.1015990235428035
                                                            Encrypted:false
                                                            SSDEEP:24:2dk4+SkIMFWYL60YeGlMhEMjn5pwjpILUYODOLqx49RJh7h8gJ15E15LNEB86tn:cC3IQDL60uydbQ9IIYODOLqOdq2sbEx
                                                            MD5:546D67A48FF2BF7682CEA9FAC07B942E
                                                            SHA1:A2CB3A9A97FD935B5E62D4C29B3E2C5AB7D5FC90
                                                            SHA-256:EFF7EDC19E6C430AAECA7EA8A77251C74D1E9ABB79B183A9EE1F58C2934B4B6A
                                                            SHA-512:10D90EDF31C0955BCEC52219D854952FD38768BD97E8E50D32A1237BCCAF1A5EB9F824DA0F81A7812E0CE62C0464168DD0201D1C0EB61B9FE253FE7C89DE05FE
                                                            Malicious:false
                                                            Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.3" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <Triggers>.. <BootTrigger>.. . <Enabled>true</Enabled>.. </BootTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">... <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <Duration>PT10M</Duration>.. <WaitTimeout>PT1H</WaitTimeout>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabl
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):2360
                                                            Entropy (8bit):3.703112687382221
                                                            Encrypted:false
                                                            SSDEEP:48:MtCDUlZzrP++cSLdwSCtR65EfWHjjP4OFiL8anhyxDJAAy:mujJOLjjP4OkganaWAy
                                                            MD5:99D3A843B04904597BD6DCC02360A584
                                                            SHA1:BFD51927B3AC96EC83030AEECE6CC55FFDB81E4D
                                                            SHA-256:1F3C08672B32DF1C611C556F013BD710F5B301CCC9491C61901F3673AE1284C9
                                                            SHA-512:52C2402B60A222E00F15DF210D59D615DFDCF1787CF650B4AB69C1FEE5038732F8E4FA8941199D5498E3D440A0FE580F20206EB57C13126E29F66AF96B476C96
                                                            Malicious:false
                                                            Preview:ElfChnk.........................................8..........................................................................S.9.................m...........................=...................................................................................v...................................t...?...........................................F...................M...5...........................F...............................................&.......................................................................**..8............[.e3........}$..&.......}$...[\_+-...x(.}.......A..q...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..2............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.A.P.I.2.F........)...G.u.i.d.....&.{.5.b.b.c.a.4.a.8.-.b.2.0.9.-.4.8.d.c.-.a.8.c.7.-.b.2.3.d.3.e.5.2.1.6.f.b.}.
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):3.844757629881363
                                                            Encrypted:false
                                                            SSDEEP:384:5he6UHi2uepX7xasnPC3FzFtpFDhFPFyF842xDmSyVflkWiVytr1jSmKbC93ZmLH:5VUHiapX7xadptrDT9W84R9RNdlJEt
                                                            MD5:6DD9513F9459922C47E5DA7D177B65ED
                                                            SHA1:22141C6315B5E37BF885AA1B2D611BB4A7B85186
                                                            SHA-256:EEE9440984A354B116F442B7E64D4754847E667C0A90A6AD38DD990371A09086
                                                            SHA-512:3D40609D277197F9249A917D3890960F419CB78B47A68CE5A74A902AC069DBAB781C33A104E21C8A12B5C484EACBB00783FE8F1AC48752C24709B833AAAE5F1C
                                                            Malicious:false
                                                            Preview:ElfChnk.........H...............H....................u3.......................................................................................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...............................................N...........&........r...................m..............qo...................>...;..................**..............4.9...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:DIY-Thermocam raw data (Lepton 3.x), scale 8448-1024, spot sensor temperature 0.000000, unit celsius, color scheme 1, show spot sensor, calibration: offset 0.000000, slope 13321401407157305344.000000
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):4.375898877258491
                                                            Encrypted:false
                                                            SSDEEP:384:GhzN7UN0HN9NINoNaNxNUN7N+N8NXNINCXNGNXNNaYNXa4NvNhnNFNENNhSNEcNV:GDttjfckEwpQTB1cuat3x9
                                                            MD5:C9340739814935979F6E070F71B429C3
                                                            SHA1:5D5883156D59CE1BFCCE51E8B05190DACBD63C4D
                                                            SHA-256:C73213B06AE8111F7F5E76AA12A63FBD173A2BF1072D07B0D1BEE6C91C722160
                                                            SHA-512:23A7490C2F62515367EB614618910117A79AC4A42A0C9815C8194D47F4D8A978DB5A0D1F503BC6B07A2433DB05EB8F7582289AEDF7062C3D1B735049825CF459
                                                            Malicious:false
                                                            Preview:ElfChnk.x...............x.............................r.....................................................................].B.................2.......................Z...=...........................................................................................................................f...............?...........................m...................M...F....................{..........................&.......................MX......]...................................................................**......x.......G.".U..........Z7;&........Z7;..T.f.m`..L........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):77600
                                                            Entropy (8bit):4.254900887881969
                                                            Encrypted:false
                                                            SSDEEP:384:eghxVpV/rV9VdVHVVpVkVXghxVpV/rV9VdVHVVpVkVPWWVnVyVqVmVXV5VX64VXO:egxWgxjIiXkrtrAjxq
                                                            MD5:5A17B181AA89D574FA47B49FB774FD4C
                                                            SHA1:EBEA40225DC23D0EA2CD3F832AA6EA8648BD66BF
                                                            SHA-256:22D1A8A1465961F49521FBCC33B3217F085D761BF44190C851077F3B5FEFA73C
                                                            SHA-512:4DE6ACDBA1B70A2FE6E8C7AB105E4ECFBEB0880A18FFAA051F108054EBE8E5BD5A79EC181E7BEBBDB3F9415DACE059F82CC02E041B815AD66E3208C0FC0C8833
                                                            Malicious:false
                                                            Preview:ElfChnk.I.......P.......I.......P....................2>.......................................................................=.................6.......................^...=...........................................................................................................................f...............?...........................m...................M...F...............................................&...................................................................................................**......I........J..W..........Z7;&........Z7;..T.f.m`..L........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):4.213049085236613
                                                            Encrypted:false
                                                            SSDEEP:384:fh+m3shOg26Qm6mt3m+DmqkTmETiImombmtmgmRmvhmCmGImchm7mBmImwmtmHm2:fNCOg26Dk1TisCzjECrXqm
                                                            MD5:C142C52B34FFDA11B1B98479A7FD083A
                                                            SHA1:46E3403362EDEE1AA85FA9304DCCF2786938FBD6
                                                            SHA-256:EE26845A028E718A3FCB180BB07B1B944DA0C876313A24EDA336A7BAF53D49C9
                                                            SHA-512:1198A7AA1C55DD65542CBEA8A567A910645D6A167B02692C5C8E33F9AB40644BE233589181B7F67263324DEB1A661BE95E964607F1C680C7EFC8EDBED5E1E2C7
                                                            Malicious:false
                                                            Preview:ElfChnk..0.......0.......0.......0...................:8O....................................................................Z...................P.......................x...=...........................................................................................................................f...............?...........................m...................M...F...............................................&...............................)...................................................................**.......0......f6..W..........Z7;&........Z7;..T.f.m`..L........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 5, DIRTY
                                                            Category:dropped
                                                            Size (bytes):71344
                                                            Entropy (8bit):0.8840647255895877
                                                            Encrypted:false
                                                            SSDEEP:192:EUV7pp8nMLmvcp8nbp8nup8n6p8n0V7pp8nMLmvcp8nbp8nup8n6p8n:EUhpiMLmUibiui6i0hpiMLmUibiui6i
                                                            MD5:61C96B59C970A72978EC94C20C97D5B5
                                                            SHA1:22DD0147508820ED55636849F4455D79B5DE1E9E
                                                            SHA-256:84F8031B86E32DF3235731CFDBB29A64FB1559AB94E0242A2F1FBA12DBDB8B71
                                                            SHA-512:2B9F5366A84DA4A6B9AF3DCCAAD6CDFD2DC0F24451C972156E3D06B162C748070F63D01990B4C7B0E90E0DBA816C3581E48228B7E2D6DA3CFAF023DD02877388
                                                            Malicious:false
                                                            Preview:ElfFile......................................................................................................................RyNElfChnk.........................................0...X.?#......................................................................s8............................................=...........................................................................................................................f...............?...................................p...........M...F...................................................................................................................................&...............**..p...........n.d.............g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):4.6213104887740535
                                                            Encrypted:false
                                                            SSDEEP:768:0PB9TXYa1RFxRaayVadMRFyfqd9xZRta7Ea+5BVZUeaBhN1dJhlBlBJ9hFUKjSxw:wXY5nVYIyyqED5BVZUe7NrVnL3K9fYS
                                                            MD5:94CE283335713D796E068233C0D27233
                                                            SHA1:8B154CE1AEB28021DFE8B3FE78D322210537769A
                                                            SHA-256:619E945769B0AFB1D3097B0FD8D85539C20F3024E47A98CAAB23DCA2F089EE2E
                                                            SHA-512:5DAFBD530019133D08737F49D10DFF926CAD9D665588F800D18B6F3321FFB1EF7C7C2D61F0AD30C1084ECD2086D90E7099A7A9E0AADD3DC8AA047B51D75879B6
                                                            Malicious:false
                                                            Preview:ElfChnk.....................................x...X....#.N........................................................................................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................................y.......................**................9..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):100472
                                                            Entropy (8bit):2.3234118864973796
                                                            Encrypted:false
                                                            SSDEEP:384:XoxK9o+hdo69CcoTorNorWorbvorTorZorQorNor7orqorlGhorrqorrcoiorloF:tDCoKDCot/2y3h89GpnVD6fO
                                                            MD5:7D27AF07CDC3D079185E9E247AF3688B
                                                            SHA1:2B9967895E36A39C3A138993AF60B40035D66D33
                                                            SHA-256:0421D9092F2E7F7624B3C8920EEF5E8C032F6755B4FE5CADD7DDCFCBDF237ACD
                                                            SHA-512:D5529DF0D6447605ECE37D6BC661530345AA849CD5D52342BC355E7B32F5A8420B3DF91955FAED367C5667C53B2E6A026B3ABCC9A0069CD9A3AA9960E34E3998
                                                            Malicious:false
                                                            Preview:ElfChnk.....................................0-..`/..=^h.......................................................................a.................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................&........................................................................................*..............................**...............y..d3.........Z7;................................................................>.......V...X.!..e...............y..d3..g..TW.....TW.......|........................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.o.d.e.I.n.t.e.g.r.i.t.y..k.N.<.D..97d>7.M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.o.d.e.I.n.t.e.g.r.i.t.y./.O.p.e.r.a.t.i.o.n.a.l...!>..*......!>....[.U.....i...........|...:....A..3...b...%....=.......F.i.l.e.N.a.m.e.L.e.n.g.t.h.......A..3...b...%....=.......F.i.l.e.N
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:DIY-Thermocam raw data (Lepton 2.x), scale 8448-1024, spot sensor temperature 0.000000, unit celsius, color scheme 1, calibration: offset 0.000000, slope 206.521484
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):0.8818863793721268
                                                            Encrypted:false
                                                            SSDEEP:384:PhAiPA5PNPxPEPHPhPEPmPSPRP3PoP5PUZPDPBPrPTP:P2N7
                                                            MD5:ABC20FF1642044E1CCE03170FDE15383
                                                            SHA1:8FA47598A436BFAC1C60AA663BBA85ED65684EB3
                                                            SHA-256:335CB1E45B8A1EBDC3714F6744B8AA7332FD8A88C296A4FC03F300D1417CCE8D
                                                            SHA-512:262570D8EAB15F9A890B7FFC26B6E6D6615B2659120D7595D2E14A2DB9394EF043B475F1B00239C9E59577821EEC69441C5964D8250CAA7C623FAF497735E839
                                                            Malicious:false
                                                            Preview:ElfChnk......................................&.. (...........................................................................c..................N...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................................................................................'.......................**..x.............|..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):0.8732041818438444
                                                            Encrypted:false
                                                            SSDEEP:384:ihZ21JJgL4JJFiJJ+aeJJ+WBJJ+5vJJ+/UJJ+4fJJ+CwJJ+D2JJ+a2JJ+JtJJ+ly:iWXSYieD+tvgzmMvpgNNr/C
                                                            MD5:B693B4CC631594D7178A17D644604830
                                                            SHA1:010015CDCBAC9449FB75222B3ADAA84725A573E2
                                                            SHA-256:2AB6A0ED88C441E535930D7653055EFB046C8E0D20409B95E70F6203B05B770E
                                                            SHA-512:2625F3E08A6C17703CD43E2FE6FE6DC8B1096D4BCF3DE77DE75882E923AC278A0F24E21C43644A4909F21E2DF827CDF967C53ECA1D35D18BCAB453309C55546C
                                                            Malicious:false
                                                            Preview:ElfChnk......................................&...'..... .......................................................................................F...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&...................&...................................................................................................**..p............zu..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):67136
                                                            Entropy (8bit):3.2465016830681974
                                                            Encrypted:false
                                                            SSDEEP:384:dhFhUhqhSx4h/y4Rhph5h6hNh5hah/hrhbhmhjh/h7hkh8hbhMh9hYwhChwh8hR8:8bCyhLfI49L
                                                            MD5:116C6A0855F9E1E0CC8F3AE433597F2A
                                                            SHA1:1D2EF40CA92849FE9C2912EA6D711BCA738FBEF9
                                                            SHA-256:62C20B72A460475A40568ED095A7585CAEFD532C3531B4595FB7254163AECD65
                                                            SHA-512:532E972E249272DB9747A00298F4C065EEC19CF8FCB33F2B809D824789A2322BEEBBC430CAC70999F5C588D2DC93D6380C992812375963B878BAB76E2BDE6D91
                                                            Malicious:false
                                                            Preview:ElfChnk.........O...............O..................e.ym.....................................................................q..................6.......................^...=...........................................................................................................................f...............?...........................m...................M...F...........................&....................n..........n.......................................................................................**......N...........d3.........Z7;.n..............................................................<.......T.....!.....................d3..g..TW......TW...........N....................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.r.y.p.t.o.-.D.P.A.P.I.@.....NF.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.r.y.p.t.o.-.D.P.A.P.I./.O.p.e.r.a.t.i.o.n.a.l....0.............j.....m.[.H.*..w:..C.:.\.W.i.n.d.o.w.s.\.s.y.s.t.e.m.3.2.\.M.i.c.r.o.s.o.f.t.\.P.r.o.t.e.c.t.\.S.-.1.-.5.-.1.8.\.U.s.e.r.\....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):66528
                                                            Entropy (8bit):3.492784992459667
                                                            Encrypted:false
                                                            SSDEEP:768:dcMhFBuyKskZljdoKXjtT/r18rQXn8x3F4mLvgpaCm:uMhFBuV
                                                            MD5:4387002E5A19880A9A57BDB0D73F86F4
                                                            SHA1:AF1E1109777211BE0B4EC0637B1C5FCD0404E962
                                                            SHA-256:34403FFBDD36A74C246485FC944ED50E4649AB23BF75A7875FF227E37D93C103
                                                            SHA-512:A5403BA32B433F620A0C3597C5B80BE812897354DE4D662B9981852A25634B2D8D9A2DCD6CCC53E20381940C8BF5FBE7ECD4F47972BEEB468CBBB0E52B49E475
                                                            Malicious:false
                                                            Preview:ElfChnk.........S...............S...............p...u3.'....................................................................q..f................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............m...........................5A..........................................**......S.......v...d3.........Z7;................................................................>.......V...y.!.................v...d3..g..TW......TW...........S....................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.r.y.p.t.o.-.N.C.r.y.p.t........E..3...pM.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.r.y.p.t.o.-.N.C.r.y.p.t./.O.p.e.r.a.t.i.o.n.a.l....M.........F...........M.i.c.r.o.s.o.f.t. .P.l.a.t.f.o.r.m. .C.r.y.p.t.o. .P.r.o.v.i.d.e.r...0...l.s.a.s.s...e.x.e................ElfChnk.
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):4.792827407520075
                                                            Encrypted:false
                                                            SSDEEP:768:nVQ+uYvAzBCBao/F6Cf2SEqEhwaK41HZaYBnUm3iKLnn4eDB7:0Ht3iKLn
                                                            MD5:152A48624B4DFD0D038B4FA3623BA7E7
                                                            SHA1:5678AC8B8E8F29A58EA8D43EF57FFF9A6FDAEC28
                                                            SHA-256:C4F9B02538E32C9F8583CACBBFA7C43453C03CEFEE70EC5DEB0194E96197BF49
                                                            SHA-512:CB23A12137680CFD7B86FE67A4551D33CC727AE1F1EB5EB981D0DB7DB77F2F9A034AE08BEF109FFF080DC98467674369E675B06D768983E4BB15C819F3D4FE8E
                                                            Malicious:false
                                                            Preview:ElfChnk.........r...............r............... ............................................................................(.................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................................................%0......**..@...........WW. ..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):1.8858919329531718
                                                            Encrypted:false
                                                            SSDEEP:384:Nh1kbAP1gzkw3kN5Ayqk+HkzGk+hkV3SuckzlckA66k+4DkzRxk+dkzwUk+rkzDg:NMAP1Qa5AgfQQlke9a6
                                                            MD5:B66301CC0555CC995B4374B6FF0F39E5
                                                            SHA1:63D7895AAD4EA9BCDAF4D3BFB2911FBC3B316613
                                                            SHA-256:C056C5B1E6C58773FC9A75C46E8CC74E855A1620D21D2FF3D0AA34CEA380165C
                                                            SHA-512:5A40E2618146D20A0F89943A7155FF211302643CC0D70684CF86363E303D3887625366AF85D5B538C317E70DF3DE30193CE0CE5660FF52756CEF46AFFBBA11FB
                                                            Malicious:false
                                                            Preview:ElfChnk......................................]...`..*........................................................................c..................b...........................=...........................................................................................................................f...............?...........................m...................M...F................................................U..........&........................................&..............;...............................**..x...........HD................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):4.428876543896683
                                                            Encrypted:false
                                                            SSDEEP:384:vKhrEbExnEO4+EUEtEjEXE7LpEn7AEmxEsE27jE/iCESWQHEPEX5EwE2Ex7zEuEq:SfZRLvz75hyME8
                                                            MD5:3E00DDA6A4D097354A6D64995B6F5637
                                                            SHA1:37446C0346A6195D226249D251E7C8B5D9BA8EE9
                                                            SHA-256:47B00BC6744A8886BE9ADAFE8E7C95FF08511038E35F12C66B74643326A29582
                                                            SHA-512:1F2E1ABB9AFB705BA7E3C37B8A3DDB3EC180F83F2DBBD82C0AFA95EB37633057D9C5F4F0F76610CAC954FEACB1B7D6223B689A27628B3C69E1223CA216FB4AEC
                                                            Malicious:false
                                                            Preview:ElfChnk.p...............p....................... .....U.....................................................................w.%e................*.......................R...=...........................................................................................................................f...............?...........................m...................M...F...................................E....%......&............;...)...........-..e+.......'...1..................M...........m...........%>..M.......**......p.......Elr W..........Z7;&........Z7;..T.f.m`..L........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):3.462764563871168
                                                            Encrypted:false
                                                            SSDEEP:384:5hYCAKRuKIYKxkKiCKVIAK8sL4K5VKjPKwnKZ/K50K8/0KXAKuWKSlK+NK8t3Klc:51T4hImaVqA
                                                            MD5:90C7B97351EB8C1E5D63C95F98DA7DC2
                                                            SHA1:BCA659CC6F082891275AC1DE0DBCF11874239D97
                                                            SHA-256:6E033AC321438132DD42CEF1729149128602226619B68BACC8509AA2C3BF7959
                                                            SHA-512:E73206F70E009C1446EA7BA550901B9AF4F43CE0EBDA17DE514E3F55A65264490A24034BCEA90F88C9B0FE6FCED2CF9E970C85E969DB39C9374CF0A2F5AF8F9A
                                                            Malicious:false
                                                            Preview:ElfChnk.........s...............s...............P...............................................................................................V.......................T...=...........................................................................................................................f...............?...........................m...................M...F................................................|..........&.............................................................../.......................**............... .$..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):2.543522413880544
                                                            Encrypted:false
                                                            SSDEEP:384:AhFiDhKxDmqIDrfDYEDdDDDbDOD2DSD+DtDFDxDlDUDEDoDADeDuDx4DWDXDjDfk:AzSKEqsMuy6/ij
                                                            MD5:A7C99371DDFC5A4213129E4CACAFCBC1
                                                            SHA1:DD3ED05CE634AA129B7F1385424AFB489F50C66A
                                                            SHA-256:ED6442E39002736D07EE523A96024EB370A0E69A127E042D0EEA7C98F466831C
                                                            SHA-512:E6642A332446467BF9D5DF8FF402EDF4184CA26FC50D8D224FFBDF0504E8B0E750BCC6664E9AE3F84BBC1A9E8F945F3D77B8BAF8F3A2E4FD971FD6EEC6E1E4B2
                                                            Malicious:false
                                                            Preview:ElfChnk.........P...............P...............8...D......................................................................./..................2.......................Z...=...........................................................................................................................f...............?...........................m...................M...F...........................&....................`..................=...............................................................................**...............v?..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):2.24409357808026
                                                            Encrypted:false
                                                            SSDEEP:384:mhMLzI9ozTxzFEz3zLzWztCzizQzzz5zqfzDz5z1zkzSz9zEzWz+zQzqbzUTz3zS:mmw9g3LYx
                                                            MD5:3E92F94FE6AA3FDC475D1591EF7E2704
                                                            SHA1:B078DB603A5949847827FFD1EA107D357C22D6F8
                                                            SHA-256:FD11BA3444675A33C4263FEAFDC9DD37E8061968D02E9BB4800B7E22D123DEB9
                                                            SHA-512:A5362EB798F2F827B99F074F72D5B1208BDC89A23F152C85C3C8F9200B217F9F3E415A42B59D00D0DA765992DB085A9E47F63AC273404C95C914351150A8A4E8
                                                            Malicious:false
                                                            Preview:ElfChnk.........9...............9............t...v...4........................................................................x................J.......................r...=...........................................................................................................................f...............?...........................m...................M...F...........................&.......E............X..........n.......#...............................................................................**..............j...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):0.9546787598621266
                                                            Encrypted:false
                                                            SSDEEP:192:ssgV71IUKGGk4yb27x1IMb27kdI2dIeWIbTcc2eI5Tcc:8h1IUbGk4NIsIKINIDI
                                                            MD5:BA45982149D644A9243DF5BA6EB08A81
                                                            SHA1:6DD8A1A7503D8323B24669AE91EA9C1308E30B15
                                                            SHA-256:29302E33B11EBCBC0560A52847583AE37F2A2A72976A23F4AD71393E4FEBDBD4
                                                            SHA-512:E0F1B9B471A40FC848A124DD0261FBC66B82FF3D9CC0DD655C8A6E2D9FBEEF0B9E1070D424589D8C3A57E0976A62B00AFC5BDF8B716B9D05DA5BE97B7B698AB5
                                                            Malicious:false
                                                            Preview:ElfChnk.K.......P.......K.......P............S...j...N.(...................................................................../..................*.......................R...=...........................................................................................................................f...............?...........................m...................M...F...............................................&...................................................................................................**..x...K.......`~.%W..........Z7;&........Z7;..T.f.m`..L........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:MS Windows Vista Event Log, 14 chunks (no. 13 in use), next record no. 378, DIRTY
                                                            Category:dropped
                                                            Size (bytes):100608
                                                            Entropy (8bit):5.665078841554595
                                                            Encrypted:false
                                                            SSDEEP:384:3ahAa5DpzuzNz0zxzuewKWMKFNa5TUa5pa5Oa5HMa5W2KvzyzIz2a5jNa5Oa5OaN:K0QqW/ygJ91R0QqW/ygJ91r0Tw00
                                                            MD5:D2A30E484797E93C2E71175878E91AFA
                                                            SHA1:A3F47F9D4CF5F30E68447C204E1C7D2C6439B6DE
                                                            SHA-256:40435CE391AFDEC59DB5241F45DA582FD7C6C4BE96CDF3CBC2F1B8E04473F155
                                                            SHA-512:0E305177E67DF47982C2DF2410F61491A881DBB7624ED143F56435666866F45B3337F6E07EFD8A20DA08A8C00742EF102383C8AB274951C7318BEE7E2045317D
                                                            Malicious:false
                                                            Preview:ElfFile.................z...................................................................................................I,c5ElfChnk.q...............q...........................F..3....................................................................!.y................&.......................N...=...........................................................................................................................f...............?...........................m...................M...F...............................................&.......................................................................................)...q.......**......q.......%x.OU..........Z7;&........Z7;..T.f.m`..L........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):1.0906234381604036
                                                            Encrypted:false
                                                            SSDEEP:384:1h1hM7MpMEaMWFMu/Ma2M+AMmGM1cMNF3Mg9Ml7MABMczM0cMKhMOrMM/uMZeiMa:1eJw
                                                            MD5:C5FF06DD8BE524B616F8663522CECD8F
                                                            SHA1:C4103F0987D75AFE225436B8039C57F7CE40BDBA
                                                            SHA-256:BE9EA2824B5985A8CA71792C629FCBAD2FE3267613E560F55512E1439F8D89DC
                                                            SHA-512:2839A4B7356AA30DEA18794D81C10A81D4CB79C76380681EEBA6427D843DED6BB0A0B37AAA4AAF7715DE4C31DA9D30DFC1CF70F662E83B29CE8DC24EF1522DB3
                                                            Malicious:false
                                                            Preview:ElfChnk.....................................X0...1...p{{....................................................................s.\.........................................>...=...........................................................................................................................f...............?...........................m...................M...F...........................&...................6(..................................................................................................**..............c...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):4.3544648067172504
                                                            Encrypted:false
                                                            SSDEEP:384:chz1g1z1f1m51F1Z191f181L1tY1VGm1Q1L1p1VG1U1Z1s1VA141c1Vc1q1tS10r:c2jdjP0cs5uP/ub
                                                            MD5:5E01D7C4731FBE5625EEC0680D1037F1
                                                            SHA1:F5889D115B9E5869538E908EFFD8B28A0BB72462
                                                            SHA-256:73D8518E4715F852C806A157EAD1506A36AABF4BDE478DCEFF96A84D81E27AE6
                                                            SHA-512:1FC15D0D1B817E648209CC72E14EDBFCBC8CC827C70DAE75D8C8A5465927BDBD6142D73F203F3240D259F38A2451E555D763D07BA10F5CA47B200733AD37CC1C
                                                            Malicious:false
                                                            Preview:ElfChnk.....................................(.........O.......................................................................................6.......................^...=...........................................................................................................................f...............?...........................m...................M...F...............................................&...........................................I.......................................................**.................WW..........Z7;&........Z7;..T.f.m`..L........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):82528
                                                            Entropy (8bit):3.4362312687169356
                                                            Encrypted:false
                                                            SSDEEP:384:x4IA73IyI0hIIIlIbIWIKRGINZIoxII5IMII9I4IaIaIsIavVCI5IhIYzhDIEQAd:x+9XV6zZxGq00f9XV
                                                            MD5:37A90AA3362520791E16B75BC7EE675B
                                                            SHA1:DDA4CCE21C873AE963331E5B6E90EB521C1FEAF3
                                                            SHA-256:65747D661CCF9720B568DC21A847940EA83F66E1576848DCB160764A084F278E
                                                            SHA-512:70FA9BD9DA35F258B63096CFBB6871EA803651B4B5C86D508883E8BDD3EC7017FFDE8D891141F40EDFE48B59DB3A249C1BDD7CB85C604C201393A5092225C45F
                                                            Malicious:false
                                                            Preview:ElfChnk.T...............T...................h.......E........................................................................m.........................................>...=...........................................................................................................................f...............?...........................m...................M...F................................................(..........as..................1..................................................................**......z...........d3.........Z7;.(..............................................................,.......D.....!........... ....@....d3..g..TW......TW.......d...z....................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.N.t.f.s..z.?..nM.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.N.t.f.s./.O.p.e.r.a.t.i.o.n.a.l.......as..&.......6p.\.#i....>..........2........A..=...>.../....=.......V.o.l.u.m.e.C.o.r.r.e.l.a.t.i.o.n.I.d.......A..7...>...)....=.......V.o.l.u.m.e.N.a.m.e.L.e.n.g.t.h....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):0.8285527879711732
                                                            Encrypted:false
                                                            SSDEEP:384:G2h6iIvcImIvITIQIoIoI3IEIMIoIBIbIlMI2I5IEFIzI5I:G2oxOT
                                                            MD5:B980C446A2A107517F87CF34ADC83DD9
                                                            SHA1:ECCBF6BD7A62E3914DA365893A1AA6D8DDD920CD
                                                            SHA-256:CB0BF585620C448F0695AC37A7FFF2A358AED302660B31901C2D060921721FFB
                                                            SHA-512:B2732AFC5D98033D990944E61930C3EA57D2ACFEE4A802476721665D7711FA2E9FEDCD7647917FE95AE03CDDC5DD927FA55F08F35CDEFA62EDC7CFD3C7FB5A39
                                                            Malicious:false
                                                            Preview:ElfChnk......................................#...$...>......................................................................V.=.............................................=...........................................................................................................................f...............?...........................m...................M...F...........................&...................^...................................................................................................**..............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):3.1037290630380294
                                                            Encrypted:false
                                                            SSDEEP:768:n4u1n8zfFFU1x4Dk13xIb13xIb13xIt13xIi13xI513xIU13xI013xIF13xIH13K:d
                                                            MD5:7C3D15939EC70328CB06DAA08EA22573
                                                            SHA1:BDA43799C74C483842C457E23EAAD47A136C976C
                                                            SHA-256:5CA7B9E56E9708ED4F32F7C0BF086BF107C4A8AE7DBCE974FEB8AF9501D23902
                                                            SHA-512:7875BC899CCEC1F62AD34E73A9F61D588BD6A98C2F768FB01FF1865B272FD8337DC15E6B5B18DB9B11DF565C543E2F329A784F73C3CF333B0F526E9F47021A58
                                                            Malicious:false
                                                            Preview:ElfChnk.....................................@...P...J.{P......................................................................q.................(.......................P...=...........................................................................................................................f...............?...........................m...................M...F...........................&................................ ......................................................................................**...............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:dBase III DBT, next free block index 1130785861, 1st item "**"
                                                            Category:dropped
                                                            Size (bytes):68624
                                                            Entropy (8bit):3.799626971198427
                                                            Encrypted:false
                                                            SSDEEP:768:KUFutDBjV8kau7eUtHpoVWWFcRkpHrWbGyYKQc90X+07SZRcZv76NcRUjGHzLKv9:LutDBjV8kau7PtHpoVW
                                                            MD5:42F7FC202DC75D6F3C56CE18F533583B
                                                            SHA1:7570FFAABB5893444888C99379E1EB5FBD32F4C5
                                                            SHA-256:D1F150CEC1124CD906D92D388DA317A6258679C857B4FD56C03D00DE76B8844E
                                                            SHA-512:E45746174245A596C81BF24C5681FEA7A5D37C9DCAF8D93B78CEB1C82604830921299E8491C5027660DED27AC86E16F6A9EB7454B212F89A6835932820FFB42E
                                                            Malicious:false
                                                            Preview:ElfChnk.................Q.......S....................Y..........................................................................................6...........................=...........................................................................................................................f...............?...........................m...................M...F...............................................&...................................................................................................**..`...Q........r..d3.........Z7;&........Z7;..T.f.m`..L........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:modified
                                                            Size (bytes):100496
                                                            Entropy (8bit):5.027607808345225
                                                            Encrypted:false
                                                            SSDEEP:768:ke9rIQrdwfQKRLc/RmA3gn3h6/AmFC+DYLxVw:lrAc/4AwRMA4C+sLxVw
                                                            MD5:05364B0B9337FF95808C430DC30AF570
                                                            SHA1:6E3FD252254ED028FD7DEB9CCB914A9650533599
                                                            SHA-256:7BD0E8AD4D119227B98B8E82F98FFEFB2F44F4FA588849CF016DC49DEA4B8EBC
                                                            SHA-512:A758C1FA7391B692E3045224E5BBAD17437C3C9FBF7FF35D433B6299E37F90AFEDCD61E5C4DF594A4A206FBB37EAB85ACAC149D4D9446ED922EBF993E224C695
                                                            Malicious:false
                                                            Preview:ElfChnk.:.......=.......:.......=.....................A.......................................................................................d...........................=...........................................................................................................................f...............?...........................m...................M...F...............................................&...................................................................=...............................**......:........o.e3.........Z7;&........Z7;..T.f.m`..L........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):0.7906584955348045
                                                            Encrypted:false
                                                            SSDEEP:384:MhP8o8Z85848V8M8g8D8R8E8y8JB8M848r898:MN
                                                            MD5:4581429C5AA67A59E35288D5B0B55942
                                                            SHA1:F0B9983D5700F829CBB975F501FBA322F5522593
                                                            SHA-256:DEDCEFB3F18D3B36D8D27631F4DF73637937BF907FB1EB891CCEA1C14C19F44D
                                                            SHA-512:96E95B4DA3F900B38F6B53121AA9C142B85242F3C287233D93B191CE08C1E89280FAAA52A6EEFFE0E04ED282CD6374AF8286E2C905004C651AAC78FFEAEF7E19
                                                            Malicious:false
                                                            Preview:ElfChnk.....................................8!..."..V.1.....................................................................8..Z........................................V...=...........................................................................................................................f...............?...........................m...................M...F...............................................v...........&.......................................................................................**..(.............................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):3.766812344360369
                                                            Encrypted:false
                                                            SSDEEP:1536:fXhIUyS+z1VV18o838c8bUc8cVVsz8VX8SoX8aA8cmtpjAiVB18dwE4vjcYoMjn1:fXanS
                                                            MD5:63C1ECFCCC5E415817C4D1B162A51207
                                                            SHA1:579474A30B7B1A06982D96212C4D450F423FC181
                                                            SHA-256:C077D19248E142503FB02D771A1187FFE24B7FFBBF53B9DD42FEE57C0308A622
                                                            SHA-512:4932D83B7BF836906224D5F3572D239B4C38E021D2FC915FB6D53FCD4B9F281DA47B2C001FC7100A5A82E6F8589365D104CD30EA6C5F1EB2259AE665E2B000F4
                                                            Malicious:false
                                                            Preview:ElfChnk.........(...............(............J..xL..c4.#........................................................................................v...........................=...........................................................................................................................f...............?...........................m...................M...F................................................9..........&...............................................................O.......................**..............g5...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):2.551634567387031
                                                            Encrypted:false
                                                            SSDEEP:768:L0VsLY/Z5aFka2aKazzabCafama5Sa0ra6rzaJcavkao9O6aGyRvF5UN5325Oi5Z:RcEN
                                                            MD5:9FE9303D437AE64AE7D6F84406623E46
                                                            SHA1:A7CE105D08F7A28F815B5BF171B3EDEB56E5CFF5
                                                            SHA-256:81E629C26EF40A78C5E60E749498BE53744A0D618273BE5AF3DA048009D7345C
                                                            SHA-512:F08582C238A2B6E2257F16B30DB0D407980129438D57099E92CA9FDE99A55B84B814FBDEC73A164B4A5BB792906AE2C5C88E63FA71FBDA472276B3CAE68C4CC9
                                                            Malicious:false
                                                            Preview:ElfChnk.........C...............C...................<b......................................................................-..s................Q...........................=...........................................................a...............................................................f...............?...2...........................................M...F...........................*...........&........b..................................................%_..........................]...................**.............._.............X..&.......X...],T.'tB..E........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):1912
                                                            Entropy (8bit):3.5999672418334248
                                                            Encrypted:false
                                                            SSDEEP:48:MSWR7CKOrCK3QKB69Dkn9OCKOrCK3QkkcqrFn1:m7CKOrCKg669Dkn9OCKOrCKgkkcGF1
                                                            MD5:3A240DD15354C5DA8184823C36AED024
                                                            SHA1:75C73AFFBE5C763C4F8CD809740DBCCDEDE98127
                                                            SHA-256:3354EA45B1CBF14FD326983C62CC33F783A0B3D49369ACDAFECCAF7DB78AF6A7
                                                            SHA-512:969D7AD359DABDF0E973755E2B3055AD660F1E8E2F499CCDA0A4D6286E2401FF285D177754C57A9A6B2022E90CCECD8869045D436CFE2010E1DBD725143391A1
                                                            Malicious:false
                                                            Preview:ElfChnk.'.......8.......'.......8...........pv..`y..8..........................................................................................\...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................5...&...................................................................................................**......7...........e3.........Z7;&...............................................................L.......b.....!.....................e3..g..TW...+.TW...d.......7....................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.e.c.u.r.i.t.y.-.M.i.t.i.g.a.t.i.o.n.s........J...M..<.M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.e.c.u.r.i.t.y.-.M.i.t.i.g.a.t.i.o.n.s./.K.e.r.n.e.l.M.o.d.e...!..^5...........h.......>...................................4.\.D.e.v.i.c.e.\.H.a.r.d.d.i.s.k.V.o.l.u.m.e.3.\.W.i
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):4.327219596727842
                                                            Encrypted:false
                                                            SSDEEP:384:Npa/hDGCyCkCzCRCFC0CPCqiCEBCzMCy2zCoFC9CKCPCryCaC6CyCU2sF2s2EY2L:Npa/dUwmgU
                                                            MD5:39BDE2B4C029E5F2BC6FA244100ED55C
                                                            SHA1:EE71625A1DDB5D57B606677AB384B794C2F76741
                                                            SHA-256:DACAB8704BF60ED925B8F231A45A4F5A1CA9C87DED892940B518EACA1CDEE266
                                                            SHA-512:909A4CE0385AD7D2936C2F73E69F20DFC438304778826AAAE9CEC176E1E10900557A6621608F7CA782CF5B098B98E195AAC432739F81112B12DEF9C0547BD50C
                                                            Malicious:false
                                                            Preview:ElfChnk.U...............U...........................y.6R....................................................................?...................F.......................n...=...........................................................................................................................f...............?...........................m...................M...F............................H..................f,..........&................................................x..............is......................**..0...U.........Df..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):4.4645121501987095
                                                            Encrypted:false
                                                            SSDEEP:1536:PrGJSsWdeBDBvwdvx8j00lDL0MBqQtcgVSyCV78AhurLyt2Q4eW+WzpzXepPvMog:PrGJSsWdeBDBvwdvx8j00lDL0MBqQtcU
                                                            MD5:AF6B3AF3FEB5952B5CFA4A79A418228D
                                                            SHA1:56B7AED9FC54B88B43EDEBBF35599F58610D3488
                                                            SHA-256:4C33B557190EB5E003E3537736BEC0EB3B39A6435797B3B2E0B0440F25283A3A
                                                            SHA-512:52F7304D50D66DDCF4B936F1089E8A6A56E5BD67037F6991D70A3DF6161C23F7A9D9954648CD4688EAA96ED45D4310822CB3107389B89244E9BC45340A90C98A
                                                            Malicious:false
                                                            Preview:ElfChnk......................................d..hf..........................................................................H.".................6.......................^...=...........................................................................................................................f...............?...........................m...................M...F...............................................&...................................................................................................**................G.S..........Z7;&........Z7;..T.f.m`..L........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):70808
                                                            Entropy (8bit):4.452267081981958
                                                            Encrypted:false
                                                            SSDEEP:1536:I4qtXpOHrPBOYM9QuTOc99zPb+zEbINH90Z5kLnOE8EGmwAOXKbGKszQW3XnT04G:I4qtZOHrPBOYM9QuTOc99zPb+zEbINd1
                                                            MD5:2F2A5A95B9E4B57A5004CFED29EB7768
                                                            SHA1:4A7EE3BE743BF0C4E33A3FB677661116A5C50995
                                                            SHA-256:1F79A5D536B269BE3DB897717A7495DF9C642B896ECB54ABAA19C21F3067995D
                                                            SHA-512:9E134423705E8647D18D5AE0722133DD65693A22C00896988187822B88D372C1D32DAF991EA40856901E6DB5BFCE48F5C19ED9835B17BBE983C2CC55A17558A3
                                                            Malicious:false
                                                            Preview:ElfChnk.....................................X.......%q......................................................................JMi................6.......................^...=...........................................................................................................................f...............?...........................m...................M...F........................................................................................................i..........A....g..1c...............k......**..x...........ov..d3.........Z7;&...............................................................8.......P.....!....nqm......... ov..d3..$.....E@.#<.....................................$.N......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.h.e.l.l.-.C.o.r.e..n30'.|D..Q.R.a.M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.S.h.e.l.l.-.C.o.r.e./.O.p.e.r.a.t.i.o.n.a.l......L1c.............x...**..(...............d3.........Z7;&...............................................................8.......P.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):2.4123466903622734
                                                            Encrypted:false
                                                            SSDEEP:384:vhZ7o7c7r7t7Q7A767/7U7r7W7A777kJ7q747i7T7L7H7P7p7c7/7v7E7iw7p7O6:v
                                                            MD5:788B6B13BF6B1506C42A647C90C608FB
                                                            SHA1:83A1DF28AAA9431F8BA98910622AB433633D5269
                                                            SHA-256:E544869EE0C5829D15D7BFAF95679A6FF09D069B2752870866479980D4DECE5B
                                                            SHA-512:6EE60DEE5B9E36106D7A654D241BC8CE2C84FC5DC663C43E270207EB84E4A6419BE19E00CBC6B530A7760F297BC56466619F5F6D17D9D7B8578CA937D3AD044A
                                                            Malicious:false
                                                            Preview:ElfChnk.....................................Ps.. u...^......................................................................]bJ............................................=...........................................................................................................................f...............?...........................m...................M...F............................6...............1..k............................................................................4......................**..............|.FzT..........Z7;&........Z7;..T.f.m`..L........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):2.3479804318728847
                                                            Encrypted:false
                                                            SSDEEP:384:Ghc+uaNuru+uhuKVuPJu5u9u4ufuTuxuDuvuDuOuXumui+udutui4uTAuFuauinw:G6Ovc0S5UyEeDgLcxq3gYi3
                                                            MD5:20ABEDB128E5E464C3ADEDAFDD33AABD
                                                            SHA1:008B5B5722E9F1C1FC3659745636DA9AC4BF3246
                                                            SHA-256:E910DB6310307CE0E3D9AF315BB11B5118C3C82E2077D23CBB5204E604404D5F
                                                            SHA-512:8710B94D7EA052FED9E34AAD859242ECAA44D2A21E7C4B8B3CE5BB0A38187D4F155981802A7EB34A931002BC9B841821EA4100F779EFAB52A9D95C69453352EC
                                                            Malicious:false
                                                            Preview:ElfChnk.........B...............B............v...x..........................................................................:m\.................,.......................T...=...........................................................................................................................f...............?...........................m...................M...F...........................&...................6^..................................................................w...............................**...............&3..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):0.8478731703315486
                                                            Encrypted:false
                                                            SSDEEP:384:chGuZumutu4uEu5uOuDuyb2uPu1uxuMDpu++uwKuDou13u:cO
                                                            MD5:59AB0335EB19F6DD54860AACB86FD9CB
                                                            SHA1:3E8217D9EE7123F81F7C87F00C27CFD908350941
                                                            SHA-256:98E01AC5F79731DBD6E6ED4F39DDFA1A61F4D84E06BCDE28EFEB53D2CA949BEB
                                                            SHA-512:A1B8B98385ACE44DD5B0F9314B7B647609CE122081BD3B06FB66F0BDB0C0970BFA7D8FA87C73AB2586716AEEA2DF7D209D716A094217FF6F93F1DDFF89243AAE
                                                            Malicious:false
                                                            Preview:ElfChnk......................................$...&..6.5......................................................................./.................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F...............................................>...........&.......................................................................................**..............Wy.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):4.2240351571410395
                                                            Encrypted:false
                                                            SSDEEP:384:5hHAxA+AAVA3A0Al9ABtuAbuAbhAbxAboAb5TAbZAbPAU2AWAEAbAJAOhbArnAVT:5uG1mDNqd1ZjCRpazcYu2t
                                                            MD5:38BC36F8F4362404E333E07569271DD3
                                                            SHA1:A10D1ED540B714D7DEE9300C094DB58B0F4AD018
                                                            SHA-256:A7B49B3228A919E34A01B00F9C71958A4391F9FC94EDB3BCA46088A94AA99D59
                                                            SHA-512:2F730C5EE594ECF1B0F8E545940AA18E801E61F17CFBD44D8C99C6ADD80E5C29944F679439A7A9B9E855BBD6295A4F20D5B8BB638505E2F9CE660DF919B23019
                                                            Malicious:false
                                                            Preview:ElfChnk.........................................(...a.GR....................................................................LY..................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................Um..................&...m\...........................................S..........................................]W......**..................U..........Z7;&........Z7;..T.f.m`..L........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):3.769029143659816
                                                            Encrypted:false
                                                            SSDEEP:384:4hnpg2TpJGpJfpJA3pJ9pJupJjpJkpJRpJapJfpJa5xpJxpJj+1pJQpJtpJAhpJT:45j5D+zAC
                                                            MD5:20577B58222FB7BDEFC1300B21345286
                                                            SHA1:AC97F48ACFF0FC27E1DA3A55C0322A9DF9ECB08A
                                                            SHA-256:CDAC346E2CA13A1D8DE813E3574AD476A4071E25B8B4F919EBB24B38A0EF0C3A
                                                            SHA-512:76B832469C31EE2EB6FCD6A5B96828BA84DA2FDEBC972E5C42092D71B61F932F0EB200F5B63BC1B41CA9E86536CFC7269FA909E90FB7899A206E3CD4F4DB15B1
                                                            Malicious:false
                                                            Preview:ElfChnk.7.......D.......7.......D............9...=...T.^................................................................................................................@...=...........................................................................................................................f...............?...........................m...................M...F...............................................&...................................................................................................**......7........qTUW..........Z7;&........Z7;..T.f.m`..L........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):4.2293376553515465
                                                            Encrypted:false
                                                            SSDEEP:384:ZhtbpwV1pIvpLfpvQpw2pQYph15pcApLqBpJxTp0qo8psfp4yp4Rphe3p7PpLWBe:ZwDoh1VLHUO2hER7Mkf2q
                                                            MD5:310A53947288CB6B830E117FED6CB431
                                                            SHA1:9EF3CE4C8CF1C83613ADED2DFDEC20E886E9CA6D
                                                            SHA-256:86C884F9E1E28CD0BE2F4B68DD247C8C76F9A2AA83EBD46A9B1380AF053A3D7F
                                                            SHA-512:31F063C868A22CE873B40E3FC62661EACF67A5C0B40DD22412CF64924E7CA29CDF44317F5C8CD30524A5AD595531ACF71133943DDA072D81C07FEB62D0204521
                                                            Malicious:false
                                                            Preview:ElfChnk.\...............\............................N..........................................................................................*.......................R...=...........................................................................................................................f...............?...........................m...................M...F............................................;..^...........&...................................i...................................mS..............**..8...\........=..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):1.2061151937932604
                                                            Encrypted:false
                                                            SSDEEP:384:YhwCCRzCaCkClCzCYC/CyCVCGCMCvC3CcvCCC7CaCqCEC:YKFz
                                                            MD5:70E70D2CB97D613C0C3E1EA1D74EAA92
                                                            SHA1:73F3C23087DB31711E0851550188FDDD6F11B59A
                                                            SHA-256:CCDF6F2CA947C96970A0B63EEC1F8CCD753549B2FC6CED8E0C0AB54BEE2AE027
                                                            SHA-512:F1900F302272A5319682D7E4B3AA8911DE337EB4059FEB97FB5DD4E25078CB961DEB49C8FF273C82693C3B5867FD9247ED3F2D22AAB5F9F9361BF0CC4004523C
                                                            Malicious:false
                                                            Preview:ElfChnk.....................................h6...8..3..........................................................................................V.......................~...=...........................................................................................................................f...............?...........................m...................M...F...........................&...................v)............................................................................................../...**..p............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):112776
                                                            Entropy (8bit):4.6668032712348975
                                                            Encrypted:false
                                                            SSDEEP:384:0hoMAcMSmM+MEMwMSVMfM0MtMXjM2MoMVxMWMlMvM6bM+MD5MSLAyEMSMpMyhoMx:0WKAyNWKAydsAyIfythK+AyqAyeWKAyA
                                                            MD5:B33C80CA37EF53B693AF2F6147210F86
                                                            SHA1:F7BC6CD3B078DE8FE275A11854A7283196C3750B
                                                            SHA-256:947A801DC9E623764CE7D73516CFABD7FC37F23979AD6D72E61A4ECBAD3124FA
                                                            SHA-512:F59F8FE6141F620F8913F6D44D47851A870A742285B1D3A0EEC7E288AE25AFFD7A329EFE2B8A2D066F102FBCC53F36D3ED19D9441C7F7AC5DEB96B802723B169
                                                            Malicious:false
                                                            Preview:ElfChnk.."......."......."......."..........`H...J..o.\'.....................................................................c*<................".......................J...=...........................................................................................................................f...............?...........................m...................M...F...............................................&...................................................................................................**......."......N.0.d3.........Z7;&........Z7;..T.f.m`..L........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):1.2305573051374772
                                                            Encrypted:false
                                                            SSDEEP:384:phL6UsE0ZUmxUmgDUmSUmKUmgUmlUmB8UmCUmeUmfPUmD+UmxUmBUmxUm:pY7LM
                                                            MD5:38DDC0D6E2F296743CF4A3E22830F8ED
                                                            SHA1:FAA40792E1A6F8AD8CD1EC6EC61E9C0232C20D11
                                                            SHA-256:886F12875E0B1F98D5A61C42D96B95F0F8C992DC0F77E428B0CED2CC030913D2
                                                            SHA-512:41C548C0D81C02855C71ACCDDCD8B75232459A5C405B94FAA7743495B142F9D1B7F10A7D2F47DB8845E1A5B4987D71BD4728A62B02CE14C248804460C2D32369
                                                            Malicious:false
                                                            Preview:ElfChnk.....................................04...6..lGz\.....................................................................@.................. .......................H...=...........................................................................................................................f...............?...........................m...................M...F...........................&....................*..................................................................................................**..............a...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):67784
                                                            Entropy (8bit):0.36796488824563184
                                                            Encrypted:false
                                                            SSDEEP:96:q4TBUNVaO87oHx/6aNH4TBUNVaO87oHx/6a:qCgV7LxiaNHCgV7Lxia
                                                            MD5:2E6E2A34AFF7B2217D8A098CBA4A5518
                                                            SHA1:0FA3FB9BF99BE4E8C31667A7E8E24AC29D42BA2A
                                                            SHA-256:705282D9C032DFEB3A6FE5AA20F6BED5121E820FB672C684322BBA8E721D9035
                                                            SHA-512:7E95DFF6022C67F504B1249D5C0E0F4F11369E77D9BBD60322AB4E3ED35B9B2F6C402E65E29EC9A32DA187839FAABBF9000624F78EDDC176467146D3A1462BB2
                                                            Malicious:false
                                                            Preview:ElfChnk..............................................I..........................................................................................&.......................N...=...........................................................................................................................f...............?...........................m...................M...F...............................................&...................................................................................................**...............>..W..........Z7;&........Z7;..T.f.m`..L........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):4.081454356890361
                                                            Encrypted:false
                                                            SSDEEP:384:OhMiv9i6ri+Hi7EibniWihKixiTijKiFi5iuiUioifiN8ixiEixihiliYi9niO8t:OfNa/xQM9QSp
                                                            MD5:F38DD63F1596D1039571A5D80A147980
                                                            SHA1:278553D5556ACBAF4E671C41F9A930CA0D253F11
                                                            SHA-256:5AC3EDCEBF4CC25A645D62044E94FD695452E12A72D3500D98898E3F766C4875
                                                            SHA-512:F6CE9DDF2D6888FB2DBB4C17544E632D8D5057B3C96577F70AD6F3B8EEA84274BFE092D94A0F3D2965DAD553209652AB5A28778C88DF9FDB5A8FA3E7D1EC8FFC
                                                            Malicious:false
                                                            Preview:ElfChnk.y...............y...................hv...x............................................................................?i................F....#......................=.......................#....................%..................N#...................................%......................f...............?.......................P.......................M...F...............................................v0..I%......v.......................................................................D...............**......y...........S...........g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):3.3997811013158903
                                                            Encrypted:false
                                                            SSDEEP:768:73aonqagagaAaEa8aka8a0agaIakaYa4acasaEa4akaMaUaEaIaUawakaEaAaUar:/n
                                                            MD5:C8E6C53F151CF7B2E1ECCEEF43F518EB
                                                            SHA1:6BAB71A3AC8228576F2396A21B7C895C68E074D2
                                                            SHA-256:D2707C65485CE51CC921FA1C867C5F53E9CAE2C11D526F8BC55F982D164596B6
                                                            SHA-512:B41B802EBBF94D84D897D0CD72B155ABFF0C1557E73281BA1CEA43CFC4B03DE522E8BC365A893FC3F390CBA3B76DFFE4B8EE49206D3270B8E21E0C75B5562DF3
                                                            Malicious:false
                                                            Preview:ElfChnk.........@...............@...............h....|.,......................................................................1u................f...........................=...........................................................................................................................f...............?...........................m...................M...F...............................................&...............................................................?...................................**..P...........XL.W..........Z7;&........Z7;..T.f.m`..L........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):1.4147866220767469
                                                            Encrypted:false
                                                            SSDEEP:384:XhaXJb4+XJcXJsXJrXJQXJIXJdXJkXJuXJyXJLMXJ3XJpyXJGXJQXJyXJbXJHXJZ:XQ0yUkNYwD8imLEJpmaYm9ZZ
                                                            MD5:5AC69472258A06CCE6D64B90D882DD98
                                                            SHA1:FE3AFF211337BBEDDF9E188F419495EDEED10F2D
                                                            SHA-256:4E1ABC12F4354A38FB1B34228498C106713E751D06F206EFE76B1013DE3B09BD
                                                            SHA-512:EC964437F5B9D0D3AB7CD4EB59C9B1215D22C244099C5F3EEFCB18F4B1F0EDC47FD38D3D83F0306136699C498BBBE3FE9C4489E976A7573DFE3E7427A5123A1E
                                                            Malicious:false
                                                            Preview:ElfChnk......................................D...G...6.m.....................................................................>.................j...........................=...........................................................................................................................f...............?...........................m...................M...F................................................0..........&...........................................................C...........................**..............@V.$..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):4.335502462229597
                                                            Encrypted:false
                                                            SSDEEP:384:rhjmrmvm3BmOmbmLmomtmImj5pmHm5mxEmtPmoGmNlmmmCmZmLJmAkm2rmqimtmU:rGX5XDcxXaPv
                                                            MD5:55C2C83DABDC93F6135C1875602E337D
                                                            SHA1:3E825BFC09D43C9310193ED95D28BCC2C3E157CA
                                                            SHA-256:587414170FCD20D1ED1BE71F5FB4D39CD2AA9169F694B51997866F7F20023E18
                                                            SHA-512:3660BE713BF840ACF9D2B3E3C621D08B27B0A24E836A787351B777E6052E75BF1FE275C2A543A31C338E03B121D067C206E8D5C64320DB4C917D2E6EC443199F
                                                            Malicious:false
                                                            Preview:ElfChnk......................................6..H8..9........................................................................1z................P.......................x...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................3...........).......................................................**..x...........%...U..........Z7;&........Z7;..T.f.m`..L........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):4.343747536559921
                                                            Encrypted:false
                                                            SSDEEP:384:Yho27s2m2C2i2g2Q2l2Q2A2g2jl2l2E2k28242A2g2U202Q2G2e2O2n2r2X272XF:Yf0mbm
                                                            MD5:90EA562392E0A34BDD8BF8CED995478A
                                                            SHA1:A8DB3CEB353E018652470C5D146FBB99755644E8
                                                            SHA-256:1394D5A46782AED86CB80F8C9C66D05852229CD03138AD825D855AF3365DECFC
                                                            SHA-512:6A9F396A0FA4B52589CE8557BCCCDB77DA5236E2FF47A697F3833FCEA2A1AAE7E75AF1E0E05E8E92F5BB0E26D906C51810C2AB0726C16F1D5C85278C3FC57DE4
                                                            Malicious:false
                                                            Preview:ElfChnk......................................*...,..i.......................................................................[v..................R.......................z...=...........................................................................................................................f...............?...........................m...................M...F...............................+...............&...................................................................................................**...............b..U..........Z7;&........Z7;..T.f.m`..L........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):125536
                                                            Entropy (8bit):4.116412655201922
                                                            Encrypted:false
                                                            SSDEEP:384:1uRmRvKh8R+uRqRERNRiRcRTRRR8RiRDRhRuNRBRCR8R0RCtRgRQRNRTRrRMRhqX:QZtZR
                                                            MD5:BB367E158AA1585F71292796EEC0B44D
                                                            SHA1:7FF1DEA7583634C8F9B097CF7191CBF81E3AC6C1
                                                            SHA-256:A16AE13B86F2185B89A19E37422455C1C6E30E031264B09581AFD690E1CA480D
                                                            SHA-512:FEAB28F2085B39DD3A1537730EE7F7A484914B4F2E405E7367367F8EC6A21D0E342EF2662FAA75AE23D1055B685EFE9688D773CDD964186562E7718C4FEB0A4C
                                                            Malicious:false
                                                            Preview:ElfChnk.D.......x.......D.......x...................c.m.................................................................................................... ..............=..........................................3......................+...........................*...............W.......@...f...`.......4...?......................................E.......M...F...............................................&...................................................................................................**......w......../L.d3........w..b&...............................................................<.......T...-.!................@./L.d3........ O.sK..3........w....................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.W.M.I.-.A.c.t.i.v.i.t.y.......#F.~.J.{..M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.W.M.I.-.A.c.t.i.v.i.t.y./.O.p.e.r.a.t.i.o.n.a.l..............*...................P.r.o.t.e.c.t.i.o.n.M.a.n.a.g.e.m.e.n.t.......w.m.i.p.r.v.s.e...e.x.e.......".%.P.r.o.g.r.a.m.D.a.t.a.%.\.M.i.c
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):4.248562733326363
                                                            Encrypted:false
                                                            SSDEEP:384:ThThquhVh3hfhMhohghrhwhAhS5hqhShmh0hohRhNIh1BwhohGh5h3hShChWhzhM:T80FFpkBQL1
                                                            MD5:3B202E0452EBFB9892AEB5D31B114EF9
                                                            SHA1:EB516634D8C4E4BC3A1BFF0529DE8084B8C97415
                                                            SHA-256:02D362B03A9A229E86546E073260C9F77BBF79142552E0EBE994A4B5EDF1729F
                                                            SHA-512:D1B13B90844FFF51F84A84E517DF3B990ED12E13AA375B32A94333059DFAC4D72A309ED3EC830A348AA0011C2FEEEEAD5D4C9CFF6C17A2A7FBDD0B0F8CFC4D0A
                                                            Malicious:false
                                                            Preview:ElfChnk.....................................8!..."......................................................................................................................l...=...........................................................................................................................f...............?...........................m...................M...F...........................................a...&...................................................................................9...............**..@...........O. W..........Z7;&........Z7;..T.f.m`..L........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):1.3101945749546235
                                                            Encrypted:false
                                                            SSDEEP:384:GhOVPiVcVCVC7VNVtVEV3Vob7V5VXVmVbVoV/VEVptVtVBVnVOVAViVhcVSVsVX6:GyjbP
                                                            MD5:FFD7548AA8B73513E37AC74F7FC499B7
                                                            SHA1:7BAF52151B91BDFA56D12285A88E0AF2BBDA1AD0
                                                            SHA-256:418A17FEDA3FCB510EBA4F33A7D7ADDF1DC4FF23E09460BA2E41D92E01393F31
                                                            SHA-512:A4BDC043871F8BFC002912A12FB7453CB0EB451F6D35DCE88726B45805F69E0C08999AA83F569826E30520B17935F372D283E94261D0B284850FE8A07618E3D0
                                                            Malicious:false
                                                            Preview:ElfChnk.........$...............$...........(;...<.....R....................................................................$A.g................&...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&...................&*..........v.......................................................................................**..P...........y................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):4.303395614912883
                                                            Encrypted:false
                                                            SSDEEP:384:ghxBwBuBwBOXBwByXyBwB6BwBLBwB6BwB6BwBEBwB01BwBfw/D7BwBL/iBwBfCbs:gvuCbCPDMgBWuh
                                                            MD5:DBBEB8F44F26B7E23652347B0F91BBBF
                                                            SHA1:1042EC373336F7B311053A4CEB09071512108B56
                                                            SHA-256:70AC343E9C4D1328A8A3916240F56C75E5735BF37B438A29F7A9BA5226D74ADA
                                                            SHA-512:08B96C667B593A02049E6B28E0FB8E469533F66E0A6C41A1E7A385BB663723C7D19F93A19F88A4583003605BD540C601273A9C924464A918945918218CC6255B
                                                            Malicious:false
                                                            Preview:ElfChnk.....................................hL...O..BF........................................................................&.............................................=...........................................................................................................................f...............?...........................m...................M...F....................".......)......................................................................................................................**..(............-.1W..........Z7;&........Z7;..T.f.m`..L........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):4.415502860476199
                                                            Encrypted:false
                                                            SSDEEP:384:/hNUEuUEdeUEFUEWUEbUEGUE7eUEt9UE8oUEbPUETaUEEpUESEUED7UEhmUEGlUi:/2qgYE
                                                            MD5:7750FCF3463E4684F5956C8EF6545615
                                                            SHA1:673F0508FDFE69CBABABDFDC29133640FA81051E
                                                            SHA-256:FA412F1DA2F16D58A180E41D4793F4AF3512803C93E3DDA457305473F1CBF2FF
                                                            SHA-512:6AE0FE662EEFD4ED26D6C40F742706AF38F3D448A92C23DE2986F11D3C7890DA6B5235C716085EA07E048548C429A4E91FE5F2DD422D1B03CCF0EC403E2156FC
                                                            Malicious:false
                                                            Preview:ElfChnk......................................Z...[......................................................................................................................F...=...........................................................................................................................f...............?...........................m...................M...F...............................................&...................................................................................................**................z W..........Z7;&........Z7;..T.f.m`..L........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):68136
                                                            Entropy (8bit):4.292271187322906
                                                            Encrypted:false
                                                            SSDEEP:768:VfFJXdxjRGxHe96wYfy167tbiikqokbE8noJp2p5A58H:hR9lg
                                                            MD5:1BC95F7467BED7C0A05F535C17396EDA
                                                            SHA1:BBBD37A347AFC6EEB37F99363355D968312CCED9
                                                            SHA-256:FF7FDEDE4B4E0B50BE2D7F4405AAE8DC2B0227C8367F1E1FA392B718076628D9
                                                            SHA-512:5BA77968669D28A4371FA1747AAD991823D5229FD383C737F2904A8F5DD5EA8F6217B6B7EBBDB76E30929B9253007B0E57230BB3C4B749B40A724ACEAD67BAF4
                                                            Malicious:false
                                                            Preview:ElfChnk.................r.......r...............(......L.....................................................................v.7....................s...h...............N...=...................................................N...............................................w.......:.......................3...................................a...........).......M...X...:...................................................................................................&...........................................**..(...r........!..d3........Ez.B&.......Ez.Bfa.S...=F.&E.......A..9...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.....b...........oT..S.y.s.t.e.m....A...............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.E.v.e.n.t.l.o.g..........)...G.u.i.d.....&.{.f.c.6.5.d.d.d.8.-.d.6.e.f.-.4.9.6.2.-.8.3.d.5.-.6.e.5.c.f.e.9.c.e.1.
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):75080
                                                            Entropy (8bit):4.773769641234503
                                                            Encrypted:false
                                                            SSDEEP:768:Y9gb/x5kd253pW5Yp5aC+6/lXHPIfqi3qijqiurDC:7fZ5kYfIii6i+iCC
                                                            MD5:849FB93F1A96B56E6EA7D5240F27EE63
                                                            SHA1:005941C6210DE9A7BF7B3AD53804E435256CC27A
                                                            SHA-256:EF560B27C85FD6EFD83A143EE0EEB6D4E936EB7045A3A77784BC909AE2DB6E7B
                                                            SHA-512:B870F1629A2DDE50E92B594A6FFCEBBBD447B1DFF9C7FF6661280A50EBF50E88120A78CB7ECE204A041B1A32CCA9C0E5B29ACD87D2323115F365C1611187348C
                                                            Malicious:false
                                                            Preview:ElfChnk.........................................0......g...........................................................................................s...h...............N...=...................................................N...............................................w.......6.......................K...................................]...........).......M...9...:...........................................................................................................$...................&...............**...............!..d3............&.............gX..L.&..A.......A..5...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.....^...........oT..S.y.s.t.e.m....A...............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.E.v.e.n.t.l.o.g..........)...G.u.i.d.....&.{.f.c.6.5.d.d.d.8.-.d.6.e.f.-.4.9.6.2.-.8.3.d.5.-.6.e.5.c.f.e.9.c.e.1.
                                                            Process:C:\Windows\System32\svchost.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):76672
                                                            Entropy (8bit):3.8331047933303037
                                                            Encrypted:false
                                                            SSDEEP:1536:sWWldGB9gWWldGB9XaFVdv6t+Na0gK4a:
                                                            MD5:6C159A56805EBDF9AB0BAE86F36284CD
                                                            SHA1:A3F5234EC0130D8874993666EB6B656596CDF387
                                                            SHA-256:06F83FF090FF0F0FAF61B493A2F75D40AB5449C2954F0A101E6FDAE0C25B4953
                                                            SHA-512:FBB96AA7E3FAAB3A94EA72BC6511C3C74A25143260CB5314375216B0DECA06E49B0794A96022D26AC20066F543C95E1B32C132BE38411B8F3572949C7F5B54A3
                                                            Malicious:false
                                                            Preview:ElfChnk.................y....................&...+.....{.....................................................................Us.............................................=..........................................................................................................................._...............8...........................f...................M...c...........................t...................................................................&...................................................**......y...........d3.........*{-&........*{-.elRN.E%.,+.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..R............{..P.r.o.v.i.d.e.r.../....=.......K...N.a.m.e.......P.o.w.e.r.S.h.e.l.l..A..M...s........a..E.v.e.n.t.I.D...'............)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n............
                                                            File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                            Entropy (8bit):7.71585644239634
                                                            TrID:
                                                            • Win64 Executable (generic) (12005/4) 74.95%
                                                            • Generic Win/DOS Executable (2004/3) 12.51%
                                                            • DOS Executable Generic (2002/1) 12.50%
                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                                                            File name:setup.exe
                                                            File size:5'617'152 bytes
                                                            MD5:1274cbcd6329098f79a3be6d76ab8b97
                                                            SHA1:53c870d62dcd6154052445dc03888cdc6cffd370
                                                            SHA256:bbe5544c408a6eb95dd9980c61a63c4ebc8ccbeecade4de4fae8332361e27278
                                                            SHA512:a0febbd4915791d3c32531fb3cf177ee288dd80ce1c8a1e71fa9ad59a4ebddeef69b6be7f3d19e687b96dc59c8a8fa80afff8378a71431c3133f361b28e0d967
                                                            SSDEEP:98304:Dei3W2HJn8hqIOLmRLRSo+QqvCRs19A3JIkLJQrAtjRQii7yXdmMpy2N:6Z2i4OcxQECE6ZIkLJIAt8y4
                                                            TLSH:2E46E01B9BB5EF12D119C0FE306626086634D3069DE87C28EF6F5B41351632E63E9EE1
                                                            File Content Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$.......PE..d......................(.v....U................@.............................PV.......U...`... ............................
                                                            Icon Hash:00928e8e8686b000
                                                            Entrypoint:0x1400012fd
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x140000000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                                                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                                                            Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                                            TLS Callbacks:0x4000450c, 0x1, 0x400044f0, 0x1
                                                            CLR (.Net) Version:
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:0fdd3d21d2193b717f076a70dfaa659c
                                                            Instruction
                                                            dec eax
                                                            sub esp, 28h
                                                            dec eax
                                                            mov eax, dword ptr [0055A348h]
                                                            mov dword ptr [eax], 00000001h
                                                            call 00007F17A4866F13h
                                                            nop
                                                            nop
                                                            dec eax
                                                            add esp, 28h
                                                            ret
                                                            dec eax
                                                            sub esp, 28h
                                                            dec eax
                                                            mov eax, dword ptr [0055A32Bh]
                                                            xor edx, edx
                                                            mov dword ptr [eax], edx
                                                            call 00007F17A4866EF8h
                                                            nop
                                                            nop
                                                            dec eax
                                                            add esp, 28h
                                                            ret
                                                            dec eax
                                                            sub esp, 28h
                                                            call 00007F17A486AF07h
                                                            dec eax
                                                            cmp eax, 01h
                                                            sbb eax, eax
                                                            dec eax
                                                            add esp, 28h
                                                            ret
                                                            nop
                                                            nop
                                                            nop
                                                            nop
                                                            nop
                                                            nop
                                                            nop
                                                            dec eax
                                                            lea ecx, dword ptr [00000005h]
                                                            jmp 00007F17A48670CEh
                                                            ret
                                                            nop
                                                            nop
                                                            nop
                                                            ret
                                                            nop word ptr [eax+eax+00000000h]
                                                            nop dword ptr [eax+00h]
                                                            ret
                                                            nop word ptr [eax+eax+00000000h]
                                                            nop dword ptr [eax+00h]
                                                            ret
                                                            nop word ptr [eax+eax+00000000h]
                                                            nop dword ptr [eax+00h]
                                                            ret
                                                            nop word ptr [eax+eax+00000000h]
                                                            nop dword ptr [eax+00h]
                                                            ret
                                                            nop word ptr [eax+eax+00000000h]
                                                            nop dword ptr [eax+00h]
                                                            ret
                                                            nop word ptr [eax+eax+00000000h]
                                                            nop dword ptr [eax+00h]
                                                            ret
                                                            sldt word ptr [eax]
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x5600000x5e4.idata
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x5630000x388.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x55c0000x60c.pdata
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x5640000x78.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x55b2c00x28.rdata
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x5601980x158.idata
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x10000x75b80x760092a433ff13025dda2f8832b3ba47f4cbFalse0.5024496822033898data6.126233240669742IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .data0x90000x5501600x550200f79fc51b240acbc551e51cfd4934ec52unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .rdata0x55a0000x1b600x1c00e79c60ad85a32722531f8593b23b26b7False0.44893973214285715data5.0676250579227995IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .pdata0x55c0000x60c0x800b563079ef928b523d8d741b04fc428c5False0.37109375data3.6393254656893337IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .xdata0x55d0000x4900x6006731287afa5b247d7414e61e07564c26False0.2923177083333333data3.367895720590965IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .bss0x55e0000x16200x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .idata0x5600000x5e40x600b6fc00d75df898e2f006a20f12fb69b1False0.3606770833333333data3.8755986783766283IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .CRT0x5610000x600x2009867011dc1bd0b257a5f116a965d24ffFalse0.06640625data0.28341599526108024IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .tls0x5620000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .rsrc0x5630000x3880x4001dc8ad87c60f0851d6dbef5108e34126False0.44921875data5.016736197841765IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .reloc0x5640000x780x20003a349d5be37c2131c83dbfaf1c3e983False0.248046875data1.5196339247044217IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_MANIFEST0x5630580x330XML 1.0 document, ASCII textEnglishUnited States0.508578431372549
                                                            DLLImport
                                                            KERNEL32.dllDeleteCriticalSection, EnterCriticalSection, GetLastError, InitializeCriticalSection, LeaveCriticalSection, SetUnhandledExceptionFilter, Sleep, TlsGetValue, VirtualProtect, VirtualQuery
                                                            msvcrt.dll__C_specific_handler, __getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _amsg_exit, _cexit, _commode, _fmode, _initterm, _onexit, abort, calloc, exit, fprintf, fputs, free, malloc, memset, signal, strlen, strncmp, vfprintf, wcscat, wcscpy, wcslen, wcsncmp, wcsstr, _wcsnicmp, _wcsicmp
                                                            Language of compilation systemCountry where language is spokenMap
                                                            EnglishUnited States
                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                            2024-11-10T12:38:17.092545+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.245.163.56443192.168.2.649751TCP
                                                            2024-11-10T12:38:52.557754+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.660889TCP
                                                            2024-11-10T12:38:53.820122+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.660896TCP
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Nov 10, 2024 12:38:46.874742031 CET5359094162.159.36.2192.168.2.6
                                                            Nov 10, 2024 12:38:47.477428913 CET5317053192.168.2.61.1.1.1
                                                            Nov 10, 2024 12:38:47.484446049 CET53531701.1.1.1192.168.2.6
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Nov 10, 2024 12:38:47.477428913 CET192.168.2.61.1.1.10xe56aStandard query (0)241.42.69.40.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Nov 10, 2024 12:38:47.484446049 CET1.1.1.1192.168.2.60xe56aName error (3)241.42.69.40.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

                                                            Code Manipulations

                                                            Function NameHook TypeActive in Processes
                                                            ZwEnumerateKeyINLINEwinlogon.exe, explorer.exe
                                                            NtQuerySystemInformationINLINEwinlogon.exe, explorer.exe
                                                            ZwResumeThreadINLINEwinlogon.exe, explorer.exe
                                                            NtDeviceIoControlFileINLINEwinlogon.exe, explorer.exe
                                                            ZwDeviceIoControlFileINLINEwinlogon.exe, explorer.exe
                                                            NtEnumerateKeyINLINEwinlogon.exe, explorer.exe
                                                            NtQueryDirectoryFileINLINEwinlogon.exe, explorer.exe
                                                            ZwEnumerateValueKeyINLINEwinlogon.exe, explorer.exe
                                                            ZwQuerySystemInformationINLINEwinlogon.exe, explorer.exe
                                                            NtResumeThreadINLINEwinlogon.exe, explorer.exe
                                                            RtlGetNativeSystemInformationINLINEwinlogon.exe, explorer.exe
                                                            NtQueryDirectoryFileExINLINEwinlogon.exe, explorer.exe
                                                            NtEnumerateValueKeyINLINEwinlogon.exe, explorer.exe
                                                            ZwQueryDirectoryFileExINLINEwinlogon.exe, explorer.exe
                                                            ZwQueryDirectoryFileINLINEwinlogon.exe, explorer.exe
                                                            Function NameHook TypeNew Data
                                                            ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                            NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                            ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                            NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                            ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                            NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                            NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                            ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                            ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                            NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                            RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                            NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                            NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                            ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                            ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                            Function NameHook TypeNew Data
                                                            ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                            NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                            ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                            NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                            ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                            NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                            NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                            ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                            ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                            NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                            RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                            NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                            NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                            ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                            ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF

                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:06:37:57
                                                            Start date:10/11/2024
                                                            Path:C:\Users\user\Desktop\setup.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Users\user\Desktop\setup.exe"
                                                            Imagebase:0x7ff6e94a0000
                                                            File size:5'617'152 bytes
                                                            MD5 hash:1274CBCD6329098F79A3BE6D76AB8B97
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:2
                                                            Start time:06:37:58
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                            Imagebase:0x7ff6e3d50000
                                                            File size:452'608 bytes
                                                            MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:3
                                                            Start time:06:37:58
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff66e660000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:4
                                                            Start time:06:38:00
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                            Imagebase:0x7ff717f30000
                                                            File size:496'640 bytes
                                                            MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                            Has elevated privileges:true
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:false

                                                            Target ID:5
                                                            Start time:06:38:01
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                            Imagebase:0x7ff766cd0000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:6
                                                            Start time:06:38:01
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff66e660000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:7
                                                            Start time:06:38:01
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\sc.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:sc stop UsoSvc
                                                            Imagebase:0x7ff63b810000
                                                            File size:72'192 bytes
                                                            MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:8
                                                            Start time:06:38:01
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\sc.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:sc stop WaaSMedicSvc
                                                            Imagebase:0x7ff63b810000
                                                            File size:72'192 bytes
                                                            MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:9
                                                            Start time:06:38:01
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\sc.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:sc stop wuauserv
                                                            Imagebase:0x7ff63b810000
                                                            File size:72'192 bytes
                                                            MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:10
                                                            Start time:06:38:01
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\sc.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:sc stop bits
                                                            Imagebase:0x7ff63b810000
                                                            File size:72'192 bytes
                                                            MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:11
                                                            Start time:06:38:01
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\sc.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:sc stop dosvc
                                                            Imagebase:0x7ff63b810000
                                                            File size:72'192 bytes
                                                            MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:12
                                                            Start time:06:38:01
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\dialer.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\System32\dialer.exe
                                                            Imagebase:0x7ff6fb2c0000
                                                            File size:39'936 bytes
                                                            MD5 hash:B2626BDCF079C6516FC016AC5646DF93
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:17
                                                            Start time:06:38:01
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\winlogon.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:winlogon.exe
                                                            Imagebase:0x7ff70f350000
                                                            File size:906'240 bytes
                                                            MD5 hash:F8B41A1B3E569E7E6F990567F21DCE97
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:20
                                                            Start time:06:38:02
                                                            Start date:10/11/2024
                                                            Path:C:\Program Files\Google\Chrome\updater.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Program Files\Google\Chrome\updater.exe"
                                                            Imagebase:0x7ff63de70000
                                                            File size:5'617'152 bytes
                                                            MD5 hash:1274CBCD6329098F79A3BE6D76AB8B97
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Antivirus matches:
                                                            • Detection: 100%, Joe Sandbox ML
                                                            • Detection: 76%, ReversingLabs
                                                            Has exited:true

                                                            Target ID:21
                                                            Start time:06:38:02
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\lsass.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\lsass.exe
                                                            Imagebase:0x7ff7ac940000
                                                            File size:59'456 bytes
                                                            MD5 hash:A1CC00332BBF370654EE3DC8CDC8C95A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:22
                                                            Start time:06:38:02
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                                                            Imagebase:0x7ff7403e0000
                                                            File size:55'320 bytes
                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:23
                                                            Start time:06:38:03
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\dwm.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"dwm.exe"
                                                            Imagebase:0x7ff68eb30000
                                                            File size:94'720 bytes
                                                            MD5 hash:5C27608411832C5B39BA04E33D53536C
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:24
                                                            Start time:06:38:04
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                                                            Imagebase:0x7ff7403e0000
                                                            File size:55'320 bytes
                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:25
                                                            Start time:06:38:04
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                                                            Imagebase:0x7ff7403e0000
                                                            File size:55'320 bytes
                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:26
                                                            Start time:06:38:04
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                                            Imagebase:0x7ff7403e0000
                                                            File size:55'320 bytes
                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:27
                                                            Start time:06:38:05
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                                                            Imagebase:0x7ff7403e0000
                                                            File size:55'320 bytes
                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:28
                                                            Start time:06:38:05
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                                                            Imagebase:0x7ff7403e0000
                                                            File size:55'320 bytes
                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:29
                                                            Start time:06:38:05
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                                            Imagebase:0x7ff7403e0000
                                                            File size:55'320 bytes
                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:30
                                                            Start time:06:38:06
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                                            Imagebase:0x7ff7403e0000
                                                            File size:55'320 bytes
                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:31
                                                            Start time:06:38:06
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                                            Imagebase:0x7ff7403e0000
                                                            File size:55'320 bytes
                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:32
                                                            Start time:06:38:07
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                                            Imagebase:0x7ff7403e0000
                                                            File size:55'320 bytes
                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:33
                                                            Start time:06:38:07
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                                            Imagebase:0x7ff7403e0000
                                                            File size:55'320 bytes
                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:34
                                                            Start time:06:38:07
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                                            Imagebase:0x7ff7403e0000
                                                            File size:55'320 bytes
                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:35
                                                            Start time:06:38:07
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\svchost.exe -k LocalService -p
                                                            Imagebase:0x7ff7403e0000
                                                            File size:55'320 bytes
                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:36
                                                            Start time:06:38:07
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                                            Imagebase:0x7ff7403e0000
                                                            File size:55'320 bytes
                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:37
                                                            Start time:06:38:08
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                                            Imagebase:0x7ff7403e0000
                                                            File size:55'320 bytes
                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:38
                                                            Start time:06:38:08
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                                            Imagebase:0x7ff7403e0000
                                                            File size:55'320 bytes
                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:39
                                                            Start time:06:38:08
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache
                                                            Imagebase:0x7ff7403e0000
                                                            File size:55'320 bytes
                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:40
                                                            Start time:06:38:08
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                            Imagebase:0x7ff7403e0000
                                                            File size:55'320 bytes
                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:41
                                                            Start time:06:38:08
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                                            Imagebase:0x7ff7403e0000
                                                            File size:55'320 bytes
                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:42
                                                            Start time:06:38:09
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                            Imagebase:0x7ff7403e0000
                                                            File size:55'320 bytes
                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:43
                                                            Start time:06:38:09
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                            Imagebase:0x7ff7403e0000
                                                            File size:55'320 bytes
                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:44
                                                            Start time:06:38:09
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                            Imagebase:0x7ff7403e0000
                                                            File size:55'320 bytes
                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:45
                                                            Start time:06:38:09
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                            Imagebase:0x7ff7403e0000
                                                            File size:55'320 bytes
                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Target ID:46
                                                            Start time:06:38:10
                                                            Start date:10/11/2024
                                                            Path:C:\Windows\System32\svchost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                            Imagebase:0x7ff7403e0000
                                                            File size:55'320 bytes
                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Has exited:false

                                                            Reset < >
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2145012600.00007FF6E94A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E94A0000, based on PE: true
                                                              • Associated: 00000000.00000002.2144974995.00007FF6E94A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2145158691.00007FF6E94A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2145201376.00007FF6E94D1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2145764298.00007FF6E99F7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2145792520.00007FF6E99FA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2145827736.00007FF6E99FE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2145855515.00007FF6E9A03000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2145877143.00007FF6E9A04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_7ff6e94a0000_setup.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8e2382d73125df78936d26452b80bcba07539e5c8c97af36270da171beb56e3f
                                                              • Instruction ID: 4ccb7815166216860ef7553fb942e437498505dfd8473c6ec040d00bff41f98f
                                                              • Opcode Fuzzy Hash: 8e2382d73125df78936d26452b80bcba07539e5c8c97af36270da171beb56e3f
                                                              • Instruction Fuzzy Hash: EFB01272A04605C4E3002F01D8413BC33206F1C700F500830D40C43353CEBED0548716

                                                              Execution Graph

                                                              Execution Coverage:0.7%
                                                              Dynamic/Decrypted Code Coverage:0%
                                                              Signature Coverage:56.8%
                                                              Total number of Nodes:74
                                                              Total number of Limit Nodes:2
                                                              execution_graph 15066 1b1c6a9273c 15069 1b1c6a9276a 15066->15069 15067 1b1c6a92858 LoadLibraryA 15067->15069 15068 1b1c6a928d4 15069->15067 15069->15068 15070 1b1c6ac1abc 15075 1b1c6ac1628 GetProcessHeap 15070->15075 15072 1b1c6ac1acb 15073 1b1c6ac1ad2 Sleep SleepEx 15072->15073 15074 1b1c6ac1598 StrCmpIW StrCmpW 15072->15074 15073->15072 15074->15072 15076 1b1c6ac1648 Concurrency::details::SchedulerProxy::DeleteThis 15075->15076 15120 1b1c6ac1268 GetProcessHeap 15076->15120 15078 1b1c6ac1650 15079 1b1c6ac1268 2 API calls 15078->15079 15080 1b1c6ac1661 15079->15080 15081 1b1c6ac1268 2 API calls 15080->15081 15082 1b1c6ac166a 15081->15082 15083 1b1c6ac1268 2 API calls 15082->15083 15084 1b1c6ac1673 15083->15084 15085 1b1c6ac168e RegOpenKeyExW 15084->15085 15086 1b1c6ac16c0 RegOpenKeyExW 15085->15086 15087 1b1c6ac18a6 15085->15087 15088 1b1c6ac16ff RegOpenKeyExW 15086->15088 15089 1b1c6ac16e9 15086->15089 15087->15072 15091 1b1c6ac173a RegOpenKeyExW 15088->15091 15092 1b1c6ac1723 15088->15092 15124 1b1c6ac12bc RegQueryInfoKeyW 15089->15124 15095 1b1c6ac175e 15091->15095 15096 1b1c6ac1775 RegOpenKeyExW 15091->15096 15135 1b1c6ac104c RegQueryInfoKeyW 15092->15135 15098 1b1c6ac12bc 13 API calls 15095->15098 15099 1b1c6ac17b0 RegOpenKeyExW 15096->15099 15100 1b1c6ac1799 15096->15100 15103 1b1c6ac176b RegCloseKey 15098->15103 15101 1b1c6ac17eb RegOpenKeyExW 15099->15101 15102 1b1c6ac17d4 15099->15102 15104 1b1c6ac12bc 13 API calls 15100->15104 15106 1b1c6ac180f 15101->15106 15107 1b1c6ac1826 RegOpenKeyExW 15101->15107 15105 1b1c6ac12bc 13 API calls 15102->15105 15103->15096 15108 1b1c6ac17a6 RegCloseKey 15104->15108 15109 1b1c6ac17e1 RegCloseKey 15105->15109 15110 1b1c6ac104c 5 API calls 15106->15110 15111 1b1c6ac184a 15107->15111 15112 1b1c6ac1861 RegOpenKeyExW 15107->15112 15108->15099 15109->15101 15113 1b1c6ac181c RegCloseKey 15110->15113 15114 1b1c6ac104c 5 API calls 15111->15114 15115 1b1c6ac189c RegCloseKey 15112->15115 15116 1b1c6ac1885 15112->15116 15113->15107 15117 1b1c6ac1857 RegCloseKey 15114->15117 15115->15087 15118 1b1c6ac104c 5 API calls 15116->15118 15117->15112 15119 1b1c6ac1892 RegCloseKey 15118->15119 15119->15115 15141 1b1c6ad6168 15120->15141 15122 1b1c6ac1283 GetProcessHeap 15123 1b1c6ac12ae Concurrency::details::SchedulerProxy::DeleteThis 15122->15123 15123->15078 15125 1b1c6ac148a RegCloseKey 15124->15125 15126 1b1c6ac1327 GetProcessHeap 15124->15126 15125->15088 15127 1b1c6ac133e Concurrency::details::SchedulerProxy::DeleteThis 15126->15127 15128 1b1c6ac1476 GetProcessHeap HeapFree 15127->15128 15129 1b1c6ac1352 RegEnumValueW 15127->15129 15131 1b1c6ac141e lstrlenW GetProcessHeap 15127->15131 15132 1b1c6ac13d3 GetProcessHeap 15127->15132 15133 1b1c6ac13f3 GetProcessHeap HeapFree 15127->15133 15134 1b1c6ac1443 StrCpyW 15127->15134 15143 1b1c6ac152c 15127->15143 15128->15125 15129->15127 15131->15127 15132->15127 15133->15131 15134->15127 15136 1b1c6ac11b5 RegCloseKey 15135->15136 15138 1b1c6ac10bf Concurrency::details::SchedulerProxy::DeleteThis 15135->15138 15136->15091 15137 1b1c6ac10cf RegEnumValueW 15137->15138 15138->15136 15138->15137 15139 1b1c6ac114e GetProcessHeap 15138->15139 15140 1b1c6ac116e GetProcessHeap HeapFree 15138->15140 15139->15138 15140->15138 15142 1b1c6ad6177 15141->15142 15144 1b1c6ac157c 15143->15144 15145 1b1c6ac1546 15143->15145 15144->15127 15145->15144 15146 1b1c6ac155d StrCmpIW 15145->15146 15147 1b1c6ac1565 StrCmpW 15145->15147 15146->15145 15147->15145

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                              • String ID:
                                                              • API String ID: 1683269324-0
                                                              • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                              • Instruction ID: 97bbd69e84afed8c7ba40225508ceb979657183efe982b2f29f8e0f2a99c2368
                                                              • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                              • Instruction Fuzzy Hash: EB11C430694600B2F760AB21F8743D97A94BB94344FD29D24FB0E836A9EF7AF0548200

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 000001B1C6AC1628: GetProcessHeap.KERNEL32 ref: 000001B1C6AC1633
                                                                • Part of subcall function 000001B1C6AC1628: HeapAlloc.KERNEL32 ref: 000001B1C6AC1642
                                                                • Part of subcall function 000001B1C6AC1628: RegOpenKeyExW.ADVAPI32 ref: 000001B1C6AC16B2
                                                                • Part of subcall function 000001B1C6AC1628: RegOpenKeyExW.ADVAPI32 ref: 000001B1C6AC16DF
                                                                • Part of subcall function 000001B1C6AC1628: RegCloseKey.ADVAPI32 ref: 000001B1C6AC16F9
                                                                • Part of subcall function 000001B1C6AC1628: RegOpenKeyExW.ADVAPI32 ref: 000001B1C6AC1719
                                                                • Part of subcall function 000001B1C6AC1628: RegCloseKey.ADVAPI32 ref: 000001B1C6AC1734
                                                                • Part of subcall function 000001B1C6AC1628: RegOpenKeyExW.ADVAPI32 ref: 000001B1C6AC1754
                                                                • Part of subcall function 000001B1C6AC1628: RegCloseKey.ADVAPI32 ref: 000001B1C6AC176F
                                                                • Part of subcall function 000001B1C6AC1628: RegOpenKeyExW.ADVAPI32 ref: 000001B1C6AC178F
                                                                • Part of subcall function 000001B1C6AC1628: RegCloseKey.ADVAPI32 ref: 000001B1C6AC17AA
                                                                • Part of subcall function 000001B1C6AC1628: RegOpenKeyExW.ADVAPI32 ref: 000001B1C6AC17CA
                                                              • Sleep.KERNEL32 ref: 000001B1C6AC1AD7
                                                              • SleepEx.KERNELBASE ref: 000001B1C6AC1ADD
                                                                • Part of subcall function 000001B1C6AC1628: RegCloseKey.ADVAPI32 ref: 000001B1C6AC17E5
                                                                • Part of subcall function 000001B1C6AC1628: RegOpenKeyExW.ADVAPI32 ref: 000001B1C6AC1805
                                                                • Part of subcall function 000001B1C6AC1628: RegCloseKey.ADVAPI32 ref: 000001B1C6AC1820
                                                                • Part of subcall function 000001B1C6AC1628: RegOpenKeyExW.ADVAPI32 ref: 000001B1C6AC1840
                                                                • Part of subcall function 000001B1C6AC1628: RegCloseKey.ADVAPI32 ref: 000001B1C6AC185B
                                                                • Part of subcall function 000001B1C6AC1628: RegOpenKeyExW.ADVAPI32 ref: 000001B1C6AC187B
                                                                • Part of subcall function 000001B1C6AC1628: RegCloseKey.ADVAPI32 ref: 000001B1C6AC1896
                                                                • Part of subcall function 000001B1C6AC1628: RegCloseKey.ADVAPI32 ref: 000001B1C6AC18A0
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: CloseOpen$HeapSleep$AllocProcess
                                                              • String ID:
                                                              • API String ID: 1534210851-0
                                                              • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                              • Instruction ID: 9e69a504b9330ae095c2a23997ba96dfb8a8250ef7ee54ba0e58d16e6b8b3350
                                                              • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                              • Instruction Fuzzy Hash: 56310F7138064571FB509B26DA713E97BA4AB84BD0F865C21AE0D8739AFF25EC61C610

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 57 1b1c6ac3844-1b1c6ac384f 58 1b1c6ac3869-1b1c6ac3870 57->58 59 1b1c6ac3851-1b1c6ac3864 StrCmpNIW 57->59 59->58 60 1b1c6ac3866 59->60 60->58
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: dialer
                                                              • API String ID: 0-3528709123
                                                              • Opcode ID: 65427932a6511f3c8dca5889eed1792e2f2e2d3e0b30565664b7cb78ea33e46c
                                                              • Instruction ID: 3c6af229386a8a50520a5aa76ff11266ea397b7ae97ed6923405ed7616839ef6
                                                              • Opcode Fuzzy Hash: 65427932a6511f3c8dca5889eed1792e2f2e2d3e0b30565664b7cb78ea33e46c
                                                              • Instruction Fuzzy Hash: 7FD0A774391205B7FF14DFA788E4AE47B60FB18744FC95420EA0843154DB19F98D9B10

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3393309014.000001B1C6A90000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001B1C6A90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6a90000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID:
                                                              • API String ID: 1029625771-0
                                                              • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                              • Instruction ID: 002c636410fc6ffa28e3e40eda552596c8e2645a43c1401c2a59c000ed58e572
                                                              • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                              • Instruction Fuzzy Hash: 5C61563AB692D097DB58CF15D0207AD7B92F754BB4FA98921EE5D03788DB38E852C700

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                              • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                              • API String ID: 106492572-2879589442
                                                              • Opcode ID: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                              • Instruction ID: 4268d1acd38a6d69d0aa65e2f45344c97399848087cd0fb6de6cb85b2a853881
                                                              • Opcode Fuzzy Hash: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                              • Instruction Fuzzy Hash: 1E716F36350E10A6EB109F25E8A06DD3BB4FB94B88F826921FE4E47B68DF35D854C740

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 367 1b1c6ac2b2c-1b1c6ac2ba5 call 1b1c6ae2ce0 370 1b1c6ac2ee0-1b1c6ac2f03 367->370 371 1b1c6ac2bab-1b1c6ac2bb1 367->371 371->370 372 1b1c6ac2bb7-1b1c6ac2bba 371->372 372->370 373 1b1c6ac2bc0-1b1c6ac2bc3 372->373 373->370 374 1b1c6ac2bc9-1b1c6ac2bd9 GetModuleHandleA 373->374 375 1b1c6ac2bed 374->375 376 1b1c6ac2bdb-1b1c6ac2beb call 1b1c6ad6090 374->376 377 1b1c6ac2bf0-1b1c6ac2c0e 375->377 376->377 377->370 381 1b1c6ac2c14-1b1c6ac2c33 StrCmpNIW 377->381 381->370 382 1b1c6ac2c39-1b1c6ac2c3d 381->382 382->370 383 1b1c6ac2c43-1b1c6ac2c4d 382->383 383->370 384 1b1c6ac2c53-1b1c6ac2c5a 383->384 384->370 385 1b1c6ac2c60-1b1c6ac2c73 384->385 386 1b1c6ac2c75-1b1c6ac2c81 385->386 387 1b1c6ac2c83 385->387 388 1b1c6ac2c86-1b1c6ac2c8a 386->388 387->388 389 1b1c6ac2c9a 388->389 390 1b1c6ac2c8c-1b1c6ac2c98 388->390 391 1b1c6ac2c9d-1b1c6ac2ca7 389->391 390->391 392 1b1c6ac2d9d-1b1c6ac2da1 391->392 393 1b1c6ac2cad-1b1c6ac2cb0 391->393 396 1b1c6ac2da7-1b1c6ac2daa 392->396 397 1b1c6ac2ed2-1b1c6ac2eda 392->397 394 1b1c6ac2cc2-1b1c6ac2ccc 393->394 395 1b1c6ac2cb2-1b1c6ac2cbf call 1b1c6ac199c 393->395 399 1b1c6ac2cce-1b1c6ac2cdb 394->399 400 1b1c6ac2d00-1b1c6ac2d0a 394->400 395->394 401 1b1c6ac2dbb-1b1c6ac2dc5 396->401 402 1b1c6ac2dac-1b1c6ac2db8 call 1b1c6ac199c 396->402 397->370 397->385 399->400 406 1b1c6ac2cdd-1b1c6ac2cea 399->406 407 1b1c6ac2d3a-1b1c6ac2d3d 400->407 408 1b1c6ac2d0c-1b1c6ac2d19 400->408 403 1b1c6ac2df5-1b1c6ac2df8 401->403 404 1b1c6ac2dc7-1b1c6ac2dd4 401->404 402->401 411 1b1c6ac2dfa-1b1c6ac2e03 call 1b1c6ac1bbc 403->411 412 1b1c6ac2e05-1b1c6ac2e12 lstrlenW 403->412 404->403 410 1b1c6ac2dd6-1b1c6ac2de3 404->410 413 1b1c6ac2ced-1b1c6ac2cf3 406->413 415 1b1c6ac2d3f-1b1c6ac2d49 call 1b1c6ac1bbc 407->415 416 1b1c6ac2d4b-1b1c6ac2d58 lstrlenW 407->416 408->407 414 1b1c6ac2d1b-1b1c6ac2d28 408->414 418 1b1c6ac2de6-1b1c6ac2dec 410->418 411->412 430 1b1c6ac2e4a-1b1c6ac2e55 411->430 424 1b1c6ac2e35-1b1c6ac2e3f call 1b1c6ac3844 412->424 425 1b1c6ac2e14-1b1c6ac2e1e 412->425 422 1b1c6ac2cf9-1b1c6ac2cfe 413->422 423 1b1c6ac2d93-1b1c6ac2d98 413->423 426 1b1c6ac2d2b-1b1c6ac2d31 414->426 415->416 415->423 419 1b1c6ac2d5a-1b1c6ac2d64 416->419 420 1b1c6ac2d7b-1b1c6ac2d8d call 1b1c6ac3844 416->420 429 1b1c6ac2dee-1b1c6ac2df3 418->429 418->430 419->420 431 1b1c6ac2d66-1b1c6ac2d79 call 1b1c6ac152c 419->431 420->423 434 1b1c6ac2e42-1b1c6ac2e44 420->434 422->400 422->413 423->434 424->434 425->424 435 1b1c6ac2e20-1b1c6ac2e33 call 1b1c6ac152c 425->435 426->423 436 1b1c6ac2d33-1b1c6ac2d38 426->436 429->403 429->418 438 1b1c6ac2ecc-1b1c6ac2ed0 430->438 439 1b1c6ac2e57-1b1c6ac2e5b 430->439 431->420 431->423 434->397 434->430 435->424 435->430 436->407 436->426 438->397 444 1b1c6ac2e5d-1b1c6ac2e61 439->444 445 1b1c6ac2e63-1b1c6ac2e7d call 1b1c6ac85c0 439->445 444->445 448 1b1c6ac2e80-1b1c6ac2e83 444->448 445->448 451 1b1c6ac2e85-1b1c6ac2ea3 call 1b1c6ac85c0 448->451 452 1b1c6ac2ea6-1b1c6ac2ea9 448->452 451->452 452->438 454 1b1c6ac2eab-1b1c6ac2ec9 call 1b1c6ac85c0 452->454 454->438
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                              • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                              • API String ID: 2119608203-3850299575
                                                              • Opcode ID: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                              • Instruction ID: 22ed3a06bedcebe6aba735482cd97ed782bdf9368f46984893dd38028cdc8eb2
                                                              • Opcode Fuzzy Hash: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                              • Instruction Fuzzy Hash: D5B1E032258A50B2EB69CF25C4607E97BA4FB55B84F865816FE0D63798EF36EC40C340
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 3140674995-0
                                                              • Opcode ID: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                              • Instruction ID: 317df0a15267c9fa474001083f3c8d1baf619b88aa9a08f244a7dba71325071b
                                                              • Opcode Fuzzy Hash: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                              • Instruction Fuzzy Hash: 2B318372245B80AAEB609F60E8603ED77A0F795748F85482AEB4D47B98EF38D548C710
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 1239891234-0
                                                              • Opcode ID: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                              • Instruction ID: 3bc0bdfb2646163a9add036108dd2c71ef610d25bba207ea85a68d4bfad8cf32
                                                              • Opcode Fuzzy Hash: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                              • Instruction Fuzzy Hash: D931B132254F80A6EB60DF25E8503DE7BA0F789758F910526FA9D43BA8DF38D145CB00
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                              • String ID:
                                                              • API String ID: 2933794660-0
                                                              • Opcode ID: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                              • Instruction ID: 8f7b8daffe220ae89f21292abc9ab5e05f75f5fc4e327aa01d51f29665194078
                                                              • Opcode Fuzzy Hash: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                              • Instruction Fuzzy Hash: D2112A32750F019AEB00CF60E8643A837A4F719758F851E21EA6D477A4DB78D5A88380
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: ExceptionRaise_clrfp
                                                              • String ID:
                                                              • API String ID: 15204871-0
                                                              • Opcode ID: 91c45a23742243141810e6f77c67a66073dfa56da4d49e6a277af36b1acf7cf1
                                                              • Instruction ID: 3f6b44b28d2ecea207336db961fd745a2605a5cc19f467aa1e33c6d960ffeb78
                                                              • Opcode Fuzzy Hash: 91c45a23742243141810e6f77c67a66073dfa56da4d49e6a277af36b1acf7cf1
                                                              • Instruction Fuzzy Hash: 7AB15B77600B889FEB15CF29C89639C3BA0F784B48F568911EB6E877A4CB39D851C701
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3393309014.000001B1C6A90000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001B1C6A90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6a90000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: _clrfp
                                                              • String ID:
                                                              • API String ID: 3618594692-0
                                                              • Opcode ID: 91c45a23742243141810e6f77c67a66073dfa56da4d49e6a277af36b1acf7cf1
                                                              • Instruction ID: 9ac947b349dfdba859e667aebfab9aac7517027d1a242ec63eef34f11cd6c2ae
                                                              • Opcode Fuzzy Hash: 91c45a23742243141810e6f77c67a66073dfa56da4d49e6a277af36b1acf7cf1
                                                              • Instruction Fuzzy Hash: E9B15C73201B888BEB15CF29C89639C7BE1F344B58F568916EB9D837A5CB3AD451CB00
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 29975c57d01bdb1e687cc302dc7d7dc5a8663a128fa1f3b93342ad94a271d3ec
                                                              • Instruction ID: 8011c5629240d9c3cae9c091d5e9331bd5437e590ee7448d0f5bc64f2d69fc4c
                                                              • Opcode Fuzzy Hash: 29975c57d01bdb1e687cc302dc7d7dc5a8663a128fa1f3b93342ad94a271d3ec
                                                              • Instruction Fuzzy Hash: CC51D132740690A9FB20AB72A8507DA7FE1F7847A8F954919FE5C27B99DB39D401C700
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3393309014.000001B1C6A90000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001B1C6A90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6a90000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ede98a6d8d02e88a1d8b84a5c6c80a15dedc9657b0a7b1a34b363c45f1d0dee8
                                                              • Instruction ID: c8064cbe6074745e33a81e913246fc85839f831d9feb055e7417a8b6be06d54d
                                                              • Opcode Fuzzy Hash: ede98a6d8d02e88a1d8b84a5c6c80a15dedc9657b0a7b1a34b363c45f1d0dee8
                                                              • Instruction Fuzzy Hash: 0DB1033A2786D0A2EB648F25D8603E97BA4F744BA4FA65816FE0D53794DF35ED80C340
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3393309014.000001B1C6A90000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001B1C6A90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6a90000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 29975c57d01bdb1e687cc302dc7d7dc5a8663a128fa1f3b93342ad94a271d3ec
                                                              • Instruction ID: 3af193a71facd2171e84c3cbd6cf60d9a395f281a1ca28127921831a82211769
                                                              • Opcode Fuzzy Hash: 29975c57d01bdb1e687cc302dc7d7dc5a8663a128fa1f3b93342ad94a271d3ec
                                                              • Instruction Fuzzy Hash: D651D036740AC0A9FB20AB72A8506DE7FA1F784799FA54914FE5D27B99CB38D441C700
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3393309014.000001B1C6A90000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001B1C6A90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6a90000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 06df2142d5dd0183fd0e01b7d5608ecb5bc0210788fa76ce78b9fbce82fbb0aa
                                                              • Instruction ID: 664d64dc3103cff79e1492e28aacd1bba788de2fb2f6c738fb9cca47f47b634c
                                                              • Opcode Fuzzy Hash: 06df2142d5dd0183fd0e01b7d5608ecb5bc0210788fa76ce78b9fbce82fbb0aa
                                                              • Instruction Fuzzy Hash: 4DF0F4716556949ADB988F28A4627697B91F348384FD0891AE68D83E14D73CD451CF04

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                              • String ID: d
                                                              • API String ID: 2005889112-2564639436
                                                              • Opcode ID: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                              • Instruction ID: b740fa242cbf1f266e4526be60f7363d19b6e9ac65ae64164cce1d92dafaab22
                                                              • Opcode Fuzzy Hash: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                              • Instruction Fuzzy Hash: A9516B76240B84A7EB50CF62E56839ABBA1F789F89F858524EA4D07728DF3CD449C710

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: CurrentThread$AddressHandleModuleProc
                                                              • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                              • API String ID: 4175298099-1975688563
                                                              • Opcode ID: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                              • Instruction ID: d8095b84292e233ac819eb03bbfedb0b50098bbdc8a3da09472025dc51ed1e18
                                                              • Opcode Fuzzy Hash: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                              • Instruction Fuzzy Hash: 163192742C4A4AB1EA04EF69EC716E43B60BB54348FC25C13F44D071AA9F79F659C391

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 209 1b1c6a96910-1b1c6a96916 210 1b1c6a96951-1b1c6a9695b 209->210 211 1b1c6a96918-1b1c6a9691b 209->211 214 1b1c6a96a78-1b1c6a96a8d 210->214 212 1b1c6a9691d-1b1c6a96920 211->212 213 1b1c6a96945-1b1c6a96984 call 1b1c6a96fc0 211->213 215 1b1c6a96922-1b1c6a96925 212->215 216 1b1c6a96938 __scrt_dllmain_crt_thread_attach 212->216 229 1b1c6a9698a-1b1c6a9699f call 1b1c6a96e54 213->229 230 1b1c6a96a52 213->230 217 1b1c6a96a9c-1b1c6a96ab6 call 1b1c6a96e54 214->217 218 1b1c6a96a8f 214->218 220 1b1c6a96931-1b1c6a96936 call 1b1c6a96f04 215->220 221 1b1c6a96927-1b1c6a96930 215->221 224 1b1c6a9693d-1b1c6a96944 216->224 232 1b1c6a96aef-1b1c6a96b20 call 1b1c6a97190 217->232 233 1b1c6a96ab8-1b1c6a96aed call 1b1c6a96f7c call 1b1c6a96e1c call 1b1c6a97318 call 1b1c6a97130 call 1b1c6a97154 call 1b1c6a96fac 217->233 222 1b1c6a96a91-1b1c6a96a9b 218->222 220->224 241 1b1c6a96a6a-1b1c6a96a77 call 1b1c6a97190 229->241 242 1b1c6a969a5-1b1c6a969b6 call 1b1c6a96ec4 229->242 234 1b1c6a96a54-1b1c6a96a69 230->234 243 1b1c6a96b22-1b1c6a96b28 232->243 244 1b1c6a96b31-1b1c6a96b37 232->244 233->222 241->214 262 1b1c6a969b8-1b1c6a969dc call 1b1c6a972dc call 1b1c6a96e0c call 1b1c6a96e38 call 1b1c6a9ac0c 242->262 263 1b1c6a96a07-1b1c6a96a11 call 1b1c6a97130 242->263 243->244 248 1b1c6a96b2a-1b1c6a96b2c 243->248 249 1b1c6a96b39-1b1c6a96b43 244->249 250 1b1c6a96b7e-1b1c6a96b94 call 1b1c6a9268c 244->250 256 1b1c6a96c1f-1b1c6a96c2c 248->256 257 1b1c6a96b4f-1b1c6a96b5d call 1b1c6aa5780 249->257 258 1b1c6a96b45-1b1c6a96b4d 249->258 270 1b1c6a96bcc-1b1c6a96bce 250->270 271 1b1c6a96b96-1b1c6a96b98 250->271 259 1b1c6a96b63-1b1c6a96b78 call 1b1c6a96910 257->259 275 1b1c6a96c15-1b1c6a96c1d 257->275 258->259 259->250 259->275 262->263 311 1b1c6a969de-1b1c6a969e5 __scrt_dllmain_after_initialize_c 262->311 263->230 282 1b1c6a96a13-1b1c6a96a1f call 1b1c6a97180 263->282 272 1b1c6a96bd0-1b1c6a96bd3 270->272 273 1b1c6a96bd5-1b1c6a96bea call 1b1c6a96910 270->273 271->270 279 1b1c6a96b9a-1b1c6a96bbc call 1b1c6a9268c call 1b1c6a96a78 271->279 272->273 272->275 273->275 291 1b1c6a96bec-1b1c6a96bf6 273->291 275->256 279->270 306 1b1c6a96bbe-1b1c6a96bc6 call 1b1c6aa5780 279->306 299 1b1c6a96a21-1b1c6a96a2b call 1b1c6a97098 282->299 300 1b1c6a96a45-1b1c6a96a50 282->300 296 1b1c6a96c01-1b1c6a96c11 call 1b1c6aa5780 291->296 297 1b1c6a96bf8-1b1c6a96bff 291->297 296->275 297->275 299->300 312 1b1c6a96a2d-1b1c6a96a3b 299->312 300->234 306->270 311->263 313 1b1c6a969e7-1b1c6a96a04 call 1b1c6a9abc8 311->313 312->300 313->263
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3393309014.000001B1C6A90000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001B1C6A90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6a90000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                              • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                                                              • API String ID: 190073905-1786718095
                                                              • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction ID: f448be6a39feb2ef7bc56c0f5d618c5755ea43ff2293a3133e011f3e77ce9258
                                                              • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction Fuzzy Hash: 0781D279780281A6FA509B2594713D93EA0EF85780FF7AC25BA0D47BB7DB38F8458704

                                                              Control-flow Graph

                                                              APIs
                                                              • GetLastError.KERNEL32 ref: 000001B1C6ACCE37
                                                              • FlsGetValue.KERNEL32(?,?,?,000001B1C6AD0A6B,?,?,?,000001B1C6AD045C,?,?,?,000001B1C6ACC84F), ref: 000001B1C6ACCE4C
                                                              • FlsSetValue.KERNEL32(?,?,?,000001B1C6AD0A6B,?,?,?,000001B1C6AD045C,?,?,?,000001B1C6ACC84F), ref: 000001B1C6ACCE6D
                                                              • FlsSetValue.KERNEL32(?,?,?,000001B1C6AD0A6B,?,?,?,000001B1C6AD045C,?,?,?,000001B1C6ACC84F), ref: 000001B1C6ACCE9A
                                                              • FlsSetValue.KERNEL32(?,?,?,000001B1C6AD0A6B,?,?,?,000001B1C6AD045C,?,?,?,000001B1C6ACC84F), ref: 000001B1C6ACCEAB
                                                              • FlsSetValue.KERNEL32(?,?,?,000001B1C6AD0A6B,?,?,?,000001B1C6AD045C,?,?,?,000001B1C6ACC84F), ref: 000001B1C6ACCEBC
                                                              • SetLastError.KERNEL32 ref: 000001B1C6ACCED7
                                                              • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,000001B1C6AD0A6B,?,?,?,000001B1C6AD045C,?,?,?,000001B1C6ACC84F), ref: 000001B1C6ACCF0D
                                                              • FlsSetValue.KERNEL32(?,?,00000001,000001B1C6ACECCC,?,?,?,?,000001B1C6ACBF9F,?,?,?,?,?,000001B1C6AC7AB0), ref: 000001B1C6ACCF2C
                                                                • Part of subcall function 000001B1C6ACD6CC: HeapAlloc.KERNEL32 ref: 000001B1C6ACD721
                                                              • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000001B1C6AD0A6B,?,?,?,000001B1C6AD045C,?,?,?,000001B1C6ACC84F), ref: 000001B1C6ACCF54
                                                                • Part of subcall function 000001B1C6ACD744: HeapFree.KERNEL32 ref: 000001B1C6ACD75A
                                                                • Part of subcall function 000001B1C6ACD744: GetLastError.KERNEL32 ref: 000001B1C6ACD764
                                                              • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000001B1C6AD0A6B,?,?,?,000001B1C6AD045C,?,?,?,000001B1C6ACC84F), ref: 000001B1C6ACCF65
                                                              • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000001B1C6AD0A6B,?,?,?,000001B1C6AD045C,?,?,?,000001B1C6ACC84F), ref: 000001B1C6ACCF76
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorLast$Heap$AllocFree
                                                              • String ID:
                                                              • API String ID: 570795689-0
                                                              • Opcode ID: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                              • Instruction ID: c25bcbc689e24c66c1e3095cf70a305341d4106e748bd4568c7f8916963b8972
                                                              • Opcode Fuzzy Hash: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                              • Instruction Fuzzy Hash: F64173302C164475FA68A73955723E93A815F467B0FD64F24B93F076EEDF2AF4118600

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                              • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                              • API String ID: 2171963597-1373409510
                                                              • Opcode ID: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                              • Instruction ID: 98e3922eac11cacbfc2a19cabede87a5eb414de4af235cdd8cf18581859dcf2e
                                                              • Opcode Fuzzy Hash: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                              • Instruction Fuzzy Hash: 35217C32658B40A3FB108B24F46439A7BA0F799BE4F914615FA5D03BA8CF3CE149CB01

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 467 1b1c6a99944-1b1c6a999ac call 1b1c6a9a814 470 1b1c6a999b2-1b1c6a999b5 467->470 471 1b1c6a99e13-1b1c6a99e1b call 1b1c6a9bb48 467->471 470->471 472 1b1c6a999bb-1b1c6a999c1 470->472 474 1b1c6a99a90-1b1c6a99aa2 472->474 475 1b1c6a999c7-1b1c6a999cb 472->475 477 1b1c6a99d63-1b1c6a99d67 474->477 478 1b1c6a99aa8-1b1c6a99aac 474->478 475->474 479 1b1c6a999d1-1b1c6a999dc 475->479 482 1b1c6a99d69-1b1c6a99d70 477->482 483 1b1c6a99da0-1b1c6a99daa call 1b1c6a98a34 477->483 478->477 480 1b1c6a99ab2-1b1c6a99abd 478->480 479->474 481 1b1c6a999e2-1b1c6a999e7 479->481 480->477 485 1b1c6a99ac3-1b1c6a99aca 480->485 481->474 486 1b1c6a999ed-1b1c6a999f7 call 1b1c6a98a34 481->486 482->471 487 1b1c6a99d76-1b1c6a99d9b call 1b1c6a99e1c 482->487 483->471 493 1b1c6a99dac-1b1c6a99dcb call 1b1c6a96d40 483->493 489 1b1c6a99ad0-1b1c6a99b07 call 1b1c6a98e10 485->489 490 1b1c6a99c94-1b1c6a99ca0 485->490 486->493 501 1b1c6a999fd-1b1c6a99a28 call 1b1c6a98a34 * 2 call 1b1c6a99124 486->501 487->483 489->490 505 1b1c6a99b0d-1b1c6a99b15 489->505 490->483 494 1b1c6a99ca6-1b1c6a99caa 490->494 498 1b1c6a99cba-1b1c6a99cc2 494->498 499 1b1c6a99cac-1b1c6a99cb8 call 1b1c6a990e4 494->499 498->483 504 1b1c6a99cc8-1b1c6a99cd5 call 1b1c6a98cb4 498->504 499->498 511 1b1c6a99cdb-1b1c6a99ce3 499->511 534 1b1c6a99a2a-1b1c6a99a2e 501->534 535 1b1c6a99a48-1b1c6a99a52 call 1b1c6a98a34 501->535 504->483 504->511 509 1b1c6a99b19-1b1c6a99b4b 505->509 513 1b1c6a99b51-1b1c6a99b5c 509->513 514 1b1c6a99c87-1b1c6a99c8e 509->514 517 1b1c6a99ce9-1b1c6a99ced 511->517 518 1b1c6a99df6-1b1c6a99e12 call 1b1c6a98a34 * 2 call 1b1c6a9baa8 511->518 513->514 519 1b1c6a99b62-1b1c6a99b7b 513->519 514->490 514->509 520 1b1c6a99d00 517->520 521 1b1c6a99cef-1b1c6a99cfe call 1b1c6a990e4 517->521 518->471 522 1b1c6a99b81-1b1c6a99bc6 call 1b1c6a990f8 * 2 519->522 523 1b1c6a99c74-1b1c6a99c79 519->523 531 1b1c6a99d03-1b1c6a99d0d call 1b1c6a9a8ac 520->531 521->531 548 1b1c6a99c04-1b1c6a99c0a 522->548 549 1b1c6a99bc8-1b1c6a99bee call 1b1c6a990f8 call 1b1c6a9a038 522->549 528 1b1c6a99c84 523->528 528->514 531->483 546 1b1c6a99d13-1b1c6a99d61 call 1b1c6a98d44 call 1b1c6a98f50 531->546 534->535 539 1b1c6a99a30-1b1c6a99a3b 534->539 535->474 552 1b1c6a99a54-1b1c6a99a74 call 1b1c6a98a34 * 2 call 1b1c6a9a8ac 535->552 539->535 544 1b1c6a99a3d-1b1c6a99a42 539->544 544->471 544->535 546->483 556 1b1c6a99c0c-1b1c6a99c10 548->556 557 1b1c6a99c7b 548->557 567 1b1c6a99bf0-1b1c6a99c02 549->567 568 1b1c6a99c15-1b1c6a99c72 call 1b1c6a99870 549->568 572 1b1c6a99a8b 552->572 573 1b1c6a99a76-1b1c6a99a80 call 1b1c6a9a99c 552->573 556->522 558 1b1c6a99c80 557->558 558->528 567->548 567->549 568->558 572->474 577 1b1c6a99df0-1b1c6a99df5 call 1b1c6a9baa8 573->577 578 1b1c6a99a86-1b1c6a99def call 1b1c6a986ac call 1b1c6a9a3f4 call 1b1c6a988a0 573->578 577->518 578->577
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3393309014.000001B1C6A90000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001B1C6A90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6a90000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                              • String ID: csm$csm$csm
                                                              • API String ID: 849930591-393685449
                                                              • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                              • Instruction ID: 49ffe97ff2380bfb29351c53732f7f06ef1d3a3cf25e399ad2a6f644fe3eedb8
                                                              • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                              • Instruction Fuzzy Hash: D0E1D13A640BC0AAEB60DF25D4903DD3BA0F749798FA60906FE8D47B99CB34E091C704

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 588 1b1c6aca544-1b1c6aca5ac call 1b1c6acb414 591 1b1c6aca5b2-1b1c6aca5b5 588->591 592 1b1c6acaa13-1b1c6acaa1b call 1b1c6acc748 588->592 591->592 594 1b1c6aca5bb-1b1c6aca5c1 591->594 595 1b1c6aca690-1b1c6aca6a2 594->595 596 1b1c6aca5c7-1b1c6aca5cb 594->596 598 1b1c6aca6a8-1b1c6aca6ac 595->598 599 1b1c6aca963-1b1c6aca967 595->599 596->595 600 1b1c6aca5d1-1b1c6aca5dc 596->600 598->599 601 1b1c6aca6b2-1b1c6aca6bd 598->601 603 1b1c6aca9a0-1b1c6aca9aa call 1b1c6ac9634 599->603 604 1b1c6aca969-1b1c6aca970 599->604 600->595 602 1b1c6aca5e2-1b1c6aca5e7 600->602 601->599 605 1b1c6aca6c3-1b1c6aca6ca 601->605 602->595 606 1b1c6aca5ed-1b1c6aca5f7 call 1b1c6ac9634 602->606 603->592 617 1b1c6aca9ac-1b1c6aca9cb call 1b1c6ac7940 603->617 604->592 607 1b1c6aca976-1b1c6aca99b call 1b1c6acaa1c 604->607 609 1b1c6aca6d0-1b1c6aca707 call 1b1c6ac9a10 605->609 610 1b1c6aca894-1b1c6aca8a0 605->610 606->617 621 1b1c6aca5fd-1b1c6aca628 call 1b1c6ac9634 * 2 call 1b1c6ac9d24 606->621 607->603 609->610 625 1b1c6aca70d-1b1c6aca715 609->625 610->603 614 1b1c6aca8a6-1b1c6aca8aa 610->614 618 1b1c6aca8ba-1b1c6aca8c2 614->618 619 1b1c6aca8ac-1b1c6aca8b8 call 1b1c6ac9ce4 614->619 618->603 624 1b1c6aca8c8-1b1c6aca8d5 call 1b1c6ac98b4 618->624 619->618 632 1b1c6aca8db-1b1c6aca8e3 619->632 656 1b1c6aca62a-1b1c6aca62e 621->656 657 1b1c6aca648-1b1c6aca652 call 1b1c6ac9634 621->657 624->603 624->632 630 1b1c6aca719-1b1c6aca74b 625->630 634 1b1c6aca887-1b1c6aca88e 630->634 635 1b1c6aca751-1b1c6aca75c 630->635 637 1b1c6aca8e9-1b1c6aca8ed 632->637 638 1b1c6aca9f6-1b1c6acaa12 call 1b1c6ac9634 * 2 call 1b1c6acc6a8 632->638 634->610 634->630 635->634 639 1b1c6aca762-1b1c6aca77b 635->639 641 1b1c6aca8ef-1b1c6aca8fe call 1b1c6ac9ce4 637->641 642 1b1c6aca900 637->642 638->592 643 1b1c6aca781-1b1c6aca7c6 call 1b1c6ac9cf8 * 2 639->643 644 1b1c6aca874-1b1c6aca879 639->644 652 1b1c6aca903-1b1c6aca90d call 1b1c6acb4ac 641->652 642->652 672 1b1c6aca7c8-1b1c6aca7ee call 1b1c6ac9cf8 call 1b1c6acac38 643->672 673 1b1c6aca804-1b1c6aca80a 643->673 649 1b1c6aca884 644->649 649->634 652->603 664 1b1c6aca913-1b1c6aca961 call 1b1c6ac9944 call 1b1c6ac9b50 652->664 656->657 663 1b1c6aca630-1b1c6aca63b 656->663 657->595 671 1b1c6aca654-1b1c6aca674 call 1b1c6ac9634 * 2 call 1b1c6acb4ac 657->671 663->657 668 1b1c6aca63d-1b1c6aca642 663->668 664->603 668->592 668->657 694 1b1c6aca68b 671->694 695 1b1c6aca676-1b1c6aca680 call 1b1c6acb59c 671->695 688 1b1c6aca7f0-1b1c6aca802 672->688 689 1b1c6aca815-1b1c6aca872 call 1b1c6aca470 672->689 677 1b1c6aca87b 673->677 678 1b1c6aca80c-1b1c6aca810 673->678 682 1b1c6aca880 677->682 678->643 682->649 688->672 688->673 689->682 694->595 698 1b1c6aca9f0-1b1c6aca9f5 call 1b1c6acc6a8 695->698 699 1b1c6aca686-1b1c6aca9ef call 1b1c6ac92ac call 1b1c6acaff4 call 1b1c6ac94a0 695->699 698->638 699->698
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                              • String ID: csm$csm$csm
                                                              • API String ID: 849930591-393685449
                                                              • Opcode ID: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                              • Instruction ID: 03422168af1b860ecf4f67d9a185186771ae888716f3b09531f1c6894cb59ddd
                                                              • Opcode Fuzzy Hash: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                              • Instruction Fuzzy Hash: 9AE18D72644B80BAEB209F69D4913ED7BA0F744B98F920915FF8D57B99CB36E481C700

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeLibraryProc
                                                              • String ID: api-ms-$ext-ms-
                                                              • API String ID: 3013587201-537541572
                                                              • Opcode ID: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                              • Instruction ID: dd68129fc80123ccd890c035eb6b6910e33736fcaf356babbbf41ac8794ea16d
                                                              • Opcode Fuzzy Hash: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                              • Instruction Fuzzy Hash: FF41E932391A1072FA15CF16AA207D53B95BB49BE0F874925BD0E87798EF39E4458310

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 739 1b1c6ac104c-1b1c6ac10b9 RegQueryInfoKeyW 740 1b1c6ac10bf-1b1c6ac10c9 739->740 741 1b1c6ac11b5-1b1c6ac11d0 739->741 740->741 742 1b1c6ac10cf-1b1c6ac111f RegEnumValueW 740->742 743 1b1c6ac11a5-1b1c6ac11af 742->743 744 1b1c6ac1125-1b1c6ac112a 742->744 743->741 743->742 744->743 745 1b1c6ac112c-1b1c6ac1135 744->745 746 1b1c6ac1147-1b1c6ac114c 745->746 747 1b1c6ac1137 745->747 749 1b1c6ac114e-1b1c6ac1193 GetProcessHeap call 1b1c6ad6168 GetProcessHeap HeapFree 746->749 750 1b1c6ac1199-1b1c6ac11a3 746->750 748 1b1c6ac113b-1b1c6ac113f 747->748 748->743 751 1b1c6ac1141-1b1c6ac1145 748->751 749->750 750->743 751->746 751->748
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                              • String ID: d
                                                              • API String ID: 3743429067-2564639436
                                                              • Opcode ID: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                              • Instruction ID: fc23889e34bab73044a0d59cfcc22dee8f75a5e2c1deb83a1f3e770fbe4eaf75
                                                              • Opcode Fuzzy Hash: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                              • Instruction Fuzzy Hash: C6418D33214B84E6E760CF65E45439A7BA1F388B88F848129EB8D07B58DF3DD849CB10
                                                              APIs
                                                              • FlsGetValue.KERNEL32(?,?,?,000001B1C6ACC7DE,?,?,?,?,?,?,?,?,000001B1C6ACCF9D,?,?,00000001), ref: 000001B1C6ACD087
                                                              • FlsSetValue.KERNEL32(?,?,?,000001B1C6ACC7DE,?,?,?,?,?,?,?,?,000001B1C6ACCF9D,?,?,00000001), ref: 000001B1C6ACD0A6
                                                              • FlsSetValue.KERNEL32(?,?,?,000001B1C6ACC7DE,?,?,?,?,?,?,?,?,000001B1C6ACCF9D,?,?,00000001), ref: 000001B1C6ACD0CE
                                                              • FlsSetValue.KERNEL32(?,?,?,000001B1C6ACC7DE,?,?,?,?,?,?,?,?,000001B1C6ACCF9D,?,?,00000001), ref: 000001B1C6ACD0DF
                                                              • FlsSetValue.KERNEL32(?,?,?,000001B1C6ACC7DE,?,?,?,?,?,?,?,?,000001B1C6ACCF9D,?,?,00000001), ref: 000001B1C6ACD0F0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID: 1%$Y%
                                                              • API String ID: 3702945584-1395475152
                                                              • Opcode ID: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                              • Instruction ID: 36c8b79a06f3977a8ff02470e41d30a228c5a494f583a95489321fa1baa1510b
                                                              • Opcode Fuzzy Hash: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                              • Instruction Fuzzy Hash: 5C114F3068469471FA68A72959713E979815B447F0FD64B24F82E076DEDF2AE812C600
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                              • String ID:
                                                              • API String ID: 190073905-0
                                                              • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction ID: 04987082a9ea673c8b8c9cbaea48ff1c48f52f097e92d6e5a47ec4460310f59b
                                                              • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction Fuzzy Hash: EE81D331680605B6FB50AB2998713E97ED0AB95780FD74C15FA0D477AFEB3AE845C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: Library$Load$AddressErrorFreeLastProc
                                                              • String ID: api-ms-
                                                              • API String ID: 2559590344-2084034818
                                                              • Opcode ID: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                              • Instruction ID: 507661ff5144f00537b451bfe7be827fbc1386f3c62502647a7bf8c6b235eba2
                                                              • Opcode Fuzzy Hash: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                              • Instruction Fuzzy Hash: 0631C331292B40F1EE12DB46A4207D53B94B769BA0F9B4D25FD2F0B798EF3AE4458314
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                              • String ID: CONOUT$
                                                              • API String ID: 3230265001-3130406586
                                                              • Opcode ID: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                              • Instruction ID: be3b0f8887062391fe1ae4cf53451e7235dccab882c1012ef0e111b28c801182
                                                              • Opcode Fuzzy Hash: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                              • Instruction Fuzzy Hash: CB11C132350B4093E7508B56E864399BBA0F799FE4F854A24FA1E877A4CF78D8148741
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcessProtectVirtual$HandleModule
                                                              • String ID: wr
                                                              • API String ID: 1092925422-2678910430
                                                              • Opcode ID: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                              • Instruction ID: b7bac0445357c990dfe6a6ac8974f74b321709d00a38a4d420291f54e7b77e09
                                                              • Opcode Fuzzy Hash: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                              • Instruction Fuzzy Hash: 9C118E36340B41E3EF549B15F4246A97AA0F748B84F864828EF8D037A8EF3ED505C704
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: Thread$Current$Context
                                                              • String ID:
                                                              • API String ID: 1666949209-0
                                                              • Opcode ID: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                                                              • Instruction ID: 21a945ff8aa95bc20dcaf915828ad5ba8adac9587035b97c77f03359aa361f3b
                                                              • Opcode Fuzzy Hash: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                                                              • Instruction Fuzzy Hash: F9D1AA36248B88A5DA70DB06E4A039A7FA0F7C8B84F510516FACD47BA9DF3DD551CB40
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$AllocFree
                                                              • String ID: dialer
                                                              • API String ID: 756756679-3528709123
                                                              • Opcode ID: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                              • Instruction ID: b8accb6ef8aff5d08221ad3f8d0c44c472a000bb793e6ed3b1d0bc9fce79a5c1
                                                              • Opcode Fuzzy Hash: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                              • Instruction Fuzzy Hash: 0F31C236345B55B7E610CF16E5607A97BA0FB54B80F8A4820BF4C47B59EF35E461C740
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$Free
                                                              • String ID: C:\Windows\system32\wbem\wmiprvse.exe
                                                              • API String ID: 3168794593-1259001766
                                                              • Opcode ID: 335002606d0c58216c4b7b8c214cf2e956f7ef49abbb5e195d674a66fc258290
                                                              • Instruction ID: d7fc4e1b615de034072dde7412f8cffbe11dec46ef61a794af04bdf23f84ccac
                                                              • Opcode Fuzzy Hash: 335002606d0c58216c4b7b8c214cf2e956f7ef49abbb5e195d674a66fc258290
                                                              • Instruction Fuzzy Hash: 1C21E377588AC0ABE250DF2598652C87FA0F766B44F8B5816FB4D43263DB25E4058712
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorLast
                                                              • String ID:
                                                              • API String ID: 2506987500-0
                                                              • Opcode ID: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                              • Instruction ID: 613b65d7407ab29ee997d2a634b99022eeb73a04cedac2c3ab4eff958ab3b09c
                                                              • Opcode Fuzzy Hash: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                              • Instruction Fuzzy Hash: F6115130280690B2FA64672955753E979815F587F0FD64F24F83F476DEDF6AE411C600
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                              • String ID:
                                                              • API String ID: 517849248-0
                                                              • Opcode ID: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                              • Instruction ID: 980cae9893c77f6852d200de1b4d3d05c7231acfb2edd9e2958734afd52be645
                                                              • Opcode Fuzzy Hash: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                              • Instruction Fuzzy Hash: 8A018C31340A40A2EB10DB52A868399BBA1F798FC0FC94835EE4D43768DF3CD989C700
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                              • String ID:
                                                              • API String ID: 449555515-0
                                                              • Opcode ID: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                              • Instruction ID: 0b6985639906f41542042cdb8bd04432224b9c4183cad2879d4c7ae577c5bdcd
                                                              • Opcode Fuzzy Hash: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                              • Instruction Fuzzy Hash: 66018078351744E7FF249B22E8283953BA0BB55B82F864824EE4D07764EF3DE108C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 2395640692-629598281
                                                              • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                              • Instruction ID: df30bac812e705aa93aabe8828380b214c73b4065404643d2704264535ea0798
                                                              • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                              • Instruction Fuzzy Hash: 7851D632741200BBDB94CF19D459B983B99F344B88F938924EA0F4374CDB36E941C718
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 2395640692-629598281
                                                              • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                              • Instruction ID: cce8c978aea041559edddc82bfa948f1282a875985ba24eb681de7d9aa7576ea
                                                              • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                              • Instruction Fuzzy Hash: 6631AD32280640B6E754DF16E8687997FA9F744B88F868814FE4F0778DDB3AE941C709
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: FinalHandleNamePathlstrlen
                                                              • String ID: \\?\
                                                              • API String ID: 2719912262-4282027825
                                                              • Opcode ID: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                              • Instruction ID: 03f469b15207bf167db16f7c03a254700214e32310a71833cc3ed4b89b73cac2
                                                              • Opcode Fuzzy Hash: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                              • Instruction Fuzzy Hash: 37F04F32344641A3EB609B21F8A47D97B60F798B88FC59420EA4D47968DF3DDA8DCB00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: CombinePath
                                                              • String ID: \\.\pipe\
                                                              • API String ID: 3422762182-91387939
                                                              • Opcode ID: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                              • Instruction ID: b227b671d4e67eed1ded54a60a1f2944a386c55b893f6d14d4ba41f5df64ea97
                                                              • Opcode Fuzzy Hash: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                              • Instruction Fuzzy Hash: C3F08231344B80A3EA008F13B924199BA60BB58FC0F856830FE4E07B28DF3CD4458701
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                              • String ID: CorExitProcess$mscoree.dll
                                                              • API String ID: 4061214504-1276376045
                                                              • Opcode ID: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                              • Instruction ID: b125ed205e92b6aa361d0616ba8bcff5924271551aa4aa233fa3444cb924b2f5
                                                              • Opcode Fuzzy Hash: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                              • Instruction Fuzzy Hash: 05F0F631350704A3EB148B24E4643D97B30EB98BA4FC51A19EA6E071F4DF3DE444C300
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: CurrentThread
                                                              • String ID:
                                                              • API String ID: 2882836952-0
                                                              • Opcode ID: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                                                              • Instruction ID: 76e6d0fae13c16938a2042db75b79b27a2090ae1ab8243c23e18f414bb2a82e2
                                                              • Opcode Fuzzy Hash: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                                                              • Instruction Fuzzy Hash: 6202E832259B8496EB60CB59F4A079ABBA0F3C4794F510415FA8E87BA8DF7DD494CF00
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: CurrentThread
                                                              • String ID:
                                                              • API String ID: 2882836952-0
                                                              • Opcode ID: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                                                              • Instruction ID: 35ce9029f31d81feaf5b095a57c3b8cbe4a42b2023ddab7b93e285dbfca3c628
                                                              • Opcode Fuzzy Hash: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                                                              • Instruction Fuzzy Hash: 71613C36558B40E6EB60CB15E46075ABFE0F388784F910915FA8E47BA8CB7DD8A4CF00
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3393309014.000001B1C6A90000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001B1C6A90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6a90000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: _set_statfp
                                                              • String ID:
                                                              • API String ID: 1156100317-0
                                                              • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction ID: f4eeeacd04ecb2e41daef18e56ffc623bd7f242eef64ab5e9261f1e0d73ab7ae
                                                              • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction Fuzzy Hash: 4C118632990A1339FA54151CD4773FD39D0EB58374ECA4E2ABB6E872D78764E4455D00
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: _set_statfp
                                                              • String ID:
                                                              • API String ID: 1156100317-0
                                                              • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction ID: 7d70fbecd9576c303d4b39871392893d72113701f3f254669319dea053847bc6
                                                              • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction Fuzzy Hash: 9E119432AD0B903BF6641568D4763E93950EF783F8FCA0F24B57E076D68B24E8514162
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3393309014.000001B1C6A90000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001B1C6A90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6a90000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID: Tuesday$Wednesday$or copy constructor iterator'
                                                              • API String ID: 3215553584-4202648911
                                                              • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                              • Instruction ID: 8a0ca9d721b6eb4e3af4553f2d7ae5330e92f94a7d645c0b3bcfa555b6c20a00
                                                              • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                              • Instruction Fuzzy Hash: D661B27E6846C062FA699B24D4703EE7EA1E78A740FF74C15FA1E077A4EB34E8418350
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: CallEncodePointerTranslator
                                                              • String ID: MOC$RCC
                                                              • API String ID: 3544855599-2084237596
                                                              • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction ID: 784af5eb1faade5d558cda6845aa0a2f8ff390df7549530575874daebdd5e33b
                                                              • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction Fuzzy Hash: A5616932A04B84AAEB20DF65D4503ED7BA0F388B8CF454A15EF4E17B99DB39E595C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3393309014.000001B1C6A90000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001B1C6A90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6a90000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                              • String ID: csm$csm
                                                              • API String ID: 3896166516-3733052814
                                                              • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction ID: bf2f027a5753205f0198892e719a1bc36210c3e55530b43b2422f9943f9932ee
                                                              • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction Fuzzy Hash: 3251A03E1403C0EAEB649B269464399BBA0F355B84FAA5917FB9D87BD5CB38E450C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                              • String ID: csm$csm
                                                              • API String ID: 3896166516-3733052814
                                                              • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction ID: 6ebdfb4ec8773dcd7a1e5f40637557e9561884987d3c95976d2b8ef0e27961e7
                                                              • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction Fuzzy Hash: B151CF72180280BAEB648F1595A43A87BA0F755BC4F964915FB8D47BD9CB39E450C740
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3393309014.000001B1C6A90000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001B1C6A90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6a90000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritable__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 3242871069-629598281
                                                              • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                              • Instruction ID: bb2fe3d6429b31a73479642f3f874b8b7d8025426b33db784f0b649a527e6008
                                                              • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                              • Instruction Fuzzy Hash: 0251D33A741280ABDB58CF15E454B9C3B95F350B98FA28D25FA1F47788EB34E844CB04
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3393309014.000001B1C6A90000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001B1C6A90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6a90000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritable__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 3242871069-629598281
                                                              • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                              • Instruction ID: c533ce58de8cfd1016b4ab9f1dc4d9656fa7d107685e85ab233b76a0693b69c2
                                                              • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                              • Instruction Fuzzy Hash: 9531BF36241780A6E759DF11E86479D7BA8F740B88FA68C14FE5F47789DB38E940CB04
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: FileWrite$ConsoleErrorLastOutput
                                                              • String ID:
                                                              • API String ID: 2718003287-0
                                                              • Opcode ID: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                              • Instruction ID: ec3ce314404d70993f5e4c9894c5ca3a44715a0dbf2e3b51f371d536b7763860
                                                              • Opcode Fuzzy Hash: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                              • Instruction Fuzzy Hash: EED10072B18A80AAE711CFA9D4603DC3BB1F364798F818616EF5E97B99DB34D506C340
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: ConsoleErrorLastMode
                                                              • String ID:
                                                              • API String ID: 953036326-0
                                                              • Opcode ID: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                              • Instruction ID: 3e488811482f005139fbe8b141cc474a38b6f147dba0c4b23f96e1ba0213d1cf
                                                              • Opcode Fuzzy Hash: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                              • Instruction Fuzzy Hash: 0C91F432748650A6F760DF2584603ED3FA0F724B88F964909EF4E57AD5DB74E882C702
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: FileType
                                                              • String ID: \\.\pipe\
                                                              • API String ID: 3081899298-91387939
                                                              • Opcode ID: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                              • Instruction ID: 6b8293a93ef6df7e5789905b956b20c5c6fd56f2705e24314fcb02ddeae6df13
                                                              • Opcode Fuzzy Hash: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                              • Instruction Fuzzy Hash: 6171BF36248781B6E7249F2598A43EA7B94F389B84F860426FE0D57B8DDF36E6458700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3393309014.000001B1C6A90000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001B1C6A90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6a90000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: CallTranslator
                                                              • String ID: MOC$RCC
                                                              • API String ID: 3163161869-2084237596
                                                              • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction ID: 2253ad4d16d751f3ada021f19c0b19e5337567deb8117d64d5f64436a18e0843
                                                              • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction Fuzzy Hash: 0661AC3BA00B84AAEB20DF65D0903DD7BA0F744B88F694A06EF4D17B98DB38E454C704
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: FileType
                                                              • String ID: \\.\pipe\
                                                              • API String ID: 3081899298-91387939
                                                              • Opcode ID: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                              • Instruction ID: 2a206aeffeda2a39a30598c1543e0c20b9724c9ddfbc78ec32f9dce325111055
                                                              • Opcode Fuzzy Hash: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                              • Instruction Fuzzy Hash: B351D33628C381B2E6249B29A5783EA7E51F385740FC60925EE5E03B5DCB3AE5048740
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastWrite
                                                              • String ID: U
                                                              • API String ID: 442123175-4171548499
                                                              • Opcode ID: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                              • Instruction ID: 6ffe1392b952c4f3879f674b061e7476ef3702aaf34cf104eff357a6618e0a32
                                                              • Opcode Fuzzy Hash: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                              • Instruction Fuzzy Hash: 3A41C432718A80A6EB20DF25E8543E9BBA0F7A8794F824421FF4D87798EB3CD441C741
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFileHeaderRaise
                                                              • String ID: csm
                                                              • API String ID: 2573137834-1018135373
                                                              • Opcode ID: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                              • Instruction ID: 38f9546c50e4e3ebd441e610e11f5c84d752c88406199c83e476e62db676c861
                                                              • Opcode Fuzzy Hash: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                              • Instruction Fuzzy Hash: 7C118C36204B8492EB208F15F410399BBE0FB88B94F994621EF8D07B68DF3DC555CB04
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3393309014.000001B1C6A90000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001B1C6A90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6a90000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: __std_exception_copy
                                                              • String ID: ierarchy Descriptor'$riptor at (
                                                              • API String ID: 592178966-758928094
                                                              • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                              • Instruction ID: bad4d4808b64bdb7a790b951e80baec918a62004558ab803e456f3639b9f1038
                                                              • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                              • Instruction Fuzzy Hash: F7E086B1681B44A0DF018F21E8512DC37A0DB58B64F999522A95C0B312FB38E1E9C701
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3393309014.000001B1C6A90000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001B1C6A90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6a90000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: __std_exception_copy
                                                              • String ID: Locator'$riptor at (
                                                              • API String ID: 592178966-4215709766
                                                              • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                              • Instruction ID: 62489b62b25fe473a36de41a71fc5381d4fdbc4919a257d61973101ba336363a
                                                              • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                              • Instruction Fuzzy Hash: 5AE086B1641B44A0DF058F21E4511DC7760E758B54FC99522D94C0B312EB38E1E5C300
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$AllocFree
                                                              • String ID:
                                                              • API String ID: 756756679-0
                                                              • Opcode ID: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                              • Instruction ID: 8c0da88e56fbf6e324f1e78663727557918132a6c129d742bd505db7ad998eb6
                                                              • Opcode Fuzzy Hash: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                              • Instruction Fuzzy Hash: EE11C135701B44A2EA44CB66A8142A97BE0FB89FC0F8A4424FE4D43779DF39E842C300
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.3394196823.000001B1C6AC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B1C6AC0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_1b1c6ac0000_WmiPrvSE.jbxd
                                                              Similarity
                                                              • API ID: Heap$AllocProcess
                                                              • String ID:
                                                              • API String ID: 1617791916-0
                                                              • Opcode ID: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                              • Instruction ID: 9e0c168021f560b9a638885bb27f1370faf21859a7e4558a598f717a4ae150d2
                                                              • Opcode Fuzzy Hash: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                              • Instruction Fuzzy Hash: 4DE0923564160487EB048FA2D82838A3AE1FB9DF06F86D424DA1D07361DF7DD4D9C761

                                                              Execution Graph

                                                              Execution Coverage:47.1%
                                                              Dynamic/Decrypted Code Coverage:0%
                                                              Signature Coverage:38.1%
                                                              Total number of Nodes:226
                                                              Total number of Limit Nodes:22
                                                              execution_graph 384 7ff6afbe21d0 386 7ff6afbe21dd 384->386 387 7ff6afbe21f2 Sleep 386->387 388 7ff6afbe21fd ConnectNamedPipe 386->388 393 7ff6afbe1b54 AllocateAndInitializeSid 386->393 387->386 389 7ff6afbe2241 Sleep 388->389 390 7ff6afbe220c ReadFile 388->390 392 7ff6afbe224c DisconnectNamedPipe 389->392 391 7ff6afbe222f 390->391 390->392 391->392 392->388 394 7ff6afbe1c6f 393->394 395 7ff6afbe1bb1 SetEntriesInAclW 393->395 394->386 395->394 396 7ff6afbe1bf5 LocalAlloc 395->396 396->394 397 7ff6afbe1c09 InitializeSecurityDescriptor 396->397 397->394 398 7ff6afbe1c19 SetSecurityDescriptorDacl 397->398 398->394 399 7ff6afbe1c30 CreateNamedPipeW 398->399 399->394 527 7ff6afbe2560 528 7ff6afbe2592 527->528 529 7ff6afbe273a 527->529 532 7ff6afbe26c6 GetProcessHeap HeapAlloc K32EnumProcesses 528->532 533 7ff6afbe2598 528->533 530 7ff6afbe297e ReadFile 529->530 531 7ff6afbe2748 529->531 536 7ff6afbe29a8 530->536 587 7ff6afbe2633 530->587 534 7ff6afbe2974 531->534 535 7ff6afbe2751 531->535 537 7ff6afbe2704 532->537 532->587 538 7ff6afbe25a5 533->538 539 7ff6afbe26bd ExitProcess 533->539 540 7ff6afbe175c 22 API calls 534->540 541 7ff6afbe275c 535->541 542 7ff6afbe2919 535->542 547 7ff6afbe18ac 3 API calls 536->547 536->587 549 7ff6afbe10c0 30 API calls 537->549 537->587 543 7ff6afbe25ae 538->543 544 7ff6afbe2660 RegOpenKeyExW 538->544 540->587 545 7ff6afbe2761 541->545 546 7ff6afbe279d 541->546 548 7ff6afbe1944 ReadFile 542->548 556 7ff6afbe25cb ReadFile 543->556 543->587 550 7ff6afbe26a1 544->550 551 7ff6afbe268d RegDeleteValueW 544->551 545->587 609 7ff6afbe217c 545->609 612 7ff6afbe1944 546->612 553 7ff6afbe29c7 547->553 555 7ff6afbe2928 548->555 549->537 596 7ff6afbe19c4 SysAllocString SysAllocString CoInitializeEx 550->596 551->550 563 7ff6afbe29db GetProcessHeap HeapAlloc 553->563 586 7ff6afbe2638 553->586 553->587 565 7ff6afbe1944 ReadFile 555->565 555->587 560 7ff6afbe25f5 556->560 556->587 557 7ff6afbe26a6 604 7ff6afbe175c GetProcessHeap HeapAlloc 557->604 572 7ff6afbe18ac 3 API calls 560->572 560->587 569 7ff6afbe14d8 13 API calls 563->569 564 7ff6afbe27b4 ReadFile 570 7ff6afbe27dc 564->570 564->587 566 7ff6afbe293f 565->566 571 7ff6afbe2947 ShellExecuteW 566->571 566->587 584 7ff6afbe2a14 569->584 576 7ff6afbe27e9 GetProcessHeap HeapAlloc ReadFile 570->576 570->587 571->587 579 7ff6afbe2614 572->579 575 7ff6afbe2a90 4 API calls 575->587 577 7ff6afbe290b GetProcessHeap 576->577 578 7ff6afbe282d 576->578 582 7ff6afbe2a52 HeapFree 577->582 578->577 588 7ff6afbe285e 578->588 589 7ff6afbe2881 lstrlenW GetProcessHeap HeapAlloc 578->589 585 7ff6afbe2624 579->585 579->586 579->587 581 7ff6afbe2a49 GetProcessHeap 581->582 582->587 584->581 636 7ff6afbe16cc 584->636 590 7ff6afbe10c0 30 API calls 585->590 586->575 588->577 616 7ff6afbe1c88 588->616 630 7ff6afbe2a90 CreateFileW 589->630 590->587 597 7ff6afbe1a11 CoInitializeSecurity 596->597 598 7ff6afbe1b2c SysFreeString SysFreeString 596->598 599 7ff6afbe1a4d 597->599 600 7ff6afbe1a59 CoCreateInstance 597->600 598->557 599->600 601 7ff6afbe1b26 CoUninitialize 599->601 600->601 602 7ff6afbe1a88 VariantInit 600->602 601->598 603 7ff6afbe1ade 602->603 603->601 605 7ff6afbe14d8 13 API calls 604->605 607 7ff6afbe179a 605->607 606 7ff6afbe17c8 GetProcessHeap HeapFree 607->606 608 7ff6afbe16cc 5 API calls 607->608 608->607 610 7ff6afbe1914 2 API calls 609->610 611 7ff6afbe2191 610->611 613 7ff6afbe1968 ReadFile 612->613 614 7ff6afbe198b 613->614 615 7ff6afbe19a5 613->615 614->613 614->615 615->564 615->587 617 7ff6afbe1cbb 616->617 618 7ff6afbe1cce CreateProcessW 617->618 621 7ff6afbe1e62 OpenProcess 617->621 623 7ff6afbe1dd2 VirtualAlloc 617->623 624 7ff6afbe1d8c WriteProcessMemory 617->624 629 7ff6afbe1e97 617->629 618->617 619 7ff6afbe1d2b VirtualAllocEx 618->619 619->617 620 7ff6afbe1d60 WriteProcessMemory 619->620 620->617 621->617 622 7ff6afbe1e78 TerminateProcess 621->622 622->617 623->617 625 7ff6afbe1df1 GetThreadContext 623->625 624->617 625->617 626 7ff6afbe1e09 WriteProcessMemory 625->626 626->617 627 7ff6afbe1e30 SetThreadContext 626->627 627->617 628 7ff6afbe1e4e ResumeThread 627->628 628->617 628->629 629->577 631 7ff6afbe28f7 GetProcessHeap HeapFree 630->631 632 7ff6afbe2ada WriteFile 630->632 631->577 633 7ff6afbe2afe 632->633 634 7ff6afbe2b1c CloseHandle 632->634 633->634 635 7ff6afbe2b02 WriteFile 633->635 634->631 635->634 637 7ff6afbe1745 636->637 638 7ff6afbe16eb OpenProcess 636->638 637->581 638->637 639 7ff6afbe1703 638->639 640 7ff6afbe211c 2 API calls 639->640 641 7ff6afbe1723 640->641 642 7ff6afbe173c CloseHandle 641->642 643 7ff6afbe1731 CloseHandle 641->643 642->637 643->642 400 7ff6afbe2bf8 401 7ff6afbe2c05 400->401 402 7ff6afbe1b54 6 API calls 401->402 403 7ff6afbe2c25 ConnectNamedPipe 401->403 404 7ff6afbe2c1a Sleep 401->404 402->401 405 7ff6afbe2c83 Sleep 403->405 406 7ff6afbe2c34 ReadFile 403->406 404->401 407 7ff6afbe2c8e DisconnectNamedPipe 405->407 406->407 408 7ff6afbe2c57 406->408 407->403 411 7ff6afbe2524 408->411 412 7ff6afbe2531 411->412 413 7ff6afbe2539 WriteFile 411->413 415 7ff6afbe10c0 412->415 413->407 453 7ff6afbe18ac OpenProcess 415->453 418 7ff6afbe14ba 418->413 419 7ff6afbe1122 OpenProcess 419->418 420 7ff6afbe113e OpenProcess 419->420 421 7ff6afbe1161 K32GetModuleFileNameExW 420->421 422 7ff6afbe11fd NtQueryInformationProcess 420->422 423 7ff6afbe11aa CloseHandle 421->423 424 7ff6afbe117a PathFindFileNameW lstrlenW 421->424 425 7ff6afbe1224 422->425 426 7ff6afbe14b1 CloseHandle 422->426 423->422 428 7ff6afbe11b8 423->428 424->423 427 7ff6afbe1197 StrCpyW 424->427 425->426 429 7ff6afbe1230 OpenProcessToken 425->429 426->418 427->423 428->422 430 7ff6afbe11d8 StrCmpIW 428->430 429->426 431 7ff6afbe124e GetTokenInformation 429->431 430->426 430->428 432 7ff6afbe12f1 431->432 433 7ff6afbe1276 GetLastError 431->433 435 7ff6afbe12f8 CloseHandle 432->435 433->432 434 7ff6afbe1281 LocalAlloc 433->434 434->432 436 7ff6afbe1297 GetTokenInformation 434->436 435->426 440 7ff6afbe130c 435->440 437 7ff6afbe12df 436->437 438 7ff6afbe12bf GetSidSubAuthorityCount GetSidSubAuthority 436->438 439 7ff6afbe12e6 LocalFree 437->439 438->439 439->435 440->426 441 7ff6afbe139b StrStrA 440->441 442 7ff6afbe13c3 440->442 441->440 443 7ff6afbe13c8 441->443 442->426 443->426 444 7ff6afbe13f3 VirtualAllocEx 443->444 444->426 445 7ff6afbe1420 WriteProcessMemory 444->445 445->426 446 7ff6afbe143b 445->446 458 7ff6afbe211c 446->458 448 7ff6afbe145b 448->426 449 7ff6afbe1478 WaitForSingleObject 448->449 452 7ff6afbe1471 CloseHandle 448->452 451 7ff6afbe1487 GetExitCodeThread 449->451 449->452 451->452 452->426 454 7ff6afbe110e 453->454 455 7ff6afbe18d8 IsWow64Process 453->455 454->418 454->419 456 7ff6afbe18ea 455->456 457 7ff6afbe18f8 CloseHandle 455->457 456->457 457->454 461 7ff6afbe1914 GetModuleHandleA 458->461 462 7ff6afbe1934 GetProcAddress 461->462 463 7ff6afbe193d 461->463 462->463 464 7ff6afbe2b38 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 465 7ff6afbe2b8e K32EnumProcesses 464->465 466 7ff6afbe2beb SleepEx 465->466 467 7ff6afbe2ba3 465->467 466->465 467->466 469 7ff6afbe2540 467->469 470 7ff6afbe254d 469->470 471 7ff6afbe2558 469->471 472 7ff6afbe10c0 30 API calls 470->472 471->467 472->471 473 7ff6afbe2258 476 7ff6afbe226c 473->476 500 7ff6afbe1f2c 476->500 479 7ff6afbe1f2c 14 API calls 480 7ff6afbe228f GetCurrentProcessId OpenProcess 479->480 481 7ff6afbe22af OpenProcessToken 480->481 482 7ff6afbe2321 FindResourceExA 480->482 483 7ff6afbe22c3 LookupPrivilegeValueW 481->483 484 7ff6afbe2318 CloseHandle 481->484 485 7ff6afbe2341 SizeofResource 482->485 486 7ff6afbe2261 ExitProcess 482->486 483->484 487 7ff6afbe22da AdjustTokenPrivileges 483->487 484->482 485->486 488 7ff6afbe235a LoadResource 485->488 487->484 489 7ff6afbe2312 GetLastError 487->489 488->486 490 7ff6afbe236e LockResource GetCurrentProcessId 488->490 489->484 514 7ff6afbe17ec GetProcessHeap HeapAlloc 490->514 492 7ff6afbe238b RegCreateKeyExW 493 7ff6afbe23cc ConvertStringSecurityDescriptorToSecurityDescriptorW 492->493 494 7ff6afbe2489 CreateThread GetProcessHeap HeapAlloc CreateThread CreateThread 492->494 495 7ff6afbe23f4 RegSetKeySecurity LocalFree 493->495 496 7ff6afbe240e RegCreateKeyExW 493->496 497 7ff6afbe250f SleepEx 494->497 495->496 498 7ff6afbe247f RegCloseKey 496->498 499 7ff6afbe2448 GetCurrentProcessId RegSetValueExW RegCloseKey 496->499 497->497 498->494 499->498 501 7ff6afbe1f35 StrCpyW StrCatW GetModuleHandleW 500->501 502 7ff6afbe20ff 500->502 501->502 503 7ff6afbe1f86 GetCurrentProcess K32GetModuleInformation 501->503 502->479 504 7ff6afbe20f6 FreeLibrary 503->504 505 7ff6afbe1fb6 CreateFileW 503->505 504->502 505->504 506 7ff6afbe1feb CreateFileMappingW 505->506 507 7ff6afbe2014 MapViewOfFile 506->507 508 7ff6afbe20ed CloseHandle 506->508 509 7ff6afbe20e4 CloseHandle 507->509 510 7ff6afbe2037 507->510 508->504 509->508 510->509 511 7ff6afbe2050 lstrcmpiA 510->511 513 7ff6afbe208e 510->513 511->510 512 7ff6afbe2090 VirtualProtect VirtualProtect 511->512 512->509 513->509 520 7ff6afbe14d8 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc K32EnumProcesses 514->520 516 7ff6afbe1885 GetProcessHeap HeapFree 517 7ff6afbe1830 517->516 518 7ff6afbe1851 OpenProcess 517->518 518->517 519 7ff6afbe1867 TerminateProcess CloseHandle 518->519 519->517 521 7ff6afbe1565 520->521 522 7ff6afbe162f GetProcessHeap RtlFreeHeap GetProcessHeap RtlFreeHeap 520->522 521->522 523 7ff6afbe157a OpenProcess 521->523 525 7ff6afbe161a CloseHandle 521->525 526 7ff6afbe15c9 ReadProcessMemory 521->526 522->517 523->521 524 7ff6afbe1597 K32EnumProcessModules 523->524 524->521 524->525 525->521 526->521

                                                              Callgraph

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3379453219.00007FF6AFBE1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6AFBE0000, based on PE: true
                                                              • Associated: 0000000C.00000002.3378869560.00007FF6AFBE0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380018046.00007FF6AFBE3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380580288.00007FF6AFBE6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_7ff6afbe0000_dialer.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess$Close$CurrentHandleResource$FileSecurityThread$DescriptorFreeHeapModuleOpenProtectTokenValueVirtual$AdjustAllocConvertErrorFindInformationLastLibraryLoadLocalLockLookupMappingPrivilegePrivilegesSizeofSleepStringViewlstrcmpi
                                                              • String ID: D:(A;OICI;GA;;;AU)(A;OICI;GA;;;BA)$DLL$SOFTWARE\dialerconfig$SeDebugPrivilege$kernel32.dll$ntdll.dll$pid$svc64
                                                              • API String ID: 4177739653-1130149537
                                                              • Opcode ID: d90b24f95a95c841a2e029a5b4d6274d008a65fb61feaf57b7d2a555975f1ca1
                                                              • Instruction ID: 29aacac7fe7db07af24fbb701b71528e40b570e33ab3d471b0b34e25c44fea03
                                                              • Opcode Fuzzy Hash: d90b24f95a95c841a2e029a5b4d6274d008a65fb61feaf57b7d2a555975f1ca1
                                                              • Instruction Fuzzy Hash: D2814F31A0AB4296E720CF21E8545B93BB0FF8B758B4C41B9D94E83AA4DF3CD148C702

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 24 7ff6afbe10c0-7ff6afbe1110 call 7ff6afbe18ac 27 7ff6afbe14ba-7ff6afbe14d6 24->27 28 7ff6afbe1116-7ff6afbe111c 24->28 28->27 29 7ff6afbe1122-7ff6afbe1138 OpenProcess 28->29 29->27 30 7ff6afbe113e-7ff6afbe115b OpenProcess 29->30 31 7ff6afbe1161-7ff6afbe1178 K32GetModuleFileNameExW 30->31 32 7ff6afbe11fd-7ff6afbe121e NtQueryInformationProcess 30->32 33 7ff6afbe11aa-7ff6afbe11b6 CloseHandle 31->33 34 7ff6afbe117a-7ff6afbe1195 PathFindFileNameW lstrlenW 31->34 35 7ff6afbe1224-7ff6afbe122a 32->35 36 7ff6afbe14b1-7ff6afbe14b4 CloseHandle 32->36 33->32 38 7ff6afbe11b8-7ff6afbe11d3 33->38 34->33 37 7ff6afbe1197-7ff6afbe11a7 StrCpyW 34->37 35->36 39 7ff6afbe1230-7ff6afbe1248 OpenProcessToken 35->39 36->27 37->33 40 7ff6afbe11d8-7ff6afbe11ea StrCmpIW 38->40 39->36 41 7ff6afbe124e-7ff6afbe1274 GetTokenInformation 39->41 40->36 42 7ff6afbe11f0-7ff6afbe11fb 40->42 43 7ff6afbe12f1 41->43 44 7ff6afbe1276-7ff6afbe127f GetLastError 41->44 42->32 42->40 46 7ff6afbe12f8-7ff6afbe1306 CloseHandle 43->46 44->43 45 7ff6afbe1281-7ff6afbe1295 LocalAlloc 44->45 45->43 47 7ff6afbe1297-7ff6afbe12bd GetTokenInformation 45->47 46->36 48 7ff6afbe130c-7ff6afbe1313 46->48 49 7ff6afbe12df 47->49 50 7ff6afbe12bf-7ff6afbe12dd GetSidSubAuthorityCount GetSidSubAuthority 47->50 48->36 51 7ff6afbe1319-7ff6afbe1324 48->51 52 7ff6afbe12e6-7ff6afbe12ef LocalFree 49->52 50->52 51->36 53 7ff6afbe132a-7ff6afbe1334 51->53 52->46 53->36 54 7ff6afbe133a-7ff6afbe1344 53->54 54->36 55 7ff6afbe134a-7ff6afbe138a call 7ff6afbe1ec4 * 3 54->55 55->36 62 7ff6afbe1390-7ff6afbe13b0 call 7ff6afbe1ec4 StrStrA 55->62 65 7ff6afbe13b2-7ff6afbe13c1 62->65 66 7ff6afbe13c8-7ff6afbe13ed call 7ff6afbe1ec4 * 2 62->66 65->62 67 7ff6afbe13c3 65->67 66->36 72 7ff6afbe13f3-7ff6afbe141a VirtualAllocEx 66->72 67->36 72->36 73 7ff6afbe1420-7ff6afbe1439 WriteProcessMemory 72->73 73->36 74 7ff6afbe143b-7ff6afbe145d call 7ff6afbe211c 73->74 74->36 77 7ff6afbe145f-7ff6afbe1467 74->77 77->36 78 7ff6afbe1469-7ff6afbe146f 77->78 79 7ff6afbe1471-7ff6afbe1476 78->79 80 7ff6afbe1478-7ff6afbe1485 WaitForSingleObject 78->80 81 7ff6afbe14ab CloseHandle 79->81 82 7ff6afbe1487-7ff6afbe149b GetExitCodeThread 80->82 83 7ff6afbe14a6 80->83 81->36 82->83 84 7ff6afbe149d-7ff6afbe14a3 82->84 83->81 84->83
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3379453219.00007FF6AFBE1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6AFBE0000, based on PE: true
                                                              • Associated: 0000000C.00000002.3378869560.00007FF6AFBE0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380018046.00007FF6AFBE3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380580288.00007FF6AFBE6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_7ff6afbe0000_dialer.jbxd
                                                              Similarity
                                                              • API ID: Process$CloseHandle$Open$InformationToken$AllocAuthorityFileLocalName$CodeCountErrorExitFindFreeLastMemoryModuleObjectPathQuerySingleThreadVirtualWaitWow64Writelstrlen
                                                              • String ID: @$MSBuild.exe$ReflectiveDllMain$dialer.exe
                                                              • API String ID: 2561231171-3753927220
                                                              • Opcode ID: 0577da8a6dab89cee6e9ad54b472e69925a8a9fa9a84297e512ce95199d2773e
                                                              • Instruction ID: 23ce0ad4d59e7f8da228b816d3d7c1cc04285d5d32c9df4675ee1733b757429b
                                                              • Opcode Fuzzy Hash: 0577da8a6dab89cee6e9ad54b472e69925a8a9fa9a84297e512ce95199d2773e
                                                              • Instruction Fuzzy Hash: 93B1A271A0A68286EB24DF12E84067927B5FF87F84F184175DA4E877A4DF3CE549C702

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3379453219.00007FF6AFBE1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6AFBE0000, based on PE: true
                                                              • Associated: 0000000C.00000002.3378869560.00007FF6AFBE0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380018046.00007FF6AFBE3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380580288.00007FF6AFBE6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_7ff6afbe0000_dialer.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$AllocEnumFree$CloseHandleMemoryModulesOpenProcessesRead
                                                              • String ID:
                                                              • API String ID: 4084875642-0
                                                              • Opcode ID: 3ba232721d1513b5cedada72c6e24bd118260bd52d62463099d565cdd5ea385d
                                                              • Instruction ID: b27b93a59c4e87e7f8a2488b33f7b1f0958dc7f8ac4f7688a99fc3dd9261d8e3
                                                              • Opcode Fuzzy Hash: 3ba232721d1513b5cedada72c6e24bd118260bd52d62463099d565cdd5ea385d
                                                              • Instruction Fuzzy Hash: A9519F32B166828AEB60DF62D8546B937A1FB4BB84F484078DE4E877A4DF3CD445C702

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3379453219.00007FF6AFBE1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6AFBE0000, based on PE: true
                                                              • Associated: 0000000C.00000002.3378869560.00007FF6AFBE0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380018046.00007FF6AFBE3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380580288.00007FF6AFBE6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_7ff6afbe0000_dialer.jbxd
                                                              Similarity
                                                              • API ID: DescriptorInitializeSecurity$AllocAllocateCreateDaclEntriesLocalNamedPipe
                                                              • String ID:
                                                              • API String ID: 3197395349-0
                                                              • Opcode ID: 488be1c38cf594ed0d3f6a94cbc7f0150440055c9cb1e58666deddfd8d25be8b
                                                              • Instruction ID: afbdf46008477f39cb15a464a7d9209eabdbdcedd424dd3a8776e738be7e581c
                                                              • Opcode Fuzzy Hash: 488be1c38cf594ed0d3f6a94cbc7f0150440055c9cb1e58666deddfd8d25be8b
                                                              • Instruction Fuzzy Hash: E43171326156518AD720CF24E48079E7BB5FB49B98F54422AEB4D87F98DF7CD208CB40

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3379453219.00007FF6AFBE1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6AFBE0000, based on PE: true
                                                              • Associated: 0000000C.00000002.3378869560.00007FF6AFBE0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380018046.00007FF6AFBE3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380580288.00007FF6AFBE6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_7ff6afbe0000_dialer.jbxd
                                                              Similarity
                                                              • API ID: FileHandle$CloseCreateModuleProtectVirtual$CurrentFreeInformationLibraryMappingProcessViewlstrcmpi
                                                              • String ID: .text$C:\Windows\System32\
                                                              • API String ID: 2721474350-832442975
                                                              • Opcode ID: ea51ffa9aeaeb0e2cf226d8574d2fabd87300f6e212f2c78447215b36c46b769
                                                              • Instruction ID: 08ba3962a9689e77d48a8681c843085f952759440d297e5d0b440b9b854599f3
                                                              • Opcode Fuzzy Hash: ea51ffa9aeaeb0e2cf226d8574d2fabd87300f6e212f2c78447215b36c46b769
                                                              • Instruction Fuzzy Hash: 7F51A032B0A68196EB208F16E85867A7771FB8AB94F484175DE4E83B94DF3CE548C701

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3379453219.00007FF6AFBE1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6AFBE0000, based on PE: true
                                                              • Associated: 0000000C.00000002.3378869560.00007FF6AFBE0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380018046.00007FF6AFBE3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380580288.00007FF6AFBE6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_7ff6afbe0000_dialer.jbxd
                                                              Similarity
                                                              • API ID: NamedPipe$DescriptorFileInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesLocalReadWrite
                                                              • String ID: M$\\.\pipe\dialerchildproc64
                                                              • API String ID: 2203880229-3489460547
                                                              • Opcode ID: cb78decc689e444f168c8ecd1fa7ab696948f8a3ff5b9be1a13ae3c23ba91d6c
                                                              • Instruction ID: f95d70f7421aba5d03d54b0545a1c64d3b7be9ccdf3d5624a71ea304b2a20ef8
                                                              • Opcode Fuzzy Hash: cb78decc689e444f168c8ecd1fa7ab696948f8a3ff5b9be1a13ae3c23ba91d6c
                                                              • Instruction Fuzzy Hash: 9C115221A5DA4692E714DB21E8043796B70BF877A0F0C4275D65F86BD4DF7CE548C702

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3379453219.00007FF6AFBE1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6AFBE0000, based on PE: true
                                                              • Associated: 0000000C.00000002.3378869560.00007FF6AFBE0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380018046.00007FF6AFBE3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380580288.00007FF6AFBE6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_7ff6afbe0000_dialer.jbxd
                                                              Similarity
                                                              • API ID: NamedPipe$DescriptorInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesFileLocalRead
                                                              • String ID: \\.\pipe\dialercontrol_redirect64
                                                              • API String ID: 2071455217-3440882674
                                                              • Opcode ID: 0eadeefac485689016ee7cb8901f6413b977b23d4cbf2cacf1e5db6f82192be8
                                                              • Instruction ID: ac85c0685c5d552b0eadcc949e02bafcb85e410b558abb55d3d315b5531d6b3c
                                                              • Opcode Fuzzy Hash: 0eadeefac485689016ee7cb8901f6413b977b23d4cbf2cacf1e5db6f82192be8
                                                              • Instruction Fuzzy Hash: 8A017521E0D54291FA14AB21E8043797770AF43BA0F1C4274DA6EC66E4DF7CE548D703

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3379453219.00007FF6AFBE1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6AFBE0000, based on PE: true
                                                              • Associated: 0000000C.00000002.3378869560.00007FF6AFBE0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380018046.00007FF6AFBE3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380580288.00007FF6AFBE6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_7ff6afbe0000_dialer.jbxd
                                                              Similarity
                                                              • API ID: Heap$AllocProcess$EnumProcessesSleep
                                                              • String ID:
                                                              • API String ID: 3676546796-0
                                                              • Opcode ID: 8f13c2487408d17cabd0d6010e800d760c40d8336c2ba260ca50616313c4bb70
                                                              • Instruction ID: 758691c5fd6cfe066156621245043cb93ac1464d1cffb588142dc77531090274
                                                              • Opcode Fuzzy Hash: 8f13c2487408d17cabd0d6010e800d760c40d8336c2ba260ca50616313c4bb70
                                                              • Instruction Fuzzy Hash: 7D115135A0965286E728CF26E85543A7B71FB87B81F184078DA4A87758CE3DE841CB41

                                                              Control-flow Graph

                                                              APIs
                                                              • GetProcessHeap.KERNEL32(?,00000000,?,00007FF6AFBE238B,?,?,?,?,?,?,?,?,?,?,?,00007FF6AFBE2261), ref: 00007FF6AFBE1801
                                                              • HeapAlloc.KERNEL32(?,00000000,?,00007FF6AFBE238B,?,?,?,?,?,?,?,?,?,?,?,00007FF6AFBE2261), ref: 00007FF6AFBE1812
                                                                • Part of subcall function 00007FF6AFBE14D8: GetProcessHeap.KERNEL32 ref: 00007FF6AFBE150B
                                                                • Part of subcall function 00007FF6AFBE14D8: HeapAlloc.KERNEL32 ref: 00007FF6AFBE151E
                                                                • Part of subcall function 00007FF6AFBE14D8: GetProcessHeap.KERNEL32 ref: 00007FF6AFBE152C
                                                                • Part of subcall function 00007FF6AFBE14D8: HeapAlloc.KERNEL32 ref: 00007FF6AFBE153D
                                                                • Part of subcall function 00007FF6AFBE14D8: K32EnumProcesses.KERNEL32 ref: 00007FF6AFBE1557
                                                                • Part of subcall function 00007FF6AFBE14D8: OpenProcess.KERNEL32 ref: 00007FF6AFBE1585
                                                                • Part of subcall function 00007FF6AFBE14D8: K32EnumProcessModules.KERNEL32 ref: 00007FF6AFBE15AA
                                                                • Part of subcall function 00007FF6AFBE14D8: ReadProcessMemory.KERNELBASE ref: 00007FF6AFBE15E1
                                                                • Part of subcall function 00007FF6AFBE14D8: CloseHandle.KERNELBASE ref: 00007FF6AFBE161D
                                                                • Part of subcall function 00007FF6AFBE14D8: GetProcessHeap.KERNEL32 ref: 00007FF6AFBE162F
                                                                • Part of subcall function 00007FF6AFBE14D8: RtlFreeHeap.NTDLL ref: 00007FF6AFBE163D
                                                                • Part of subcall function 00007FF6AFBE14D8: GetProcessHeap.KERNEL32 ref: 00007FF6AFBE1643
                                                                • Part of subcall function 00007FF6AFBE14D8: RtlFreeHeap.NTDLL ref: 00007FF6AFBE1651
                                                              • OpenProcess.KERNEL32 ref: 00007FF6AFBE1859
                                                              • TerminateProcess.KERNEL32 ref: 00007FF6AFBE186C
                                                              • CloseHandle.KERNEL32 ref: 00007FF6AFBE1875
                                                              • GetProcessHeap.KERNEL32 ref: 00007FF6AFBE1885
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3379453219.00007FF6AFBE1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6AFBE0000, based on PE: true
                                                              • Associated: 0000000C.00000002.3378869560.00007FF6AFBE0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380018046.00007FF6AFBE3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380580288.00007FF6AFBE6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_7ff6afbe0000_dialer.jbxd
                                                              Similarity
                                                              • API ID: HeapProcess$Alloc$CloseEnumFreeHandleOpen$MemoryModulesProcessesReadTerminate
                                                              • String ID:
                                                              • API String ID: 1323846700-0
                                                              • Opcode ID: 292de27f87d02887c134cd68883e15ba7f6a186f84d3e8f804eb1f1d2b0452f5
                                                              • Instruction ID: bea24c0011cf66600ed7818410f139058823eb51879c7fbc48e0fb6506b2abfe
                                                              • Opcode Fuzzy Hash: 292de27f87d02887c134cd68883e15ba7f6a186f84d3e8f804eb1f1d2b0452f5
                                                              • Instruction Fuzzy Hash: D5115421F0A64285FB189F16E8440796BB1AF8BB84F1C4078DE0D837A5DE3DD4458702

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3379453219.00007FF6AFBE1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6AFBE0000, based on PE: true
                                                              • Associated: 0000000C.00000002.3378869560.00007FF6AFBE0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380018046.00007FF6AFBE3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380580288.00007FF6AFBE6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_7ff6afbe0000_dialer.jbxd
                                                              Similarity
                                                              • API ID: Process$CloseHandleOpenWow64
                                                              • String ID:
                                                              • API String ID: 10462204-0
                                                              • Opcode ID: 6d646fbe37808f9b584e9cbd293ea6613d1d1a58a609fbda32c726050c0f507a
                                                              • Instruction ID: fd33fdc68e3e6e49d6fa8043d30b181e029c41259a116cf6de28645878fe9666
                                                              • Opcode Fuzzy Hash: 6d646fbe37808f9b584e9cbd293ea6613d1d1a58a609fbda32c726050c0f507a
                                                              • Instruction Fuzzy Hash: 4AF01D22B0A78292EB548F16E5841296771EB8ABC0F589079EA8D83798DF3DD4858701

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 00007FF6AFBE226C: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF6AFBE2261), ref: 00007FF6AFBE228F
                                                                • Part of subcall function 00007FF6AFBE226C: OpenProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF6AFBE2261), ref: 00007FF6AFBE229F
                                                                • Part of subcall function 00007FF6AFBE226C: OpenProcessToken.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00007FF6AFBE2261), ref: 00007FF6AFBE22B9
                                                                • Part of subcall function 00007FF6AFBE226C: LookupPrivilegeValueW.ADVAPI32 ref: 00007FF6AFBE22D0
                                                                • Part of subcall function 00007FF6AFBE226C: AdjustTokenPrivileges.KERNELBASE ref: 00007FF6AFBE2308
                                                                • Part of subcall function 00007FF6AFBE226C: GetLastError.KERNEL32 ref: 00007FF6AFBE2312
                                                                • Part of subcall function 00007FF6AFBE226C: CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,00007FF6AFBE2261), ref: 00007FF6AFBE231B
                                                                • Part of subcall function 00007FF6AFBE226C: FindResourceExA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF6AFBE2261), ref: 00007FF6AFBE232F
                                                                • Part of subcall function 00007FF6AFBE226C: SizeofResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF6AFBE2261), ref: 00007FF6AFBE2346
                                                                • Part of subcall function 00007FF6AFBE226C: LoadResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF6AFBE2261), ref: 00007FF6AFBE235F
                                                                • Part of subcall function 00007FF6AFBE226C: LockResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF6AFBE2261), ref: 00007FF6AFBE2371
                                                                • Part of subcall function 00007FF6AFBE226C: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF6AFBE2261), ref: 00007FF6AFBE237E
                                                                • Part of subcall function 00007FF6AFBE226C: RegCreateKeyExW.KERNELBASE ref: 00007FF6AFBE23BE
                                                                • Part of subcall function 00007FF6AFBE226C: ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32 ref: 00007FF6AFBE23E5
                                                                • Part of subcall function 00007FF6AFBE226C: RegSetKeySecurity.KERNELBASE ref: 00007FF6AFBE23FE
                                                                • Part of subcall function 00007FF6AFBE226C: LocalFree.KERNEL32 ref: 00007FF6AFBE2408
                                                              • ExitProcess.KERNEL32 ref: 00007FF6AFBE2263
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3379453219.00007FF6AFBE1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6AFBE0000, based on PE: true
                                                              • Associated: 0000000C.00000002.3378869560.00007FF6AFBE0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380018046.00007FF6AFBE3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380580288.00007FF6AFBE6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_7ff6afbe0000_dialer.jbxd
                                                              Similarity
                                                              • API ID: Process$Resource$Security$CurrentDescriptorOpenToken$AdjustCloseConvertCreateErrorExitFindFreeHandleLastLoadLocalLockLookupPrivilegePrivilegesSizeofStringValue
                                                              • String ID:
                                                              • API String ID: 3836936051-0
                                                              • Opcode ID: c7c2c95b7158c919dbdf86fa47620a0d13b0befc2d5611a3b20bc48f104c5c5f
                                                              • Instruction ID: 4271998e0805194ada29f6a0abcb3867bb944a956f94a5eb3bb262c5c546528e
                                                              • Opcode Fuzzy Hash: c7c2c95b7158c919dbdf86fa47620a0d13b0befc2d5611a3b20bc48f104c5c5f
                                                              • Instruction Fuzzy Hash: 54A00111E1B54286EA0837B5995A06827716F97A02F5804B8D00A86292DD2C64558617

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 189 7ff6afbe2560-7ff6afbe258c 190 7ff6afbe2592 189->190 191 7ff6afbe273a-7ff6afbe2742 189->191 194 7ff6afbe26c6-7ff6afbe26fe GetProcessHeap HeapAlloc K32EnumProcesses 190->194 195 7ff6afbe2598-7ff6afbe259f 190->195 192 7ff6afbe297e-7ff6afbe29a2 ReadFile 191->192 193 7ff6afbe2748-7ff6afbe274b 191->193 198 7ff6afbe2a74-7ff6afbe2a8e 192->198 199 7ff6afbe29a8-7ff6afbe29af 192->199 196 7ff6afbe2974-7ff6afbe2979 call 7ff6afbe175c 193->196 197 7ff6afbe2751-7ff6afbe2756 193->197 194->198 200 7ff6afbe2704-7ff6afbe2715 194->200 201 7ff6afbe25a5-7ff6afbe25a8 195->201 202 7ff6afbe26bd-7ff6afbe26bf ExitProcess 195->202 196->198 204 7ff6afbe275c-7ff6afbe275f 197->204 205 7ff6afbe2919-7ff6afbe292c call 7ff6afbe1944 197->205 199->198 206 7ff6afbe29b5-7ff6afbe29c9 call 7ff6afbe18ac 199->206 200->198 207 7ff6afbe271b-7ff6afbe2733 call 7ff6afbe10c0 200->207 208 7ff6afbe25ae-7ff6afbe25b1 201->208 209 7ff6afbe2660-7ff6afbe268b RegOpenKeyExW 201->209 213 7ff6afbe2761-7ff6afbe2766 204->213 214 7ff6afbe279d-7ff6afbe27ae call 7ff6afbe1944 204->214 205->198 233 7ff6afbe2932-7ff6afbe2941 call 7ff6afbe1944 205->233 206->198 231 7ff6afbe29cf-7ff6afbe29d5 206->231 234 7ff6afbe2735 207->234 210 7ff6afbe2651-7ff6afbe265b 208->210 211 7ff6afbe25b7-7ff6afbe25ba 208->211 218 7ff6afbe26a1-7ff6afbe26b8 call 7ff6afbe19c4 call 7ff6afbe175c call 7ff6afbe1000 call 7ff6afbe17ec 209->218 219 7ff6afbe268d-7ff6afbe269b RegDeleteValueW 209->219 210->198 220 7ff6afbe2644-7ff6afbe264c 211->220 221 7ff6afbe25c0-7ff6afbe25c5 211->221 213->198 223 7ff6afbe276c-7ff6afbe2796 call 7ff6afbe217c call 7ff6afbe21a8 ExitProcess 213->223 214->198 240 7ff6afbe27b4-7ff6afbe27d6 ReadFile 214->240 218->198 219->218 220->198 221->198 228 7ff6afbe25cb-7ff6afbe25ef ReadFile 221->228 228->198 235 7ff6afbe25f5-7ff6afbe25fc 228->235 238 7ff6afbe2a5f 231->238 239 7ff6afbe29db-7ff6afbe2a16 GetProcessHeap HeapAlloc call 7ff6afbe14d8 231->239 233->198 249 7ff6afbe2947-7ff6afbe296f ShellExecuteW 233->249 234->198 235->198 243 7ff6afbe2602-7ff6afbe2616 call 7ff6afbe18ac 235->243 246 7ff6afbe2a66-7ff6afbe2a6f call 7ff6afbe2a90 238->246 260 7ff6afbe2a49-7ff6afbe2a4f GetProcessHeap 239->260 261 7ff6afbe2a18-7ff6afbe2a1e 239->261 240->198 248 7ff6afbe27dc-7ff6afbe27e3 240->248 243->198 264 7ff6afbe261c-7ff6afbe2622 243->264 246->198 248->198 255 7ff6afbe27e9-7ff6afbe2827 GetProcessHeap HeapAlloc ReadFile 248->255 249->198 256 7ff6afbe290b-7ff6afbe2914 GetProcessHeap 255->256 257 7ff6afbe282d-7ff6afbe2839 255->257 263 7ff6afbe2a52-7ff6afbe2a5d HeapFree 256->263 257->256 262 7ff6afbe283f-7ff6afbe284b 257->262 260->263 261->260 266 7ff6afbe2a20-7ff6afbe2a32 261->266 262->256 269 7ff6afbe2851-7ff6afbe285c 262->269 263->198 270 7ff6afbe2624-7ff6afbe2633 call 7ff6afbe10c0 264->270 271 7ff6afbe2638-7ff6afbe263f 264->271 267 7ff6afbe2a34-7ff6afbe2a36 266->267 268 7ff6afbe2a38-7ff6afbe2a40 266->268 267->268 273 7ff6afbe2a44 call 7ff6afbe16cc 267->273 268->260 274 7ff6afbe2a42 268->274 275 7ff6afbe285e-7ff6afbe2869 269->275 276 7ff6afbe2881-7ff6afbe2905 lstrlenW GetProcessHeap HeapAlloc call 7ff6afbe2a90 GetProcessHeap HeapFree 269->276 270->198 271->246 273->260 274->266 275->256 279 7ff6afbe286f-7ff6afbe287c call 7ff6afbe1c88 275->279 276->256 279->256
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3379453219.00007FF6AFBE1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6AFBE0000, based on PE: true
                                                              • Associated: 0000000C.00000002.3378869560.00007FF6AFBE0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380018046.00007FF6AFBE3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380580288.00007FF6AFBE6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_7ff6afbe0000_dialer.jbxd
                                                              Similarity
                                                              • API ID: Process$Open$File$CloseExitHandleHeapName$AllocDeleteEnumFindInformationModulePathProcessesQueryReadTokenValueWow64lstrlen
                                                              • String ID: SOFTWARE$dialerstager$open
                                                              • API String ID: 3276259517-3931493855
                                                              • Opcode ID: ae79544a1ca264f77e0040c582fad8c70a14f3da5095032f2fa0f831f935a8fc
                                                              • Instruction ID: 66d4e43e6893562af8deaf36c2a137098d8fda11861db79a22b1b6ee5131dfff
                                                              • Opcode Fuzzy Hash: ae79544a1ca264f77e0040c582fad8c70a14f3da5095032f2fa0f831f935a8fc
                                                              • Instruction Fuzzy Hash: EBD18221F0A6838AEB799F25D8042B92775FF47B84F4412B9D94E87695DF3CE604C702

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3379453219.00007FF6AFBE1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6AFBE0000, based on PE: true
                                                              • Associated: 0000000C.00000002.3378869560.00007FF6AFBE0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380018046.00007FF6AFBE3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380580288.00007FF6AFBE6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_7ff6afbe0000_dialer.jbxd
                                                              Similarity
                                                              • API ID: Process$MemoryThreadWrite$AllocContextVirtual$CreateOpenResumeTerminate
                                                              • String ID: @
                                                              • API String ID: 3462610200-2766056989
                                                              • Opcode ID: 9e87a73b0eb69cfa39acb8f7a19e25e40ab225c9e7017233cfa86b54780bd9da
                                                              • Instruction ID: 76ee852e0a2e34bd2a0e175f10f52762a7bb714f052318e3329e7dcb01193992
                                                              • Opcode Fuzzy Hash: 9e87a73b0eb69cfa39acb8f7a19e25e40ab225c9e7017233cfa86b54780bd9da
                                                              • Instruction Fuzzy Hash: 3251BE32B05A4186EB50CF26E8406AE7BB1FB4AB88F194175DE4D97BA8DF3CE445C701
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3379453219.00007FF6AFBE1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6AFBE0000, based on PE: true
                                                              • Associated: 0000000C.00000002.3378869560.00007FF6AFBE0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380018046.00007FF6AFBE3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380580288.00007FF6AFBE6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_7ff6afbe0000_dialer.jbxd
                                                              Similarity
                                                              • API ID: String$AllocFreeInitialize$CreateInitInstanceSecurityUninitializeVariant
                                                              • String ID: dialersvc64
                                                              • API String ID: 4184240511-3881820561
                                                              • Opcode ID: c5773a1fcac1982b1b845e0e6ec66c21fb3e8571a559d525fc626bf24240b323
                                                              • Instruction ID: 68e6271601b0acfb5b67390ed3022bad3e6c642e63bdbbb402da7f50a674759a
                                                              • Opcode Fuzzy Hash: c5773a1fcac1982b1b845e0e6ec66c21fb3e8571a559d525fc626bf24240b323
                                                              • Instruction Fuzzy Hash: 26419F36B09A8296E710DF35E4402AD77B5FB8AB89F085175EE4D87A64DF3CE149C300
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3379453219.00007FF6AFBE1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6AFBE0000, based on PE: true
                                                              • Associated: 0000000C.00000002.3378869560.00007FF6AFBE0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380018046.00007FF6AFBE3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380580288.00007FF6AFBE6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_7ff6afbe0000_dialer.jbxd
                                                              Similarity
                                                              • API ID: Delete$CloseEnumOpen
                                                              • String ID: SOFTWARE\dialerconfig
                                                              • API String ID: 3013565938-461861421
                                                              • Opcode ID: 771b17fd0f1a16041f26a54d46b0ec7916154baef178d5f18a2b3dcc43556395
                                                              • Instruction ID: 4fa895e14733a0c8bed12f6cccae39bbf1520bd04ee9e9292db74aedeab9a348
                                                              • Opcode Fuzzy Hash: 771b17fd0f1a16041f26a54d46b0ec7916154baef178d5f18a2b3dcc43556395
                                                              • Instruction Fuzzy Hash: AE112932B19A8581E770CF20E8457F92774FB4A794F480275D64D8AAD9DF3CD248CB06
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3379453219.00007FF6AFBE1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6AFBE0000, based on PE: true
                                                              • Associated: 0000000C.00000002.3378869560.00007FF6AFBE0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380018046.00007FF6AFBE3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380580288.00007FF6AFBE6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_7ff6afbe0000_dialer.jbxd
                                                              Similarity
                                                              • API ID: File$Write$CloseCreateHandle
                                                              • String ID: \\.\pipe\dialercontrol_redirect64
                                                              • API String ID: 148219782-3440882674
                                                              • Opcode ID: 883fb3da148993cb75da2269ecc4fc0d73b62e41bf5aa7103fd26e0bcaccd1b9
                                                              • Instruction ID: 396f944e49d9d0cab2d092ec64fd072960dbb0b59c825237fe3ead700c0b8813
                                                              • Opcode Fuzzy Hash: 883fb3da148993cb75da2269ecc4fc0d73b62e41bf5aa7103fd26e0bcaccd1b9
                                                              • Instruction Fuzzy Hash: 9A117C76B25B5182EB008F11E808329A770FB8AFA4F484275DA2943BD4CF7CD549C741
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000C.00000002.3379453219.00007FF6AFBE1000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6AFBE0000, based on PE: true
                                                              • Associated: 0000000C.00000002.3378869560.00007FF6AFBE0000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380018046.00007FF6AFBE3000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              • Associated: 0000000C.00000002.3380580288.00007FF6AFBE6000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_12_2_7ff6afbe0000_dialer.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProc
                                                              • String ID: ntdll.dll
                                                              • API String ID: 1646373207-2227199552
                                                              • Opcode ID: 91777f2b0607ee1fe6466092eca8f752b6e1633f4feaae27b681225476bf4cba
                                                              • Instruction ID: 84ae70ce6d67f21a5f2f6369f2003e08eaef5cf8cd2606ce258c4d5f6cf7f381
                                                              • Opcode Fuzzy Hash: 91777f2b0607ee1fe6466092eca8f752b6e1633f4feaae27b681225476bf4cba
                                                              • Instruction Fuzzy Hash: 00D0C998B1760782EE1A9762E8A503457B16F5BB86F8C40B4CD1EC6390DE2CD0998602

                                                              Execution Graph

                                                              Execution Coverage:1.7%
                                                              Dynamic/Decrypted Code Coverage:95.2%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:126
                                                              Total number of Limit Nodes:16
                                                              execution_graph 15119 2d0165e1abc 15124 2d0165e1628 GetProcessHeap 15119->15124 15121 2d0165e1ad2 Sleep SleepEx 15122 2d0165e1acb 15121->15122 15122->15121 15123 2d0165e1598 StrCmpIW StrCmpW 15122->15123 15123->15122 15125 2d0165e1648 __free_lconv_mon 15124->15125 15169 2d0165e1268 GetProcessHeap 15125->15169 15127 2d0165e1650 15128 2d0165e1268 2 API calls 15127->15128 15129 2d0165e1661 15128->15129 15130 2d0165e1268 2 API calls 15129->15130 15131 2d0165e166a 15130->15131 15132 2d0165e1268 2 API calls 15131->15132 15133 2d0165e1673 15132->15133 15134 2d0165e168e RegOpenKeyExW 15133->15134 15135 2d0165e18a6 15134->15135 15136 2d0165e16c0 RegOpenKeyExW 15134->15136 15135->15122 15137 2d0165e16ff RegOpenKeyExW 15136->15137 15138 2d0165e16e9 15136->15138 15140 2d0165e173a RegOpenKeyExW 15137->15140 15141 2d0165e1723 15137->15141 15180 2d0165e12bc RegQueryInfoKeyW 15138->15180 15144 2d0165e175e 15140->15144 15145 2d0165e1775 RegOpenKeyExW 15140->15145 15173 2d0165e104c RegQueryInfoKeyW 15141->15173 15149 2d0165e12bc 13 API calls 15144->15149 15146 2d0165e1799 15145->15146 15147 2d0165e17b0 RegOpenKeyExW 15145->15147 15151 2d0165e12bc 13 API calls 15146->15151 15152 2d0165e17eb RegOpenKeyExW 15147->15152 15153 2d0165e17d4 15147->15153 15150 2d0165e176b RegCloseKey 15149->15150 15150->15145 15154 2d0165e17a6 RegCloseKey 15151->15154 15156 2d0165e180f 15152->15156 15157 2d0165e1826 RegOpenKeyExW 15152->15157 15155 2d0165e12bc 13 API calls 15153->15155 15154->15147 15158 2d0165e17e1 RegCloseKey 15155->15158 15159 2d0165e104c 5 API calls 15156->15159 15160 2d0165e184a 15157->15160 15161 2d0165e1861 RegOpenKeyExW 15157->15161 15158->15152 15164 2d0165e181c RegCloseKey 15159->15164 15165 2d0165e104c 5 API calls 15160->15165 15162 2d0165e189c RegCloseKey 15161->15162 15163 2d0165e1885 15161->15163 15162->15135 15167 2d0165e104c 5 API calls 15163->15167 15164->15157 15166 2d0165e1857 RegCloseKey 15165->15166 15166->15161 15168 2d0165e1892 RegCloseKey 15167->15168 15168->15162 15191 2d0165f6168 15169->15191 15171 2d0165e1283 GetProcessHeap 15172 2d0165e12ae __free_lconv_mon 15171->15172 15172->15127 15174 2d0165e10bf 15173->15174 15175 2d0165e11b5 RegCloseKey 15173->15175 15174->15175 15176 2d0165e10cf RegEnumValueW 15174->15176 15175->15140 15178 2d0165e1125 __free_lconv_mon 15176->15178 15177 2d0165e114e GetProcessHeap 15177->15178 15178->15175 15178->15176 15178->15177 15179 2d0165e116e GetProcessHeap HeapFree 15178->15179 15179->15178 15181 2d0165e148a RegCloseKey 15180->15181 15182 2d0165e1327 GetProcessHeap 15180->15182 15181->15137 15183 2d0165e133e __free_lconv_mon 15182->15183 15184 2d0165e1476 GetProcessHeap HeapFree 15183->15184 15185 2d0165e1352 RegEnumValueW 15183->15185 15187 2d0165e141e lstrlenW GetProcessHeap 15183->15187 15188 2d0165e13d3 GetProcessHeap 15183->15188 15189 2d0165e13f3 GetProcessHeap HeapFree 15183->15189 15190 2d0165e1443 StrCpyW 15183->15190 15193 2d0165e152c 15183->15193 15184->15181 15185->15183 15187->15183 15188->15183 15189->15187 15190->15183 15192 2d0165f6177 15191->15192 15192->15192 15194 2d0165e1546 15193->15194 15197 2d0165e157c 15193->15197 15195 2d0165e155d StrCmpIW 15194->15195 15196 2d0165e1565 StrCmpW 15194->15196 15194->15197 15195->15194 15196->15194 15197->15183 15198 2d0165e554d 15199 2d0165e5554 15198->15199 15200 2d0165e55bb 15199->15200 15201 2d0165e5637 VirtualProtect 15199->15201 15202 2d0165e5663 GetLastError 15201->15202 15203 2d0165e5671 15201->15203 15202->15203 15204 2d01658273c 15205 2d01658276a 15204->15205 15206 2d0165827c5 VirtualAlloc 15205->15206 15209 2d0165828d4 15205->15209 15208 2d0165827ec 15206->15208 15206->15209 15207 2d016582858 LoadLibraryA 15207->15208 15208->15207 15208->15209 15210 2d0165e28c8 15211 2d0165e290e 15210->15211 15212 2d0165e2970 15211->15212 15214 2d0165e3844 15211->15214 15215 2d0165e3866 15214->15215 15216 2d0165e3851 StrCmpNIW 15214->15216 15215->15211 15216->15215 15217 2d0165e3ab9 15220 2d0165e3a06 15217->15220 15218 2d0165e3a70 15219 2d0165e3a56 VirtualQuery 15219->15218 15219->15220 15220->15218 15220->15219 15221 2d0165e3a8a VirtualAlloc 15220->15221 15221->15218 15222 2d0165e3abb GetLastError 15221->15222 15222->15218 15222->15220 15223 2d0165e5cf0 15224 2d0165e5cfd 15223->15224 15225 2d0165e5d09 15224->15225 15231 2d0165e5e1a 15224->15231 15226 2d0165e5d3e 15225->15226 15227 2d0165e5d8d 15225->15227 15228 2d0165e5d66 SetThreadContext 15226->15228 15228->15227 15229 2d0165e5efe 15232 2d0165e5f1e 15229->15232 15245 2d0165e43e0 15229->15245 15230 2d0165e5e41 VirtualProtect FlushInstructionCache 15230->15231 15231->15229 15231->15230 15241 2d0165e4df0 GetCurrentProcess 15232->15241 15235 2d0165e5f23 15236 2d0165e5f77 15235->15236 15237 2d0165e5f37 ResumeThread 15235->15237 15249 2d0165e7940 15236->15249 15238 2d0165e5f6b 15237->15238 15238->15235 15240 2d0165e5fbf 15242 2d0165e4e0c 15241->15242 15243 2d0165e4e22 VirtualProtect FlushInstructionCache 15242->15243 15244 2d0165e4e53 15242->15244 15243->15242 15244->15235 15246 2d0165e43fc 15245->15246 15247 2d0165e445f 15246->15247 15248 2d0165e4412 VirtualFree 15246->15248 15247->15232 15248->15246 15251 2d0165e7949 _log10_special 15249->15251 15250 2d0165e7954 15250->15240 15251->15250 15254 2d0165e8320 15251->15254 15253 2d0165e8157 15253->15240 15257 2d0165e8331 capture_current_context 15254->15257 15255 2d0165e833a RtlLookupFunctionEntry 15256 2d0165e8389 15255->15256 15255->15257 15256->15253 15257->15255 15257->15256

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                              • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                              • API String ID: 106492572-2879589442
                                                              • Opcode ID: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                              • Instruction ID: 5ecbaa186e8d59cd892059c32c6735f956b01256b6e0a22be3f8683e5b015701
                                                              • Opcode Fuzzy Hash: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                              • Instruction Fuzzy Hash: EE711936210A9086EB209FB6ECD8B9973A5F784B89F801112DE4E47B78EF35C954C744

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcessProtectVirtual$HandleModule
                                                              • String ID: wr
                                                              • API String ID: 1092925422-2678910430
                                                              • Opcode ID: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                              • Instruction ID: 4674d9df3d536e982c299afeb10ddbd57cf0d0b09ef677d7c97c0013872c700b
                                                              • Opcode Fuzzy Hash: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                              • Instruction Fuzzy Hash: 6411A126305781C2FF149B61F848769B2B4F748B85F84002ADE8D03765EF3ECA05C714

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 59 2d0165e5b30-2d0165e5b57 60 2d0165e5b6b-2d0165e5b76 GetCurrentThreadId 59->60 61 2d0165e5b59-2d0165e5b68 59->61 62 2d0165e5b78-2d0165e5b7d 60->62 63 2d0165e5b82-2d0165e5b89 60->63 61->60 64 2d0165e5faf-2d0165e5fc6 call 2d0165e7940 62->64 65 2d0165e5b9b-2d0165e5baf 63->65 66 2d0165e5b8b-2d0165e5b96 call 2d0165e5960 63->66 67 2d0165e5bbe-2d0165e5bc4 65->67 66->64 70 2d0165e5bca-2d0165e5bd3 67->70 71 2d0165e5c95-2d0165e5cb6 67->71 75 2d0165e5c1a-2d0165e5c8d call 2d0165e4510 call 2d0165e44b0 call 2d0165e4470 70->75 76 2d0165e5bd5-2d0165e5c18 call 2d0165e85c0 70->76 77 2d0165e5e1f-2d0165e5e30 call 2d0165e74bf 71->77 78 2d0165e5cbc-2d0165e5cdc GetThreadContext 71->78 88 2d0165e5c90 75->88 76->88 90 2d0165e5e35-2d0165e5e3b 77->90 81 2d0165e5e1a 78->81 82 2d0165e5ce2-2d0165e5d03 78->82 81->77 82->81 92 2d0165e5d09-2d0165e5d12 82->92 88->67 94 2d0165e5efe-2d0165e5f0e 90->94 95 2d0165e5e41-2d0165e5e98 VirtualProtect FlushInstructionCache 90->95 97 2d0165e5d14-2d0165e5d25 92->97 98 2d0165e5d92-2d0165e5da3 92->98 104 2d0165e5f1e-2d0165e5f2a call 2d0165e4df0 94->104 105 2d0165e5f10-2d0165e5f17 94->105 99 2d0165e5e9a-2d0165e5ea4 95->99 100 2d0165e5ec9-2d0165e5ef9 call 2d0165e78ac 95->100 106 2d0165e5d8d 97->106 107 2d0165e5d27-2d0165e5d3c 97->107 101 2d0165e5e15 98->101 102 2d0165e5da5-2d0165e5dc3 98->102 99->100 111 2d0165e5ea6-2d0165e5ec1 call 2d0165e4390 99->111 100->90 102->101 113 2d0165e5dc5-2d0165e5e0c call 2d0165e3900 102->113 121 2d0165e5f2f-2d0165e5f35 104->121 105->104 108 2d0165e5f19 call 2d0165e43e0 105->108 106->101 107->106 109 2d0165e5d3e-2d0165e5d88 call 2d0165e3970 SetThreadContext 107->109 108->104 109->106 111->100 113->101 126 2d0165e5e10 call 2d0165e74dd 113->126 124 2d0165e5f77-2d0165e5f95 121->124 125 2d0165e5f37-2d0165e5f75 ResumeThread call 2d0165e78ac 121->125 128 2d0165e5fa9 124->128 129 2d0165e5f97-2d0165e5fa6 124->129 125->121 126->101 128->64 129->128
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: Thread$Current$Context
                                                              • String ID:
                                                              • API String ID: 1666949209-0
                                                              • Opcode ID: aba7c51250b0bd2785b454d2868164715ffdc60c22b63475f1bba81942d6465a
                                                              • Instruction ID: d170addcbda7b12596392159c148f3388fdea41b115c5373cd1e58d87ea25250
                                                              • Opcode Fuzzy Hash: aba7c51250b0bd2785b454d2868164715ffdc60c22b63475f1bba81942d6465a
                                                              • Instruction Fuzzy Hash: 01D18B76205B8882DB709B56E8D435AB7A0F388B88F504117EACD47BB5DF3ECA55CB40

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 131 2d0165e50d0-2d0165e50fc 132 2d0165e50fe-2d0165e5106 131->132 133 2d0165e510d-2d0165e5116 131->133 132->133 134 2d0165e5118-2d0165e5120 133->134 135 2d0165e5127-2d0165e5130 133->135 134->135 136 2d0165e5132-2d0165e513a 135->136 137 2d0165e5141-2d0165e514a 135->137 136->137 138 2d0165e514c-2d0165e5151 137->138 139 2d0165e5156-2d0165e5161 GetCurrentThreadId 137->139 140 2d0165e56d3-2d0165e56da 138->140 141 2d0165e516d-2d0165e5174 139->141 142 2d0165e5163-2d0165e5168 139->142 143 2d0165e5176-2d0165e517c 141->143 144 2d0165e5181-2d0165e518a 141->144 142->140 143->140 145 2d0165e518c-2d0165e5191 144->145 146 2d0165e5196-2d0165e51a2 144->146 145->140 147 2d0165e51ce-2d0165e5225 call 2d0165e56e0 * 2 146->147 148 2d0165e51a4-2d0165e51c9 146->148 153 2d0165e523a-2d0165e5243 147->153 154 2d0165e5227-2d0165e522e 147->154 148->140 157 2d0165e5255-2d0165e525e 153->157 158 2d0165e5245-2d0165e5252 153->158 155 2d0165e5236 154->155 156 2d0165e5230 154->156 160 2d0165e52a6-2d0165e52aa 155->160 159 2d0165e52b0-2d0165e52b6 156->159 161 2d0165e5273-2d0165e5298 call 2d0165e7870 157->161 162 2d0165e5260-2d0165e5270 157->162 158->157 163 2d0165e52b8-2d0165e52d4 call 2d0165e4390 159->163 164 2d0165e52e5-2d0165e52eb 159->164 160->159 172 2d0165e529e 161->172 173 2d0165e532d-2d0165e5342 call 2d0165e3cc0 161->173 162->161 163->164 174 2d0165e52d6-2d0165e52de 163->174 167 2d0165e52ed-2d0165e530c call 2d0165e78ac 164->167 168 2d0165e5315-2d0165e5328 164->168 167->168 168->140 172->160 178 2d0165e5344-2d0165e534c 173->178 179 2d0165e5351-2d0165e535a 173->179 174->164 178->160 180 2d0165e536c-2d0165e53ba call 2d0165e8c60 179->180 181 2d0165e535c-2d0165e5369 179->181 184 2d0165e53c2-2d0165e53ca 180->184 181->180 185 2d0165e54d7-2d0165e54df 184->185 186 2d0165e53d0-2d0165e54bb call 2d0165e7440 184->186 188 2d0165e5523-2d0165e552b 185->188 189 2d0165e54e1-2d0165e54f4 call 2d0165e4590 185->189 198 2d0165e54bf-2d0165e54ce call 2d0165e4060 186->198 199 2d0165e54bd 186->199 191 2d0165e552d-2d0165e5535 188->191 192 2d0165e5537-2d0165e5546 188->192 200 2d0165e54f8-2d0165e5521 189->200 201 2d0165e54f6 189->201 191->192 195 2d0165e5554-2d0165e5561 191->195 196 2d0165e554f 192->196 197 2d0165e5548 192->197 202 2d0165e5564-2d0165e55b9 call 2d0165e85c0 195->202 203 2d0165e5563 195->203 196->195 197->196 208 2d0165e54d2 198->208 209 2d0165e54d0 198->209 199->185 200->185 201->188 210 2d0165e55bb-2d0165e55c3 202->210 211 2d0165e55c8-2d0165e5661 call 2d0165e4510 call 2d0165e4470 VirtualProtect 202->211 203->202 208->184 209->185 216 2d0165e5663-2d0165e5668 GetLastError 211->216 217 2d0165e5671-2d0165e56d1 211->217 216->217 217->140
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: CurrentThread
                                                              • String ID:
                                                              • API String ID: 2882836952-0
                                                              • Opcode ID: a9eeae0eee8a65d3360f20c0190c6c2044be682fe56af66e10426f66e33a6bd7
                                                              • Instruction ID: c79f08a0408f7d8f647ff0ca48cb583e9eb7eb6c6cfc1174afee583460d097fa
                                                              • Opcode Fuzzy Hash: a9eeae0eee8a65d3360f20c0190c6c2044be682fe56af66e10426f66e33a6bd7
                                                              • Instruction Fuzzy Hash: 5402A832619BC486EB60CB95E89435AF7A1F3C4794F504016EACE87BA9DF7EC954CB00

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: Virtual$AllocQuery
                                                              • String ID:
                                                              • API String ID: 31662377-0
                                                              • Opcode ID: ad31f8c641c3994e4c662b42b06090e17ab0b09933d29211a4965d6dca603ca4
                                                              • Instruction ID: 28efb8197a5b457b3dea2d752150fd58e1380e9d813bcaab70eb5bc99618508c
                                                              • Opcode Fuzzy Hash: ad31f8c641c3994e4c662b42b06090e17ab0b09933d29211a4965d6dca603ca4
                                                              • Instruction Fuzzy Hash: B9311722219AC481EF30DB95E89935EE6A0F384784F900526F5CD467B9DF7ECB808B04

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                              • String ID:
                                                              • API String ID: 1683269324-0
                                                              • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                              • Instruction ID: 9ff0edd3e6e9ab198c3d17986b58ccebaadaacc8bbb4bde1db76d12e6f3558f5
                                                              • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                              • Instruction Fuzzy Hash: 1C1161306147C182FF6097E1FDCDB69A298AB58345FD0512BE90E815F6EF7ACE44C210

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: CacheCurrentFlushInstructionProcessProtectVirtual
                                                              • String ID:
                                                              • API String ID: 3733156554-0
                                                              • Opcode ID: efc513032ac2f8104d68ff6d1779eae6f51007478eb3e1ac0120cc0a77f626c8
                                                              • Instruction ID: d1e0e70aa0f07598b53ed8611aa5d9f6cf8e10010ed7fed8d00852c42d35725f
                                                              • Opcode Fuzzy Hash: efc513032ac2f8104d68ff6d1779eae6f51007478eb3e1ac0120cc0a77f626c8
                                                              • Instruction Fuzzy Hash: FFF0BD26219B84C1DB30DB85E89575AABA0F3887D4F945117BACD47B79CA3ECA908B40

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 265 2d01658273c-2d0165827a4 call 2d0165829d4 * 4 274 2d0165827aa-2d0165827ad 265->274 275 2d0165829b2 265->275 274->275 276 2d0165827b3-2d0165827b6 274->276 277 2d0165829b4-2d0165829d0 275->277 276->275 278 2d0165827bc-2d0165827bf 276->278 278->275 279 2d0165827c5-2d0165827e6 VirtualAlloc 278->279 279->275 280 2d0165827ec-2d01658280c 279->280 281 2d016582838-2d01658283f 280->281 282 2d01658280e-2d016582836 280->282 283 2d0165828df-2d0165828e6 281->283 284 2d016582845-2d016582852 281->284 282->281 282->282 285 2d0165828ec-2d016582901 283->285 286 2d016582992-2d0165829b0 283->286 284->283 287 2d016582858-2d01658286a LoadLibraryA 284->287 285->286 288 2d016582907 285->288 286->277 289 2d0165828ca-2d0165828d2 287->289 290 2d01658286c-2d016582878 287->290 293 2d01658290d-2d016582921 288->293 289->287 291 2d0165828d4-2d0165828d9 289->291 294 2d0165828c5-2d0165828c8 290->294 291->283 296 2d016582982-2d01658298c 293->296 297 2d016582923-2d016582934 293->297 294->289 295 2d01658287a-2d01658287d 294->295 301 2d01658287f-2d0165828a5 295->301 302 2d0165828a7-2d0165828b7 295->302 296->286 296->293 299 2d01658293f-2d016582943 297->299 300 2d016582936-2d01658293d 297->300 305 2d01658294d-2d016582951 299->305 306 2d016582945-2d01658294b 299->306 304 2d016582970-2d016582980 300->304 303 2d0165828ba-2d0165828c1 301->303 302->303 303->294 304->296 304->297 307 2d016582963-2d016582967 305->307 308 2d016582953-2d016582961 305->308 306->304 307->304 310 2d016582969-2d01658296c 307->310 308->304 310->304
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3388723676.000002D016580000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D016580000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d016580000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: AllocLibraryLoadVirtual
                                                              • String ID:
                                                              • API String ID: 3550616410-0
                                                              • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                              • Instruction ID: 0197585b0632c450f7244b768ee28b396eb2739c6a19c1b09bc8c1b93abfbced
                                                              • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                              • Instruction Fuzzy Hash: 01610532B016D087EB54CF56988872D7B9AF754BD4F98C122DE5D07B98DA34DC92C780

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 000002D0165E1628: GetProcessHeap.KERNEL32 ref: 000002D0165E1633
                                                                • Part of subcall function 000002D0165E1628: HeapAlloc.KERNEL32 ref: 000002D0165E1642
                                                                • Part of subcall function 000002D0165E1628: RegOpenKeyExW.ADVAPI32 ref: 000002D0165E16B2
                                                                • Part of subcall function 000002D0165E1628: RegOpenKeyExW.ADVAPI32 ref: 000002D0165E16DF
                                                                • Part of subcall function 000002D0165E1628: RegCloseKey.ADVAPI32 ref: 000002D0165E16F9
                                                                • Part of subcall function 000002D0165E1628: RegOpenKeyExW.ADVAPI32 ref: 000002D0165E1719
                                                                • Part of subcall function 000002D0165E1628: RegCloseKey.ADVAPI32 ref: 000002D0165E1734
                                                                • Part of subcall function 000002D0165E1628: RegOpenKeyExW.ADVAPI32 ref: 000002D0165E1754
                                                                • Part of subcall function 000002D0165E1628: RegCloseKey.ADVAPI32 ref: 000002D0165E176F
                                                                • Part of subcall function 000002D0165E1628: RegOpenKeyExW.ADVAPI32 ref: 000002D0165E178F
                                                                • Part of subcall function 000002D0165E1628: RegCloseKey.ADVAPI32 ref: 000002D0165E17AA
                                                                • Part of subcall function 000002D0165E1628: RegOpenKeyExW.ADVAPI32 ref: 000002D0165E17CA
                                                              • Sleep.KERNEL32 ref: 000002D0165E1AD7
                                                              • SleepEx.KERNELBASE ref: 000002D0165E1ADD
                                                                • Part of subcall function 000002D0165E1628: RegCloseKey.ADVAPI32 ref: 000002D0165E17E5
                                                                • Part of subcall function 000002D0165E1628: RegOpenKeyExW.ADVAPI32 ref: 000002D0165E1805
                                                                • Part of subcall function 000002D0165E1628: RegCloseKey.ADVAPI32 ref: 000002D0165E1820
                                                                • Part of subcall function 000002D0165E1628: RegOpenKeyExW.ADVAPI32 ref: 000002D0165E1840
                                                                • Part of subcall function 000002D0165E1628: RegCloseKey.ADVAPI32 ref: 000002D0165E185B
                                                                • Part of subcall function 000002D0165E1628: RegOpenKeyExW.ADVAPI32 ref: 000002D0165E187B
                                                                • Part of subcall function 000002D0165E1628: RegCloseKey.ADVAPI32 ref: 000002D0165E1896
                                                                • Part of subcall function 000002D0165E1628: RegCloseKey.ADVAPI32 ref: 000002D0165E18A0
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: CloseOpen$HeapSleep$AllocProcess
                                                              • String ID:
                                                              • API String ID: 1534210851-0
                                                              • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                              • Instruction ID: 07e4e4e3ba5978a263fb33c37be15a198cbe7b0fb120eabd57c8358f31885df7
                                                              • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                              • Instruction Fuzzy Hash: D331C061A006C141FF709BA6DEC93E9B3A9AB44BC6F8454279E0E8B7B5EE15CD51C210

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 573 2d0165e2b2c-2d0165e2ba5 call 2d016602ce0 576 2d0165e2bab-2d0165e2bb1 573->576 577 2d0165e2ee0-2d0165e2f03 573->577 576->577 578 2d0165e2bb7-2d0165e2bba 576->578 578->577 579 2d0165e2bc0-2d0165e2bc3 578->579 579->577 580 2d0165e2bc9-2d0165e2bd9 GetModuleHandleA 579->580 581 2d0165e2bed 580->581 582 2d0165e2bdb-2d0165e2beb call 2d0165f6090 580->582 583 2d0165e2bf0-2d0165e2c0e 581->583 582->583 583->577 587 2d0165e2c14-2d0165e2c33 StrCmpNIW 583->587 587->577 588 2d0165e2c39-2d0165e2c3d 587->588 588->577 589 2d0165e2c43-2d0165e2c4d 588->589 589->577 590 2d0165e2c53-2d0165e2c5a 589->590 590->577 591 2d0165e2c60-2d0165e2c73 590->591 592 2d0165e2c75-2d0165e2c81 591->592 593 2d0165e2c83 591->593 594 2d0165e2c86-2d0165e2c8a 592->594 593->594 595 2d0165e2c8c-2d0165e2c98 594->595 596 2d0165e2c9a 594->596 597 2d0165e2c9d-2d0165e2ca7 595->597 596->597 598 2d0165e2d9d-2d0165e2da1 597->598 599 2d0165e2cad-2d0165e2cb0 597->599 602 2d0165e2da7-2d0165e2daa 598->602 603 2d0165e2ed2-2d0165e2eda 598->603 600 2d0165e2cc2-2d0165e2ccc 599->600 601 2d0165e2cb2-2d0165e2cbf call 2d0165e199c 599->601 605 2d0165e2cce-2d0165e2cdb 600->605 606 2d0165e2d00-2d0165e2d0a 600->606 601->600 607 2d0165e2dac-2d0165e2db8 call 2d0165e199c 602->607 608 2d0165e2dbb-2d0165e2dc5 602->608 603->577 603->591 605->606 612 2d0165e2cdd-2d0165e2cea 605->612 613 2d0165e2d0c-2d0165e2d19 606->613 614 2d0165e2d3a-2d0165e2d3d 606->614 607->608 609 2d0165e2dc7-2d0165e2dd4 608->609 610 2d0165e2df5-2d0165e2df8 608->610 609->610 616 2d0165e2dd6-2d0165e2de3 609->616 617 2d0165e2dfa-2d0165e2e03 call 2d0165e1bbc 610->617 618 2d0165e2e05-2d0165e2e12 lstrlenW 610->618 619 2d0165e2ced-2d0165e2cf3 612->619 613->614 620 2d0165e2d1b-2d0165e2d28 613->620 621 2d0165e2d3f-2d0165e2d49 call 2d0165e1bbc 614->621 622 2d0165e2d4b-2d0165e2d58 lstrlenW 614->622 625 2d0165e2de6-2d0165e2dec 616->625 617->618 636 2d0165e2e4a-2d0165e2e55 617->636 631 2d0165e2e14-2d0165e2e1e 618->631 632 2d0165e2e35-2d0165e2e3f call 2d0165e3844 618->632 629 2d0165e2cf9-2d0165e2cfe 619->629 630 2d0165e2d93-2d0165e2d98 619->630 633 2d0165e2d2b-2d0165e2d31 620->633 621->622 621->630 626 2d0165e2d5a-2d0165e2d64 622->626 627 2d0165e2d7b-2d0165e2d8d call 2d0165e3844 622->627 635 2d0165e2dee-2d0165e2df3 625->635 625->636 626->627 637 2d0165e2d66-2d0165e2d79 call 2d0165e152c 626->637 627->630 640 2d0165e2e42-2d0165e2e44 627->640 629->606 629->619 630->640 631->632 641 2d0165e2e20-2d0165e2e33 call 2d0165e152c 631->641 632->640 633->630 642 2d0165e2d33-2d0165e2d38 633->642 635->610 635->625 645 2d0165e2ecc-2d0165e2ed0 636->645 646 2d0165e2e57-2d0165e2e5b 636->646 637->627 637->630 640->603 640->636 641->632 641->636 642->614 642->633 645->603 650 2d0165e2e5d-2d0165e2e61 646->650 651 2d0165e2e63-2d0165e2e7d call 2d0165e85c0 646->651 650->651 654 2d0165e2e80-2d0165e2e83 650->654 651->654 657 2d0165e2ea6-2d0165e2ea9 654->657 658 2d0165e2e85-2d0165e2ea3 call 2d0165e85c0 654->658 657->645 660 2d0165e2eab-2d0165e2ec9 call 2d0165e85c0 657->660 658->657 660->645
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                              • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                              • API String ID: 2119608203-3850299575
                                                              • Opcode ID: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                              • Instruction ID: d3b596ab05dff9b38269f4f9cd95cbcd315625dbf01702ec5e409f4043454db4
                                                              • Opcode Fuzzy Hash: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                              • Instruction Fuzzy Hash: 40B18166210AD18AEF648FA5DD887A9B3A5FB44BC4F849017EE0D537A8DF36CE41C740
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 3140674995-0
                                                              • Opcode ID: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                              • Instruction ID: 20d5fac5d31b6f1b1b7ff7f3eed5433fc4695a7276fd3db9f08efe4689facb88
                                                              • Opcode Fuzzy Hash: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                              • Instruction Fuzzy Hash: 8A311C76205BC08AEB609FA0EC947ED7365F785744F84442ADA4E57BA8EF39CA48C710
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 1239891234-0
                                                              • Opcode ID: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                              • Instruction ID: 3b7d1831335daaf51ebfd733c592f0e35ffd938c3d674718b742b5f189087fd6
                                                              • Opcode Fuzzy Hash: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                              • Instruction Fuzzy Hash: 09314036214FC086EB60CF65EC843AE73A4F789754F940226EA9D47BA5DF39CA55CB00

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                              • String ID: d
                                                              • API String ID: 2005889112-2564639436
                                                              • Opcode ID: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                              • Instruction ID: e3e3399429e55960cf070cc16a5005b5190db7e605521ce6618ec048f68560e7
                                                              • Opcode Fuzzy Hash: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                              • Instruction Fuzzy Hash: BE517F76200B8486EB60CFA2E88879AB7A1F788FC9F844126DE4D07768DF3DC545CB10

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: CurrentThread$AddressHandleModuleProc
                                                              • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                              • API String ID: 4175298099-1975688563
                                                              • Opcode ID: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                              • Instruction ID: 9dee3d71542fb905587bd6568b7d178f2fe6f5c2276b71c2ce632fa0ceebaf95
                                                              • Opcode Fuzzy Hash: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                              • Instruction Fuzzy Hash: B731C2A5500ACAA0EF50EFE5ECD97D4B324BB04385FC09563A42D02179AF79CF49C7A0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 415 2d016586910-2d016586916 416 2d016586918-2d01658691b 415->416 417 2d016586951-2d01658695b 415->417 419 2d01658691d-2d016586920 416->419 420 2d016586945-2d016586984 call 2d016586fc0 416->420 418 2d016586a78-2d016586a8d 417->418 424 2d016586a9c-2d016586ab6 call 2d016586e54 418->424 425 2d016586a8f 418->425 422 2d016586938 __scrt_dllmain_crt_thread_attach 419->422 423 2d016586922-2d016586925 419->423 438 2d01658698a-2d01658699f call 2d016586e54 420->438 439 2d016586a52 420->439 427 2d01658693d-2d016586944 422->427 429 2d016586931-2d016586936 call 2d016586f04 423->429 430 2d016586927-2d016586930 423->430 436 2d016586ab8-2d016586aed call 2d016586f7c call 2d016586e1c call 2d016587318 call 2d016587130 call 2d016587154 call 2d016586fac 424->436 437 2d016586aef-2d016586b20 call 2d016587190 424->437 431 2d016586a91-2d016586a9b 425->431 429->427 436->431 447 2d016586b31-2d016586b37 437->447 448 2d016586b22-2d016586b28 437->448 450 2d016586a6a-2d016586a77 call 2d016587190 438->450 451 2d0165869a5-2d0165869b6 call 2d016586ec4 438->451 442 2d016586a54-2d016586a69 439->442 453 2d016586b39-2d016586b43 447->453 454 2d016586b7e-2d016586b94 call 2d01658268c 447->454 448->447 452 2d016586b2a-2d016586b2c 448->452 450->418 469 2d0165869b8-2d0165869dc call 2d0165872dc call 2d016586e0c call 2d016586e38 call 2d01658ac0c 451->469 470 2d016586a07-2d016586a11 call 2d016587130 451->470 458 2d016586c1f-2d016586c2c 452->458 459 2d016586b4f-2d016586b5d call 2d016595780 453->459 460 2d016586b45-2d016586b4d 453->460 472 2d016586bcc-2d016586bce 454->472 473 2d016586b96-2d016586b98 454->473 466 2d016586b63-2d016586b78 call 2d016586910 459->466 482 2d016586c15-2d016586c1d 459->482 460->466 466->454 466->482 469->470 518 2d0165869de-2d0165869e5 __scrt_dllmain_after_initialize_c 469->518 470->439 491 2d016586a13-2d016586a1f call 2d016587180 470->491 480 2d016586bd0-2d016586bd3 472->480 481 2d016586bd5-2d016586bea call 2d016586910 472->481 473->472 479 2d016586b9a-2d016586bbc call 2d01658268c call 2d016586a78 473->479 479->472 512 2d016586bbe-2d016586bc6 call 2d016595780 479->512 480->481 480->482 481->482 500 2d016586bec-2d016586bf6 481->500 482->458 502 2d016586a21-2d016586a2b call 2d016587098 491->502 503 2d016586a45-2d016586a50 491->503 506 2d016586bf8-2d016586bff 500->506 507 2d016586c01-2d016586c11 call 2d016595780 500->507 502->503 517 2d016586a2d-2d016586a3b 502->517 503->442 506->482 507->482 512->472 517->503 518->470 519 2d0165869e7-2d016586a04 call 2d01658abc8 518->519 519->470
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3388723676.000002D016580000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D016580000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d016580000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                              • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                                                              • API String ID: 190073905-1786718095
                                                              • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction ID: dd7692e2b99b60a86f76d6b3ad3452ab25c272ff970cedf1c1e1e01c02871081
                                                              • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction Fuzzy Hash: 8B81B1616102E186FB50ABE7DCDD3592298EB85B88FD48027AA4D47FB7DB38CD458720

                                                              Control-flow Graph

                                                              APIs
                                                              • GetLastError.KERNEL32 ref: 000002D0165ECE37
                                                              • FlsGetValue.KERNEL32(?,?,?,000002D0165F0A6B,?,?,?,000002D0165F045C,?,?,?,000002D0165EC84F), ref: 000002D0165ECE4C
                                                              • FlsSetValue.KERNEL32(?,?,?,000002D0165F0A6B,?,?,?,000002D0165F045C,?,?,?,000002D0165EC84F), ref: 000002D0165ECE6D
                                                              • FlsSetValue.KERNEL32(?,?,?,000002D0165F0A6B,?,?,?,000002D0165F045C,?,?,?,000002D0165EC84F), ref: 000002D0165ECE9A
                                                              • FlsSetValue.KERNEL32(?,?,?,000002D0165F0A6B,?,?,?,000002D0165F045C,?,?,?,000002D0165EC84F), ref: 000002D0165ECEAB
                                                              • FlsSetValue.KERNEL32(?,?,?,000002D0165F0A6B,?,?,?,000002D0165F045C,?,?,?,000002D0165EC84F), ref: 000002D0165ECEBC
                                                              • SetLastError.KERNEL32 ref: 000002D0165ECED7
                                                              • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,000002D0165F0A6B,?,?,?,000002D0165F045C,?,?,?,000002D0165EC84F), ref: 000002D0165ECF0D
                                                              • FlsSetValue.KERNEL32(?,?,00000001,000002D0165EECCC,?,?,?,?,000002D0165EBF9F,?,?,?,?,?,000002D0165E7AB0), ref: 000002D0165ECF2C
                                                                • Part of subcall function 000002D0165ED6CC: HeapAlloc.KERNEL32 ref: 000002D0165ED721
                                                              • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002D0165F0A6B,?,?,?,000002D0165F045C,?,?,?,000002D0165EC84F), ref: 000002D0165ECF54
                                                                • Part of subcall function 000002D0165ED744: HeapFree.KERNEL32 ref: 000002D0165ED75A
                                                                • Part of subcall function 000002D0165ED744: GetLastError.KERNEL32 ref: 000002D0165ED764
                                                              • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002D0165F0A6B,?,?,?,000002D0165F045C,?,?,?,000002D0165EC84F), ref: 000002D0165ECF65
                                                              • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002D0165F0A6B,?,?,?,000002D0165F045C,?,?,?,000002D0165EC84F), ref: 000002D0165ECF76
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorLast$Heap$AllocFree
                                                              • String ID:
                                                              • API String ID: 570795689-0
                                                              • Opcode ID: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                              • Instruction ID: 6cb119c879d4005e3e486556fd0f16809afcb4c169a1b85a080ac9ab7b906ee7
                                                              • Opcode Fuzzy Hash: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                              • Instruction Fuzzy Hash: D14162212016C546FF69A7F95DDE369E2425B447B0FD4472BB83E0A7F6DE2ACE418200
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                              • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                              • API String ID: 2171963597-1373409510
                                                              • Opcode ID: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                              • Instruction ID: 27c92a905a2f4f6f1a7d1a88f5f4c691c2a465980edda73e2f7a22435be0af33
                                                              • Opcode Fuzzy Hash: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                              • Instruction Fuzzy Hash: 92212F3661479082FB108B65F88875977A5F789BA5F904216EA5D03BB8DF7CC949CF00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3388723676.000002D016580000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D016580000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d016580000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                              • String ID: csm$csm$csm
                                                              • API String ID: 849930591-393685449
                                                              • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                              • Instruction ID: 8d33458c817a64122548c589ceefed1e9e6f3c6a843f5d4004e67bc5e997e060
                                                              • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                              • Instruction Fuzzy Hash: 16E170726057808AEB60DFAAD8C839D77B8F755B98F900116EE8D57FA6CB34C991C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                              • String ID: csm$csm$csm
                                                              • API String ID: 849930591-393685449
                                                              • Opcode ID: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                              • Instruction ID: 3b43c7ab403b83ca95457f37da0d4b500b38ba5a1a126430ff915fab710d6147
                                                              • Opcode Fuzzy Hash: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                              • Instruction Fuzzy Hash: 7BE14C72A047C08AEF60DFB5988839DB7A0F755798F900117EE8D57BA9CB36CA91C740
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeLibraryProc
                                                              • String ID: api-ms-$ext-ms-
                                                              • API String ID: 3013587201-537541572
                                                              • Opcode ID: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                              • Instruction ID: d0c3c69c08ddd6f5c27ead1c77a57a672af2ad5f3c132c9258f8044c477055ab
                                                              • Opcode Fuzzy Hash: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                              • Instruction Fuzzy Hash: D0410622311A9091FF16CFEAAD88756A395B744BE0FC4412B9D4E877A4EE3ECE458310
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                              • String ID: d
                                                              • API String ID: 3743429067-2564639436
                                                              • Opcode ID: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                              • Instruction ID: 60b4ca63da48bf83ee31c643dec68d0684812f94169e8e12275eb22dcfa7cc50
                                                              • Opcode Fuzzy Hash: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                              • Instruction Fuzzy Hash: F4416273614BC4C6EB64CFA1E88879EB7A1F388B99F448116DA8D07768DF39C945CB40
                                                              APIs
                                                              • FlsGetValue.KERNEL32(?,?,?,000002D0165EC7DE,?,?,?,?,?,?,?,?,000002D0165ECF9D,?,?,00000001), ref: 000002D0165ED087
                                                              • FlsSetValue.KERNEL32(?,?,?,000002D0165EC7DE,?,?,?,?,?,?,?,?,000002D0165ECF9D,?,?,00000001), ref: 000002D0165ED0A6
                                                              • FlsSetValue.KERNEL32(?,?,?,000002D0165EC7DE,?,?,?,?,?,?,?,?,000002D0165ECF9D,?,?,00000001), ref: 000002D0165ED0CE
                                                              • FlsSetValue.KERNEL32(?,?,?,000002D0165EC7DE,?,?,?,?,?,?,?,?,000002D0165ECF9D,?,?,00000001), ref: 000002D0165ED0DF
                                                              • FlsSetValue.KERNEL32(?,?,?,000002D0165EC7DE,?,?,?,?,?,?,?,?,000002D0165ECF9D,?,?,00000001), ref: 000002D0165ED0F0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID: 1%$Y%
                                                              • API String ID: 3702945584-1395475152
                                                              • Opcode ID: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                              • Instruction ID: 7080bbce82f1be4da0ddcc39a1ebc959a46846a47c0639f49ef077fcb6817628
                                                              • Opcode Fuzzy Hash: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                              • Instruction Fuzzy Hash: F51133617042C442FF6857ED5DDD369E2415B447F0FD84327A83E466FAEE2ACE428600
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                              • String ID:
                                                              • API String ID: 190073905-0
                                                              • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction ID: cc22ab156fd64d921cb8bab48c84aed77748f638e97627413a858d82ffff3ace
                                                              • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction Fuzzy Hash: 2E819F216007C186FF50ABE5ACC93B9E690EB85784FD4442BEA4D477B6EB3ACE45C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: Library$Load$AddressErrorFreeLastProc
                                                              • String ID: api-ms-
                                                              • API String ID: 2559590344-2084034818
                                                              • Opcode ID: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                              • Instruction ID: aca1f05cb46fc00515c66d976e56b7ae3e88fb2388c081806b711800b0246c42
                                                              • Opcode Fuzzy Hash: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                              • Instruction Fuzzy Hash: 5031B821312BD1D1EF15DBD2AC88755A3A4B748BA0FD909279E1D477B0EF3ACA558310
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                              • String ID: CONOUT$
                                                              • API String ID: 3230265001-3130406586
                                                              • Opcode ID: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                              • Instruction ID: d628bd0090cde46b23efa145587aed2904a5f36c40d9d109057e4cb8b91bb961
                                                              • Opcode Fuzzy Hash: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                              • Instruction Fuzzy Hash: 71118F31310BD086E7508BA2EC88719B6A4F788FE5F944266EE5E877B5CF78CC148744
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$AllocFree
                                                              • String ID: dialer
                                                              • API String ID: 756756679-3528709123
                                                              • Opcode ID: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                              • Instruction ID: a1042e87f8364f6b2e966bad11af8e790b8d99eaa053b685ef812c5dffe2a578
                                                              • Opcode Fuzzy Hash: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                              • Instruction Fuzzy Hash: 6531B522701B9186EB14CF96DD88769B7A0FB44BC0F8881229E4C47B75EF3ACD618700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$Free
                                                              • String ID: C:\Windows\system32\winlogon.exe
                                                              • API String ID: 3168794593-3603389050
                                                              • Opcode ID: d27b9b8ca154d9eedff1e610dfbacc8608a6d25d7c3fe3b6d17278c798082fda
                                                              • Instruction ID: 7f7260ef79563c5a266f126e1a848f4d5cc61924374436ce50858df01a2f744e
                                                              • Opcode Fuzzy Hash: d27b9b8ca154d9eedff1e610dfbacc8608a6d25d7c3fe3b6d17278c798082fda
                                                              • Instruction Fuzzy Hash: 8621A0AB508AE08AE760DFB59CD9B9D37A1F749B44F894057DB4D83367DE25CC088720
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorLast
                                                              • String ID:
                                                              • API String ID: 2506987500-0
                                                              • Opcode ID: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                              • Instruction ID: 881857e728745ec88ca4b8388d6fa749b937d482b05cecb59b8676985d1b6840
                                                              • Opcode Fuzzy Hash: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                              • Instruction Fuzzy Hash: B7113D212052C482FF64A7F99DDD329E2426B947B0F945727A83E477F6EE6ACE418600
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                              • String ID:
                                                              • API String ID: 517849248-0
                                                              • Opcode ID: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                              • Instruction ID: 94470d76e8e99169dc1bd6030e286acf90538daadbbb330fa07aa5c63b58bfdf
                                                              • Opcode Fuzzy Hash: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                              • Instruction Fuzzy Hash: BD012931300A9082EB64DBA2A89C799A3A5F788BC5FC84076DE4E43765DF3DCD89C750
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                              • String ID:
                                                              • API String ID: 449555515-0
                                                              • Opcode ID: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                              • Instruction ID: 0ee65fdd732b982381bbf943d3faa4b165bcf9ac086ffcbc2b1acb993f4b5dc0
                                                              • Opcode Fuzzy Hash: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                              • Instruction Fuzzy Hash: 72012975211B80C2EF249BA1EC9C71A73A4BB49B86F94446ADD4D077B5EF3ECA488710
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 2395640692-629598281
                                                              • Opcode ID: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                                                              • Instruction ID: 289176f1ec5211bc532f7d3476c86f990fa8211b4c40f3c47dcc25eee0941410
                                                              • Opcode Fuzzy Hash: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                                                              • Instruction Fuzzy Hash: CB51A43270168086EF18DFA5EC8CB59B7BAF344B88F908526DE5A47758EB76CE41C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: FinalHandleNamePathlstrlen
                                                              • String ID: \\?\
                                                              • API String ID: 2719912262-4282027825
                                                              • Opcode ID: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                              • Instruction ID: b0a73550e19d607c0733c4eed862a0f106358cff4bd746a1ba228e1ad1f57731
                                                              • Opcode Fuzzy Hash: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                              • Instruction Fuzzy Hash: B6F04F2270468192EB708FA1FCC87A9A760F748B89FD44022DA4D479A4DF7DCE8DCB10
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: CombinePath
                                                              • String ID: \\.\pipe\
                                                              • API String ID: 3422762182-91387939
                                                              • Opcode ID: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                              • Instruction ID: 9f9f7269bcd04a4d7622e5ff7d9e750e699f4d99e062e085e30b3f0fddd74a17
                                                              • Opcode Fuzzy Hash: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                              • Instruction Fuzzy Hash: 50F08C21704BD082EF008BA3BD8C219A260AB48FC0F888172EE4E07B79DF3CC9458710
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                              • String ID: CorExitProcess$mscoree.dll
                                                              • API String ID: 4061214504-1276376045
                                                              • Opcode ID: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                              • Instruction ID: 73b21768389709e2f3859606edec8d020a16b8eaf151ef1aa857b1fe75e1916b
                                                              • Opcode Fuzzy Hash: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                              • Instruction Fuzzy Hash: BCF06D61311A9581EF108BB4EC8C36A6361EB88BA1FD4025ADA6E462F4DF2DC9488320
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: CurrentThread
                                                              • String ID:
                                                              • API String ID: 2882836952-0
                                                              • Opcode ID: 0c7f3a11ae4e5ff47235e902b7b6ce7055ed727b420134bb2449cab27e882fd8
                                                              • Instruction ID: 9867a48db4e2f8fc4ca8a19f3b7debced05d252233e4c618cb6bf9eff3b46b8e
                                                              • Opcode Fuzzy Hash: 0c7f3a11ae4e5ff47235e902b7b6ce7055ed727b420134bb2449cab27e882fd8
                                                              • Instruction Fuzzy Hash: 2F619076519B84C6EB60CB95E88831AB7A0F384794F905116FACD47BB4DB7EC954CF00
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3388723676.000002D016580000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D016580000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d016580000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: _set_statfp
                                                              • String ID:
                                                              • API String ID: 1156100317-0
                                                              • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction ID: d75896c64213f2a1704ddb0ef00b701f646facd3cf9c70f6f098307262c4cee0
                                                              • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction Fuzzy Hash: 28117326A14ED1D2FB6415E8ECDD36916816B5C37CFC8A63AA96F466F7CA28CC414100
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: _set_statfp
                                                              • String ID:
                                                              • API String ID: 1156100317-0
                                                              • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction ID: 8658335e92f09a8eeac19449c432923065bddb668eaed47daa1299e6c01b2058
                                                              • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction Fuzzy Hash: 4211A322A52BD411F76415E8DCDD76629406B783B8FC80AB6A97E177F7CB24CC554240
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3388723676.000002D016580000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D016580000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d016580000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID: Tuesday$Wednesday$or copy constructor iterator'
                                                              • API String ID: 3215553584-4202648911
                                                              • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                              • Instruction ID: 7926be692a7c3970f031dc47edbaea785ae167cdd99d474087a09ccf8e4f8d1a
                                                              • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                              • Instruction Fuzzy Hash: 4F617D666006C086FB659BEEEDCC32A6AA9A7897C4FD44517CB4F17FB5DB38CC418210
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: CallEncodePointerTranslator
                                                              • String ID: MOC$RCC
                                                              • API String ID: 3544855599-2084237596
                                                              • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction ID: 804a080e077f51fda726543e3350a461b6da8e690454341ee308e9e8ff120439
                                                              • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction Fuzzy Hash: 8E615973A00B848AEB20DFA5D88439DB7B0F344B88F444216EF4D17BA8DB39CA95C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3388723676.000002D016580000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D016580000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d016580000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                              • String ID: csm$csm
                                                              • API String ID: 3896166516-3733052814
                                                              • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction ID: ef81340c4c69f026b87580c2449cc675fc22f141087421cbe63eea405b38429c
                                                              • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction Fuzzy Hash: 6E516B321006C0CAEB748BA7998835877A8F355B94F988217DE9D87FE5CB38DC91C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                              • String ID: csm$csm
                                                              • API String ID: 3896166516-3733052814
                                                              • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction ID: ad9e7e9185666ca75af795e8e0b1f6e55ca99cc2d9033536fe9523c4600d1b2c
                                                              • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction Fuzzy Hash: 9D517C761006C08AEF648BB599C8359B7A0F354B85F984217EE9D47BE5CB39DE90CB00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3388723676.000002D016580000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D016580000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d016580000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritable__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 3242871069-629598281
                                                              • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                              • Instruction ID: ebd46bf5b9efac163910b3874f46543552e5e73946441d757bd614891983f18b
                                                              • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                              • Instruction Fuzzy Hash: 3251CE327017809AEB14DF96F888B193799F354B98F968126DA5F43FA8EB34DD41C704
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3388723676.000002D016580000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D016580000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d016580000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritable__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 3242871069-629598281
                                                              • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                              • Instruction ID: 7c97df61a7296e2470a292fba203d579020853e1c807cf3699b4a2e3da698be7
                                                              • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                              • Instruction Fuzzy Hash: ED316632201780D6E714DB92EC88B1977A8F780B98F968016AE9F07BA8DB38CD41C704
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: FileWrite$ConsoleErrorLastOutput
                                                              • String ID:
                                                              • API String ID: 2718003287-0
                                                              • Opcode ID: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                              • Instruction ID: 5187ed22ee1aa0ccaa690343eb8763e497484eb7c5724e3e0ad55031fafd28ef
                                                              • Opcode Fuzzy Hash: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                              • Instruction Fuzzy Hash: A1D1D0B2B14A8089E711CFF9D88839C3BB1F3547D8F948256CE9D97BA9DA74C906C740
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: ConsoleErrorLastMode
                                                              • String ID:
                                                              • API String ID: 953036326-0
                                                              • Opcode ID: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                              • Instruction ID: fc307cff70842e2266af54710cb554fca6c11a8db0236a9223c07c1d4ecee361
                                                              • Opcode Fuzzy Hash: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                              • Instruction Fuzzy Hash: AA91AFB260069095F7609FE5DCC83AD2BA4B744BC8F94858BDE4E57AA5DB34CC86C700
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                              • String ID:
                                                              • API String ID: 2933794660-0
                                                              • Opcode ID: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                              • Instruction ID: 9a0ea9a6380481f60f05ebf9f0f7dac1e0ce870ea14a63a246dffcc75113e077
                                                              • Opcode Fuzzy Hash: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                              • Instruction Fuzzy Hash: 80113022714F5189EF00CFB0EC983A833A4F719758F840E26EA6D467A4DF78C5A88380
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: FileType
                                                              • String ID: \\.\pipe\
                                                              • API String ID: 3081899298-91387939
                                                              • Opcode ID: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                              • Instruction ID: 8ed4e21bebd3e23e3000fdb066cfaa34740bf68bfd650f15aaa82489475c79c3
                                                              • Opcode Fuzzy Hash: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                              • Instruction Fuzzy Hash: 6871AF762007C18AEF649EA59CC83AAB794F389BC4F944127DD0E53BA9DE36CF458700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3388723676.000002D016580000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D016580000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d016580000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: CallTranslator
                                                              • String ID: MOC$RCC
                                                              • API String ID: 3163161869-2084237596
                                                              • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction ID: 7d9756844898b90560aff503cb0a52449b1d73c23fde83014149b18977801b46
                                                              • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction Fuzzy Hash: 36614A32600B848AEB24DFAAD88439D7BB4F744B88F444216EF4D17BA9DB38D955C740
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: FileType
                                                              • String ID: \\.\pipe\
                                                              • API String ID: 3081899298-91387939
                                                              • Opcode ID: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                              • Instruction ID: 4e8424fe214da5e11d23322d54be976519fd80502f98cc10b4f99395f6fd04db
                                                              • Opcode Fuzzy Hash: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                              • Instruction Fuzzy Hash: B651A2326047C185EF649BAAA9DC3AAF751F385780FC58127DD9D07B6DDA3ACE048740
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastWrite
                                                              • String ID: U
                                                              • API String ID: 442123175-4171548499
                                                              • Opcode ID: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                              • Instruction ID: 34cadd197f94b95d681e4a8cd0f756d6a2bd82b0c53d0e2054fc3c1200778bca
                                                              • Opcode Fuzzy Hash: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                              • Instruction Fuzzy Hash: 19419572715BC085DB209FA5E8883AAB7A1F7987D4F908026EE4D877A4DB7CC945C740
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFileHeaderRaise
                                                              • String ID: csm
                                                              • API String ID: 2573137834-1018135373
                                                              • Opcode ID: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                              • Instruction ID: 6af6caf33eed429f26f2400f1c1a474b57e550817839aeb2e9cd6687076bf096
                                                              • Opcode Fuzzy Hash: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                              • Instruction Fuzzy Hash: 82113032214B8082EB618F25F844359B7E5FB88B94F584222DECC07768DF3DC951C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3388723676.000002D016580000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D016580000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d016580000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: __std_exception_copy
                                                              • String ID: ierarchy Descriptor'$riptor at (
                                                              • API String ID: 592178966-758928094
                                                              • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                              • Instruction ID: a87dbb86b00b2b98d5e7ae00f565f44d8c78c7afccc986630b2b213103a98e21
                                                              • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                              • Instruction Fuzzy Hash: D9E086A1640B84D0EF018F62EC8439833A4DB58B68FC89123DD5C47321FA38D5F9C300
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3388723676.000002D016580000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D016580000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d016580000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: __std_exception_copy
                                                              • String ID: Locator'$riptor at (
                                                              • API String ID: 592178966-4215709766
                                                              • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                              • Instruction ID: dffd4c35c552f18d438efc623f6b9ab54137c7cb9bea290096256bc086aaf240
                                                              • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                              • Instruction Fuzzy Hash: AFE086A1600B84C0EF018F61E8802987364E758B58FC89123CA4C47321EA38D5E5C300
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$AllocFree
                                                              • String ID:
                                                              • API String ID: 756756679-0
                                                              • Opcode ID: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                              • Instruction ID: 6801c8294921cadce8a74c671636f0fe5ff9b85a627fac1833d6bc37b2bfe6e2
                                                              • Opcode Fuzzy Hash: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                              • Instruction Fuzzy Hash: 7F118F25701B8481EF54DBA6E888769B3A1FB89FC1F98406ADE4D87775DE39D942C300
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000011.00000002.3390195675.000002D0165E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D0165E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_17_2_2d0165e0000_winlogon.jbxd
                                                              Similarity
                                                              • API ID: Heap$AllocProcess
                                                              • String ID:
                                                              • API String ID: 1617791916-0
                                                              • Opcode ID: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                              • Instruction ID: 68d956744345cf7861370da0470b2e65133afa0ec658b7fe96f4140d664497f0
                                                              • Opcode Fuzzy Hash: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                              • Instruction Fuzzy Hash: 57E06535A01A5486EB088FA2DC4C74A36E1FB89F06F88C024C90D07361DF7EC899CBA0
                                                              Memory Dump Source
                                                              • Source File: 00000014.00000002.2145878781.00007FF63DE71000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF63DE70000, based on PE: true
                                                              • Associated: 00000014.00000002.2145844713.00007FF63DE70000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000014.00000002.2145922676.00007FF63DE79000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000014.00000002.2146559168.00007FF63E3C8000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000014.00000002.2146586673.00007FF63E3CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000014.00000002.2146609995.00007FF63E3D0000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000014.00000002.2146632639.00007FF63E3D3000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000014.00000002.2146656027.00007FF63E3D4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_20_2_7ff63de70000_updater.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8e2382d73125df78936d26452b80bcba07539e5c8c97af36270da171beb56e3f
                                                              • Instruction ID: f7095cb65cbc216715e69405cd1f891ac40d0d87800313134cdd308a6615467d
                                                              • Opcode Fuzzy Hash: 8e2382d73125df78936d26452b80bcba07539e5c8c97af36270da171beb56e3f
                                                              • Instruction Fuzzy Hash: 01B01234F0470984F3003F41D84125C37206B14700F421830D40C47353CE7CD06C5720

                                                              Execution Graph

                                                              Execution Coverage:1.1%
                                                              Dynamic/Decrypted Code Coverage:0%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:124
                                                              Total number of Limit Nodes:13
                                                              execution_graph 15153 2d6f151202c 15154 2d6f151205d 15153->15154 15155 2d6f1512173 15154->15155 15161 2d6f1512081 15154->15161 15162 2d6f151213e 15154->15162 15156 2d6f1512178 15155->15156 15158 2d6f15121e7 15155->15158 15171 2d6f1512f04 GetProcessHeap 15156->15171 15160 2d6f1512f04 9 API calls 15158->15160 15158->15162 15159 2d6f15120b9 StrCmpNIW 15159->15161 15160->15162 15161->15159 15161->15162 15164 2d6f1511bf4 15161->15164 15162->15162 15165 2d6f1511c1b GetProcessHeap 15164->15165 15166 2d6f1511c8f 15164->15166 15168 2d6f1511c41 _invalid_parameter_noinfo 15165->15168 15166->15161 15167 2d6f1511c77 GetProcessHeap HeapFree 15167->15166 15168->15166 15168->15167 15177 2d6f151152c 15168->15177 15176 2d6f1512f40 _invalid_parameter_noinfo 15171->15176 15172 2d6f1513015 GetProcessHeap HeapFree 15172->15162 15173 2d6f1513010 15173->15172 15174 2d6f1512fa2 StrCmpNIW 15174->15176 15175 2d6f1511bf4 5 API calls 15175->15176 15176->15172 15176->15173 15176->15174 15176->15175 15178 2d6f151157c 15177->15178 15181 2d6f1511546 15177->15181 15178->15167 15179 2d6f151155d StrCmpIW 15179->15181 15180 2d6f1511565 StrCmpW 15180->15181 15181->15178 15181->15179 15181->15180 15182 2d6f151253c 15183 2d6f15125bb 15182->15183 15184 2d6f151261d GetFileType 15183->15184 15196 2d6f15127aa 15183->15196 15185 2d6f151262b StrCpyW 15184->15185 15186 2d6f1512641 15184->15186 15187 2d6f1512650 15185->15187 15198 2d6f1511a40 GetFinalPathNameByHandleW 15186->15198 15190 2d6f15126ff 15187->15190 15191 2d6f151265a 15187->15191 15192 2d6f1513844 StrCmpNIW 15190->15192 15195 2d6f1513044 4 API calls 15190->15195 15190->15196 15197 2d6f1511cac 2 API calls 15190->15197 15191->15196 15203 2d6f1513844 15191->15203 15206 2d6f1513044 StrCmpIW 15191->15206 15210 2d6f1511cac 15191->15210 15192->15190 15195->15190 15197->15190 15199 2d6f1511aa9 15198->15199 15200 2d6f1511a6a StrCmpNIW 15198->15200 15199->15187 15200->15199 15201 2d6f1511a84 lstrlenW 15200->15201 15201->15199 15202 2d6f1511a96 StrCpyW 15201->15202 15202->15199 15204 2d6f1513851 StrCmpNIW 15203->15204 15205 2d6f1513866 15203->15205 15204->15205 15205->15191 15207 2d6f1513076 StrCpyW StrCatW 15206->15207 15208 2d6f151308d PathCombineW 15206->15208 15209 2d6f1513096 15207->15209 15208->15209 15209->15191 15211 2d6f1511cc3 15210->15211 15212 2d6f1511ccc 15210->15212 15213 2d6f151152c 2 API calls 15211->15213 15212->15191 15213->15212 15214 2d6f1511abc 15219 2d6f1511628 GetProcessHeap 15214->15219 15216 2d6f1511ad2 Sleep SleepEx 15217 2d6f1511acb 15216->15217 15217->15216 15218 2d6f1511598 StrCmpIW StrCmpW 15217->15218 15218->15217 15220 2d6f1511648 _invalid_parameter_noinfo 15219->15220 15264 2d6f1511268 GetProcessHeap 15220->15264 15222 2d6f1511650 15223 2d6f1511268 2 API calls 15222->15223 15224 2d6f1511661 15223->15224 15225 2d6f1511268 2 API calls 15224->15225 15226 2d6f151166a 15225->15226 15227 2d6f1511268 2 API calls 15226->15227 15228 2d6f1511673 15227->15228 15229 2d6f151168e RegOpenKeyExW 15228->15229 15230 2d6f15118a6 15229->15230 15231 2d6f15116c0 RegOpenKeyExW 15229->15231 15230->15217 15232 2d6f15116e9 15231->15232 15233 2d6f15116ff RegOpenKeyExW 15231->15233 15275 2d6f15112bc RegQueryInfoKeyW 15232->15275 15235 2d6f151173a RegOpenKeyExW 15233->15235 15236 2d6f1511723 15233->15236 15239 2d6f151175e 15235->15239 15240 2d6f1511775 RegOpenKeyExW 15235->15240 15268 2d6f151104c RegQueryInfoKeyW 15236->15268 15244 2d6f15112bc 13 API calls 15239->15244 15241 2d6f1511799 15240->15241 15242 2d6f15117b0 RegOpenKeyExW 15240->15242 15246 2d6f15112bc 13 API calls 15241->15246 15247 2d6f15117eb RegOpenKeyExW 15242->15247 15248 2d6f15117d4 15242->15248 15245 2d6f151176b RegCloseKey 15244->15245 15245->15240 15249 2d6f15117a6 RegCloseKey 15246->15249 15251 2d6f1511826 RegOpenKeyExW 15247->15251 15252 2d6f151180f 15247->15252 15250 2d6f15112bc 13 API calls 15248->15250 15249->15242 15253 2d6f15117e1 RegCloseKey 15250->15253 15255 2d6f151184a 15251->15255 15256 2d6f1511861 RegOpenKeyExW 15251->15256 15254 2d6f151104c 5 API calls 15252->15254 15253->15247 15259 2d6f151181c RegCloseKey 15254->15259 15260 2d6f151104c 5 API calls 15255->15260 15257 2d6f151189c RegCloseKey 15256->15257 15258 2d6f1511885 15256->15258 15257->15230 15262 2d6f151104c 5 API calls 15258->15262 15259->15251 15261 2d6f1511857 RegCloseKey 15260->15261 15261->15256 15263 2d6f1511892 RegCloseKey 15262->15263 15263->15257 15286 2d6f1526168 15264->15286 15266 2d6f1511283 GetProcessHeap 15267 2d6f15112ae _invalid_parameter_noinfo 15266->15267 15267->15222 15269 2d6f15110bf 15268->15269 15270 2d6f15111b5 RegCloseKey 15268->15270 15269->15270 15271 2d6f15110cf RegEnumValueW 15269->15271 15270->15235 15273 2d6f1511125 _invalid_parameter_noinfo 15271->15273 15272 2d6f151114e GetProcessHeap 15272->15273 15273->15270 15273->15271 15273->15272 15274 2d6f151116e GetProcessHeap HeapFree 15273->15274 15274->15273 15276 2d6f1511327 GetProcessHeap 15275->15276 15277 2d6f151148a RegCloseKey 15275->15277 15283 2d6f151133e _invalid_parameter_noinfo 15276->15283 15277->15233 15278 2d6f1511476 GetProcessHeap HeapFree 15278->15277 15279 2d6f1511352 RegEnumValueW 15279->15283 15280 2d6f151152c 2 API calls 15280->15283 15281 2d6f151141e lstrlenW GetProcessHeap 15281->15283 15282 2d6f15113d3 GetProcessHeap 15282->15283 15283->15278 15283->15279 15283->15280 15283->15281 15283->15282 15284 2d6f15113f3 GetProcessHeap HeapFree 15283->15284 15285 2d6f1511443 StrCpyW 15283->15285 15284->15281 15285->15283 15287 2d6f1526177 15286->15287 15287->15287 15288 2d6f14e273c 15289 2d6f14e276a 15288->15289 15290 2d6f14e2858 LoadLibraryA 15289->15290 15291 2d6f14e28d4 15289->15291 15290->15289

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 58 2d6f151253c-2d6f15125c0 call 2d6f1532cc0 61 2d6f15125c6-2d6f15125c9 58->61 62 2d6f15127d8-2d6f15127fb 58->62 61->62 63 2d6f15125cf-2d6f15125dd 61->63 63->62 64 2d6f15125e3-2d6f1512629 call 2d6f1518c60 * 3 GetFileType 63->64 71 2d6f151262b-2d6f151263f StrCpyW 64->71 72 2d6f1512641-2d6f151264b call 2d6f1511a40 64->72 73 2d6f1512650-2d6f1512654 71->73 72->73 75 2d6f151265a-2d6f1512673 call 2d6f15130a8 call 2d6f1513844 73->75 76 2d6f15126ff-2d6f1512704 73->76 88 2d6f15126aa-2d6f15126f4 call 2d6f1532cc0 75->88 89 2d6f1512675-2d6f15126a4 call 2d6f15130a8 call 2d6f1513044 call 2d6f1511cac 75->89 78 2d6f1512707-2d6f151270c 76->78 80 2d6f1512729 78->80 81 2d6f151270e-2d6f1512711 78->81 84 2d6f151272c-2d6f1512745 call 2d6f15130a8 call 2d6f1513844 80->84 81->80 83 2d6f1512713-2d6f1512716 81->83 83->80 86 2d6f1512718-2d6f151271b 83->86 99 2d6f1512787-2d6f1512789 84->99 100 2d6f1512747-2d6f1512776 call 2d6f15130a8 call 2d6f1513044 call 2d6f1511cac 84->100 86->80 90 2d6f151271d-2d6f1512720 86->90 88->62 101 2d6f15126fa 88->101 89->62 89->88 90->80 94 2d6f1512722-2d6f1512727 90->94 94->80 94->84 104 2d6f151278b-2d6f15127a5 99->104 105 2d6f15127aa-2d6f15127ad 99->105 100->99 122 2d6f1512778-2d6f1512783 100->122 101->75 104->78 108 2d6f15127b7-2d6f15127ba 105->108 109 2d6f15127af-2d6f15127b5 105->109 112 2d6f15127bc-2d6f15127bf 108->112 113 2d6f15127d5 108->113 109->62 112->113 116 2d6f15127c1-2d6f15127c4 112->116 113->62 116->113 117 2d6f15127c6-2d6f15127c9 116->117 117->113 119 2d6f15127cb-2d6f15127ce 117->119 119->113 121 2d6f15127d0-2d6f15127d3 119->121 121->62 121->113 122->62 123 2d6f1512785 122->123 123->78
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: FileType
                                                              • String ID: \\.\pipe\
                                                              • API String ID: 3081899298-91387939
                                                              • Opcode ID: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                              • Instruction ID: fa04f75c9475a18510419c108b79fce0653dad0fa003f1e7f796e61fbc6322b7
                                                              • Opcode Fuzzy Hash: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                              • Instruction Fuzzy Hash: A07170A6200F858AE6669F25B85C3AA6794F3857D4F64002BDD0F67F89DF39CE458700

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 124 2d6f151202c-2d6f1512057 call 2d6f1532d00 126 2d6f151205d-2d6f1512066 124->126 127 2d6f1512068-2d6f151206c 126->127 128 2d6f151206f-2d6f1512072 126->128 127->128 129 2d6f1512078-2d6f151207b 128->129 130 2d6f1512223-2d6f1512243 128->130 131 2d6f1512081-2d6f1512093 129->131 132 2d6f1512173-2d6f1512176 129->132 131->130 133 2d6f1512099-2d6f15120a5 131->133 134 2d6f15121e7-2d6f15121ea 132->134 135 2d6f1512178-2d6f1512192 call 2d6f1512f04 132->135 137 2d6f15120a7-2d6f15120b7 133->137 138 2d6f15120d3-2d6f15120de call 2d6f1511bbc 133->138 134->130 139 2d6f15121ec-2d6f15121ff call 2d6f1512f04 134->139 135->130 144 2d6f1512198-2d6f15121ae 135->144 137->138 141 2d6f15120b9-2d6f15120d1 StrCmpNIW 137->141 145 2d6f15120ff-2d6f1512111 138->145 152 2d6f15120e0-2d6f15120f8 call 2d6f1511bf4 138->152 139->130 151 2d6f1512201-2d6f1512209 139->151 141->138 141->145 144->130 150 2d6f15121b0-2d6f15121cc 144->150 148 2d6f1512121-2d6f1512123 145->148 149 2d6f1512113-2d6f1512115 145->149 155 2d6f151212a 148->155 156 2d6f1512125-2d6f1512128 148->156 153 2d6f1512117-2d6f151211a 149->153 154 2d6f151211c-2d6f151211f 149->154 157 2d6f15121d0-2d6f15121e3 150->157 151->130 158 2d6f151220b-2d6f1512213 151->158 152->145 166 2d6f15120fa-2d6f15120fd 152->166 160 2d6f151212d-2d6f1512130 153->160 154->160 155->160 156->160 157->157 161 2d6f15121e5 157->161 162 2d6f1512216-2d6f1512221 158->162 164 2d6f151213e-2d6f1512141 160->164 165 2d6f1512132-2d6f1512138 160->165 161->130 162->130 162->162 164->130 167 2d6f1512147-2d6f151214b 164->167 165->133 165->164 166->160 168 2d6f151214d-2d6f1512150 167->168 169 2d6f1512162-2d6f151216e 167->169 168->130 170 2d6f1512156-2d6f151215b 168->170 169->130 170->167 171 2d6f151215d 170->171 171->130
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$AllocFree
                                                              • String ID: S$dialer
                                                              • API String ID: 756756679-3873981283
                                                              • Opcode ID: 10a6181ad89868b013f95f8d430f86fb0b73c76b57149a1256a42c526e771eaa
                                                              • Instruction ID: 7a83d85bf80e11694d2d7db4162bf47d6d0c4d20143003a03d639ac9e943c438
                                                              • Opcode Fuzzy Hash: 10a6181ad89868b013f95f8d430f86fb0b73c76b57149a1256a42c526e771eaa
                                                              • Instruction Fuzzy Hash: 6D518BB6A10E248AEB62CF26F84C6AD63A5F7047C4F25951ADE1E22E85DB39CC51C740

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                              • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                              • API String ID: 106492572-2879589442
                                                              • Opcode ID: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                              • Instruction ID: 1e1e47678fa7c4b781087d3b5f8b15c943a24ad0d42d65cabc9df2231e8d4def
                                                              • Opcode Fuzzy Hash: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                              • Instruction Fuzzy Hash: 1B71A5A6710E918AEB119F76F89CA9923B4FB84BC8F405112DE4E57F69EF2CC844C744

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: FinalHandleNamePathlstrlen
                                                              • String ID: \\?\
                                                              • API String ID: 2719912262-4282027825
                                                              • Opcode ID: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                              • Instruction ID: 1a29fbed29bbccc1987992930e6102033b0a423cd1e4e3151e2afb20eff6506f
                                                              • Opcode Fuzzy Hash: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                              • Instruction Fuzzy Hash: 14F03CA3304A8196EB608F21F8DC75967A0F758BC8F944022DA4E46D58DB7CCE8DCB00

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                              • String ID:
                                                              • API String ID: 1683269324-0
                                                              • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                              • Instruction ID: 25535357102f4341e1be78c6643d6b7c1b19e4a9101efaa7cc3453e24cb777c9
                                                              • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                              • Instruction Fuzzy Hash: 7811C0F1610E808EFBA2AF61F86D75922A4A7543E4F40412B990F92E90EF7CCC48C204

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 000002D6F1511628: GetProcessHeap.KERNEL32 ref: 000002D6F1511633
                                                                • Part of subcall function 000002D6F1511628: HeapAlloc.KERNEL32 ref: 000002D6F1511642
                                                                • Part of subcall function 000002D6F1511628: RegOpenKeyExW.ADVAPI32 ref: 000002D6F15116B2
                                                                • Part of subcall function 000002D6F1511628: RegOpenKeyExW.ADVAPI32 ref: 000002D6F15116DF
                                                                • Part of subcall function 000002D6F1511628: RegCloseKey.ADVAPI32 ref: 000002D6F15116F9
                                                                • Part of subcall function 000002D6F1511628: RegOpenKeyExW.ADVAPI32 ref: 000002D6F1511719
                                                                • Part of subcall function 000002D6F1511628: RegCloseKey.ADVAPI32 ref: 000002D6F1511734
                                                                • Part of subcall function 000002D6F1511628: RegOpenKeyExW.ADVAPI32 ref: 000002D6F1511754
                                                                • Part of subcall function 000002D6F1511628: RegCloseKey.ADVAPI32 ref: 000002D6F151176F
                                                                • Part of subcall function 000002D6F1511628: RegOpenKeyExW.ADVAPI32 ref: 000002D6F151178F
                                                                • Part of subcall function 000002D6F1511628: RegCloseKey.ADVAPI32 ref: 000002D6F15117AA
                                                                • Part of subcall function 000002D6F1511628: RegOpenKeyExW.ADVAPI32 ref: 000002D6F15117CA
                                                              • Sleep.KERNEL32 ref: 000002D6F1511AD7
                                                              • SleepEx.KERNELBASE ref: 000002D6F1511ADD
                                                                • Part of subcall function 000002D6F1511628: RegCloseKey.ADVAPI32 ref: 000002D6F15117E5
                                                                • Part of subcall function 000002D6F1511628: RegOpenKeyExW.ADVAPI32 ref: 000002D6F1511805
                                                                • Part of subcall function 000002D6F1511628: RegCloseKey.ADVAPI32 ref: 000002D6F1511820
                                                                • Part of subcall function 000002D6F1511628: RegOpenKeyExW.ADVAPI32 ref: 000002D6F1511840
                                                                • Part of subcall function 000002D6F1511628: RegCloseKey.ADVAPI32 ref: 000002D6F151185B
                                                                • Part of subcall function 000002D6F1511628: RegOpenKeyExW.ADVAPI32 ref: 000002D6F151187B
                                                                • Part of subcall function 000002D6F1511628: RegCloseKey.ADVAPI32 ref: 000002D6F1511896
                                                                • Part of subcall function 000002D6F1511628: RegCloseKey.ADVAPI32 ref: 000002D6F15118A0
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: CloseOpen$HeapSleep$AllocProcess
                                                              • String ID:
                                                              • API String ID: 1534210851-0
                                                              • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                              • Instruction ID: fabcacca4273e522b4c4af737a3624ee53845b919a9d6f50b07f832e41c12ee0
                                                              • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                              • Instruction Fuzzy Hash: 4A31BDE1210E4599EF529F36F6CD3A923A5BB44BD0F0854679E0FA7E95EE1CCC51C210

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 229 2d6f14e273c-2d6f14e27a4 call 2d6f14e29d4 * 4 238 2d6f14e29b2 229->238 239 2d6f14e27aa-2d6f14e27ad 229->239 240 2d6f14e29b4-2d6f14e29d0 238->240 239->238 241 2d6f14e27b3-2d6f14e27b6 239->241 241->238 242 2d6f14e27bc-2d6f14e27bf 241->242 242->238 243 2d6f14e27c5-2d6f14e27e6 242->243 243->238 245 2d6f14e27ec-2d6f14e280c 243->245 246 2d6f14e280e-2d6f14e2836 245->246 247 2d6f14e2838-2d6f14e283f 245->247 246->246 246->247 248 2d6f14e2845-2d6f14e2852 247->248 249 2d6f14e28df-2d6f14e28e6 247->249 248->249 250 2d6f14e2858-2d6f14e286a LoadLibraryA 248->250 251 2d6f14e2992-2d6f14e29b0 249->251 252 2d6f14e28ec-2d6f14e2901 249->252 254 2d6f14e286c-2d6f14e2878 250->254 255 2d6f14e28ca-2d6f14e28d2 250->255 251->240 252->251 253 2d6f14e2907 252->253 256 2d6f14e290d-2d6f14e2921 253->256 257 2d6f14e28c5-2d6f14e28c8 254->257 255->250 258 2d6f14e28d4-2d6f14e28d9 255->258 260 2d6f14e2982-2d6f14e298c 256->260 261 2d6f14e2923-2d6f14e2934 256->261 257->255 262 2d6f14e287a-2d6f14e287d 257->262 258->249 260->251 260->256 264 2d6f14e293f-2d6f14e2943 261->264 265 2d6f14e2936-2d6f14e293d 261->265 266 2d6f14e287f-2d6f14e28a5 262->266 267 2d6f14e28a7-2d6f14e28b7 262->267 269 2d6f14e2945-2d6f14e294b 264->269 270 2d6f14e294d-2d6f14e2951 264->270 268 2d6f14e2970-2d6f14e2980 265->268 271 2d6f14e28ba-2d6f14e28c1 266->271 267->271 268->260 268->261 269->268 272 2d6f14e2963-2d6f14e2967 270->272 273 2d6f14e2953-2d6f14e2961 270->273 271->257 272->268 275 2d6f14e2969-2d6f14e296c 272->275 273->268 275->268
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408155732.000002D6F14E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F14E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f14e0000_lsass.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID:
                                                              • API String ID: 1029625771-0
                                                              • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                              • Instruction ID: 2a527126fa6660018da58d358d37c763bfb819c27c69be159df49911753554d9
                                                              • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                              • Instruction Fuzzy Hash: BB61D472B01A908BDB54CF15A44CB2D7392FB94BE4F58912ADE5A07B8CDA3CDD52C700

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 482 2d6f1512b2c-2d6f1512ba5 call 2d6f1532ce0 485 2d6f1512bab-2d6f1512bb1 482->485 486 2d6f1512ee0-2d6f1512f03 482->486 485->486 487 2d6f1512bb7-2d6f1512bba 485->487 487->486 488 2d6f1512bc0-2d6f1512bc3 487->488 488->486 489 2d6f1512bc9-2d6f1512bd9 GetModuleHandleA 488->489 490 2d6f1512bdb-2d6f1512beb call 2d6f1526090 489->490 491 2d6f1512bed 489->491 493 2d6f1512bf0-2d6f1512c0e 490->493 491->493 493->486 496 2d6f1512c14-2d6f1512c33 StrCmpNIW 493->496 496->486 497 2d6f1512c39-2d6f1512c3d 496->497 497->486 498 2d6f1512c43-2d6f1512c4d 497->498 498->486 499 2d6f1512c53-2d6f1512c5a 498->499 499->486 500 2d6f1512c60-2d6f1512c73 499->500 501 2d6f1512c83 500->501 502 2d6f1512c75-2d6f1512c81 500->502 503 2d6f1512c86-2d6f1512c8a 501->503 502->503 504 2d6f1512c9a 503->504 505 2d6f1512c8c-2d6f1512c98 503->505 506 2d6f1512c9d-2d6f1512ca7 504->506 505->506 507 2d6f1512d9d-2d6f1512da1 506->507 508 2d6f1512cad-2d6f1512cb0 506->508 509 2d6f1512da7-2d6f1512daa 507->509 510 2d6f1512ed2-2d6f1512eda 507->510 511 2d6f1512cc2-2d6f1512ccc 508->511 512 2d6f1512cb2-2d6f1512cbf call 2d6f151199c 508->512 513 2d6f1512dbb-2d6f1512dc5 509->513 514 2d6f1512dac-2d6f1512db8 call 2d6f151199c 509->514 510->486 510->500 516 2d6f1512cce-2d6f1512cdb 511->516 517 2d6f1512d00-2d6f1512d0a 511->517 512->511 519 2d6f1512dc7-2d6f1512dd4 513->519 520 2d6f1512df5-2d6f1512df8 513->520 514->513 516->517 522 2d6f1512cdd-2d6f1512cea 516->522 523 2d6f1512d3a-2d6f1512d3d 517->523 524 2d6f1512d0c-2d6f1512d19 517->524 519->520 528 2d6f1512dd6-2d6f1512de3 519->528 529 2d6f1512dfa-2d6f1512e03 call 2d6f1511bbc 520->529 530 2d6f1512e05-2d6f1512e12 lstrlenW 520->530 531 2d6f1512ced-2d6f1512cf3 522->531 526 2d6f1512d4b-2d6f1512d58 lstrlenW 523->526 527 2d6f1512d3f-2d6f1512d49 call 2d6f1511bbc 523->527 524->523 532 2d6f1512d1b-2d6f1512d28 524->532 535 2d6f1512d7b-2d6f1512d8d call 2d6f1513844 526->535 536 2d6f1512d5a-2d6f1512d64 526->536 527->526 540 2d6f1512d93-2d6f1512d98 527->540 537 2d6f1512de6-2d6f1512dec 528->537 529->530 547 2d6f1512e4a-2d6f1512e55 529->547 541 2d6f1512e35-2d6f1512e3f call 2d6f1513844 530->541 542 2d6f1512e14-2d6f1512e1e 530->542 539 2d6f1512cf9-2d6f1512cfe 531->539 531->540 533 2d6f1512d2b-2d6f1512d31 532->533 533->540 543 2d6f1512d33-2d6f1512d38 533->543 535->540 551 2d6f1512e42-2d6f1512e44 535->551 536->535 546 2d6f1512d66-2d6f1512d79 call 2d6f151152c 536->546 537->547 548 2d6f1512dee-2d6f1512df3 537->548 539->517 539->531 540->551 541->551 542->541 552 2d6f1512e20-2d6f1512e33 call 2d6f151152c 542->552 543->523 543->533 546->535 546->540 555 2d6f1512e57-2d6f1512e5b 547->555 556 2d6f1512ecc-2d6f1512ed0 547->556 548->520 548->537 551->510 551->547 552->541 552->547 560 2d6f1512e5d-2d6f1512e61 555->560 561 2d6f1512e63-2d6f1512e7d call 2d6f15185c0 555->561 556->510 560->561 563 2d6f1512e80-2d6f1512e83 560->563 561->563 566 2d6f1512ea6-2d6f1512ea9 563->566 567 2d6f1512e85-2d6f1512ea3 call 2d6f15185c0 563->567 566->556 568 2d6f1512eab-2d6f1512ec9 call 2d6f15185c0 566->568 567->566 568->556
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                              • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                              • API String ID: 2119608203-3850299575
                                                              • Opcode ID: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                              • Instruction ID: e52bf68b31deb3b75f098f43a4d7db34dffa5d04e032c03eec0775e701bb4258
                                                              • Opcode Fuzzy Hash: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                              • Instruction Fuzzy Hash: B0B17CA2210E908EEB668F25E44C7A963A5F744BD4F64511BEE0E67F94DF38CC81C740
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 3140674995-0
                                                              • Opcode ID: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                              • Instruction ID: 2c2ab99ae258e3bf0c478ecf6a228b1e325b8175137ff9dca730b23599cdb4cd
                                                              • Opcode Fuzzy Hash: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                              • Instruction Fuzzy Hash: 97311AB2205E808AEB609F64F8887ED7364F785788F44442ADA4E57B95EF38CA48C710
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 1239891234-0
                                                              • Opcode ID: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                              • Instruction ID: 58eb25c51ad3c38e9823b02ddc7af6a39282a3411e5fadb664d5dd80ce479239
                                                              • Opcode Fuzzy Hash: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                              • Instruction Fuzzy Hash: BB315D76214F808AEB60CF25F88839E73A4F789794F500126EA9E57B99DF3CC945CB00

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                              • String ID: d
                                                              • API String ID: 2005889112-2564639436
                                                              • Opcode ID: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                              • Instruction ID: 5fb3b21df960b81225b638196f68b2da2c963b60e6c4826c36aa05b26c7c4fc2
                                                              • Opcode Fuzzy Hash: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                              • Instruction Fuzzy Hash: B95115B6200B848AEB55CF62F54C35AA7A1F789FD9F144126DE4A07B58DF3CD849CB00

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: CurrentThread$AddressHandleModuleProc
                                                              • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                              • API String ID: 4175298099-1975688563
                                                              • Opcode ID: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                              • Instruction ID: acd4e2c9eb3dd1a9bb1b7a25fe6521af63330346e6cf64fc31cecd724e9f3874
                                                              • Opcode Fuzzy Hash: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                              • Instruction Fuzzy Hash: C83162E9110E8AA8EE06EFA5F8AE6D46321B7143C4F905017981F23D75DF7C8E4AC760

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 324 2d6f14e6910-2d6f14e6916 325 2d6f14e6951-2d6f14e695b 324->325 326 2d6f14e6918-2d6f14e691b 324->326 327 2d6f14e6a78-2d6f14e6a8d 325->327 328 2d6f14e6945-2d6f14e6984 call 2d6f14e6fc0 326->328 329 2d6f14e691d-2d6f14e6920 326->329 333 2d6f14e6a8f 327->333 334 2d6f14e6a9c-2d6f14e6ab6 call 2d6f14e6e54 327->334 347 2d6f14e6a52 328->347 348 2d6f14e698a-2d6f14e699f call 2d6f14e6e54 328->348 331 2d6f14e6922-2d6f14e6925 329->331 332 2d6f14e6938 __scrt_dllmain_crt_thread_attach 329->332 338 2d6f14e6931-2d6f14e6936 call 2d6f14e6f04 331->338 339 2d6f14e6927-2d6f14e6930 331->339 336 2d6f14e693d-2d6f14e6944 332->336 340 2d6f14e6a91-2d6f14e6a9b 333->340 345 2d6f14e6aef-2d6f14e6b20 call 2d6f14e7190 334->345 346 2d6f14e6ab8-2d6f14e6aed call 2d6f14e6f7c call 2d6f14e6e1c call 2d6f14e7318 call 2d6f14e7130 call 2d6f14e7154 call 2d6f14e6fac 334->346 338->336 356 2d6f14e6b22-2d6f14e6b28 345->356 357 2d6f14e6b31-2d6f14e6b37 345->357 346->340 351 2d6f14e6a54-2d6f14e6a69 347->351 359 2d6f14e69a5-2d6f14e69b6 call 2d6f14e6ec4 348->359 360 2d6f14e6a6a-2d6f14e6a77 call 2d6f14e7190 348->360 356->357 361 2d6f14e6b2a-2d6f14e6b2c 356->361 362 2d6f14e6b7e-2d6f14e6b94 call 2d6f14e268c 357->362 363 2d6f14e6b39-2d6f14e6b43 357->363 378 2d6f14e69b8-2d6f14e69dc call 2d6f14e72dc call 2d6f14e6e0c call 2d6f14e6e38 call 2d6f14eac0c 359->378 379 2d6f14e6a07-2d6f14e6a11 call 2d6f14e7130 359->379 360->327 367 2d6f14e6c1f-2d6f14e6c2c 361->367 381 2d6f14e6bcc-2d6f14e6bce 362->381 382 2d6f14e6b96-2d6f14e6b98 362->382 368 2d6f14e6b45-2d6f14e6b4d 363->368 369 2d6f14e6b4f-2d6f14e6b5d call 2d6f14f5780 363->369 375 2d6f14e6b63-2d6f14e6b78 call 2d6f14e6910 368->375 369->375 391 2d6f14e6c15-2d6f14e6c1d 369->391 375->362 375->391 378->379 427 2d6f14e69de-2d6f14e69e5 __scrt_dllmain_after_initialize_c 378->427 379->347 400 2d6f14e6a13-2d6f14e6a1f call 2d6f14e7180 379->400 389 2d6f14e6bd5-2d6f14e6bea call 2d6f14e6910 381->389 390 2d6f14e6bd0-2d6f14e6bd3 381->390 382->381 388 2d6f14e6b9a-2d6f14e6bbc call 2d6f14e268c call 2d6f14e6a78 382->388 388->381 421 2d6f14e6bbe-2d6f14e6bc6 call 2d6f14f5780 388->421 389->391 409 2d6f14e6bec-2d6f14e6bf6 389->409 390->389 390->391 391->367 411 2d6f14e6a45-2d6f14e6a50 400->411 412 2d6f14e6a21-2d6f14e6a2b call 2d6f14e7098 400->412 415 2d6f14e6c01-2d6f14e6c11 call 2d6f14f5780 409->415 416 2d6f14e6bf8-2d6f14e6bff 409->416 411->351 412->411 426 2d6f14e6a2d-2d6f14e6a3b 412->426 415->391 416->391 421->381 426->411 427->379 428 2d6f14e69e7-2d6f14e6a04 call 2d6f14eabc8 427->428 428->379
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408155732.000002D6F14E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F14E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f14e0000_lsass.jbxd
                                                              Similarity
                                                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                              • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                                                              • API String ID: 190073905-1786718095
                                                              • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction ID: a6791069ef224389268787c1cde3096a7f5d96d964d78a2d6507250396e19ec1
                                                              • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction Fuzzy Hash: A681EF61A00E018EFA54EB66B44D3A966E1ABC57C0F54812B9A1B47F9FDF3CCE458B00

                                                              Control-flow Graph

                                                              APIs
                                                              • GetLastError.KERNEL32 ref: 000002D6F151CE37
                                                              • FlsGetValue.KERNEL32(?,?,?,000002D6F1520A6B,?,?,?,000002D6F152045C,?,?,?,000002D6F151C84F), ref: 000002D6F151CE4C
                                                              • FlsSetValue.KERNEL32(?,?,?,000002D6F1520A6B,?,?,?,000002D6F152045C,?,?,?,000002D6F151C84F), ref: 000002D6F151CE6D
                                                              • FlsSetValue.KERNEL32(?,?,?,000002D6F1520A6B,?,?,?,000002D6F152045C,?,?,?,000002D6F151C84F), ref: 000002D6F151CE9A
                                                              • FlsSetValue.KERNEL32(?,?,?,000002D6F1520A6B,?,?,?,000002D6F152045C,?,?,?,000002D6F151C84F), ref: 000002D6F151CEAB
                                                              • FlsSetValue.KERNEL32(?,?,?,000002D6F1520A6B,?,?,?,000002D6F152045C,?,?,?,000002D6F151C84F), ref: 000002D6F151CEBC
                                                              • SetLastError.KERNEL32 ref: 000002D6F151CED7
                                                              • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,000002D6F1520A6B,?,?,?,000002D6F152045C,?,?,?,000002D6F151C84F), ref: 000002D6F151CF0D
                                                              • FlsSetValue.KERNEL32(?,?,00000001,000002D6F151ECCC,?,?,?,?,000002D6F151BF9F,?,?,?,?,?,000002D6F1517AB0), ref: 000002D6F151CF2C
                                                                • Part of subcall function 000002D6F151D6CC: HeapAlloc.KERNEL32 ref: 000002D6F151D721
                                                              • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002D6F1520A6B,?,?,?,000002D6F152045C,?,?,?,000002D6F151C84F), ref: 000002D6F151CF54
                                                                • Part of subcall function 000002D6F151D744: HeapFree.KERNEL32 ref: 000002D6F151D75A
                                                                • Part of subcall function 000002D6F151D744: GetLastError.KERNEL32 ref: 000002D6F151D764
                                                              • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002D6F1520A6B,?,?,?,000002D6F152045C,?,?,?,000002D6F151C84F), ref: 000002D6F151CF65
                                                              • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000002D6F1520A6B,?,?,?,000002D6F152045C,?,?,?,000002D6F151C84F), ref: 000002D6F151CF76
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorLast$Heap$AllocFree
                                                              • String ID:
                                                              • API String ID: 570795689-0
                                                              • Opcode ID: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                              • Instruction ID: cbe95e8add907aa0b2c73cf7f4231efe5140574644f478dc5db001f93a5baefd
                                                              • Opcode Fuzzy Hash: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                              • Instruction Fuzzy Hash: C4410EE0301E444EFE6BAF35755E36962429B447F0F240B27A93F6AED6DE2DDC418600

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                              • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                              • API String ID: 2171963597-1373409510
                                                              • Opcode ID: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                              • Instruction ID: 16cc91b0a522ba52fd30a106300581a7bfe1bf7e397ef6e488c8d9df07b3eb6a
                                                              • Opcode Fuzzy Hash: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                              • Instruction Fuzzy Hash: 44212CB6614B8086FB108B25F44C76A77A1F789BE5F504216EA5E03FA8DF7CC949CB00

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 582 2d6f14e9944-2d6f14e99ac call 2d6f14ea814 585 2d6f14e99b2-2d6f14e99b5 582->585 586 2d6f14e9e13-2d6f14e9e1b call 2d6f14ebb48 582->586 585->586 587 2d6f14e99bb-2d6f14e99c1 585->587 589 2d6f14e9a90-2d6f14e9aa2 587->589 590 2d6f14e99c7-2d6f14e99cb 587->590 592 2d6f14e9d63-2d6f14e9d67 589->592 593 2d6f14e9aa8-2d6f14e9aac 589->593 590->589 594 2d6f14e99d1-2d6f14e99dc 590->594 597 2d6f14e9da0-2d6f14e9daa call 2d6f14e8a34 592->597 598 2d6f14e9d69-2d6f14e9d70 592->598 593->592 595 2d6f14e9ab2-2d6f14e9abd 593->595 594->589 596 2d6f14e99e2-2d6f14e99e7 594->596 595->592 599 2d6f14e9ac3-2d6f14e9aca 595->599 596->589 600 2d6f14e99ed-2d6f14e99f7 call 2d6f14e8a34 596->600 597->586 608 2d6f14e9dac-2d6f14e9dcb call 2d6f14e6d40 597->608 598->586 601 2d6f14e9d76-2d6f14e9d9b call 2d6f14e9e1c 598->601 604 2d6f14e9c94-2d6f14e9ca0 599->604 605 2d6f14e9ad0-2d6f14e9b07 call 2d6f14e8e10 599->605 600->608 616 2d6f14e99fd-2d6f14e9a28 call 2d6f14e8a34 * 2 call 2d6f14e9124 600->616 601->597 604->597 609 2d6f14e9ca6-2d6f14e9caa 604->609 605->604 620 2d6f14e9b0d-2d6f14e9b15 605->620 613 2d6f14e9cac-2d6f14e9cb8 call 2d6f14e90e4 609->613 614 2d6f14e9cba-2d6f14e9cc2 609->614 613->614 626 2d6f14e9cdb-2d6f14e9ce3 613->626 614->597 619 2d6f14e9cc8-2d6f14e9cd5 call 2d6f14e8cb4 614->619 650 2d6f14e9a2a-2d6f14e9a2e 616->650 651 2d6f14e9a48-2d6f14e9a52 call 2d6f14e8a34 616->651 619->597 619->626 624 2d6f14e9b19-2d6f14e9b4b 620->624 628 2d6f14e9b51-2d6f14e9b5c 624->628 629 2d6f14e9c87-2d6f14e9c8e 624->629 631 2d6f14e9ce9-2d6f14e9ced 626->631 632 2d6f14e9df6-2d6f14e9e12 call 2d6f14e8a34 * 2 call 2d6f14ebaa8 626->632 628->629 633 2d6f14e9b62-2d6f14e9b7b 628->633 629->604 629->624 635 2d6f14e9d00 631->635 636 2d6f14e9cef-2d6f14e9cfe call 2d6f14e90e4 631->636 632->586 637 2d6f14e9c74-2d6f14e9c79 633->637 638 2d6f14e9b81-2d6f14e9bc6 call 2d6f14e90f8 * 2 633->638 643 2d6f14e9d03-2d6f14e9d0d call 2d6f14ea8ac 635->643 636->643 645 2d6f14e9c84 637->645 663 2d6f14e9c04-2d6f14e9c0a 638->663 664 2d6f14e9bc8-2d6f14e9bee call 2d6f14e90f8 call 2d6f14ea038 638->664 643->597 661 2d6f14e9d13-2d6f14e9d61 call 2d6f14e8d44 call 2d6f14e8f50 643->661 645->629 650->651 655 2d6f14e9a30-2d6f14e9a3b 650->655 651->589 667 2d6f14e9a54-2d6f14e9a74 call 2d6f14e8a34 * 2 call 2d6f14ea8ac 651->667 655->651 660 2d6f14e9a3d-2d6f14e9a42 655->660 660->586 660->651 661->597 671 2d6f14e9c0c-2d6f14e9c10 663->671 672 2d6f14e9c7b 663->672 682 2d6f14e9c15-2d6f14e9c72 call 2d6f14e9870 664->682 683 2d6f14e9bf0-2d6f14e9c02 664->683 688 2d6f14e9a8b 667->688 689 2d6f14e9a76-2d6f14e9a80 call 2d6f14ea99c 667->689 671->638 673 2d6f14e9c80 672->673 673->645 682->673 683->663 683->664 688->589 692 2d6f14e9df0-2d6f14e9df5 call 2d6f14ebaa8 689->692 693 2d6f14e9a86-2d6f14e9def call 2d6f14e86ac call 2d6f14ea3f4 call 2d6f14e88a0 689->693 692->632 693->692
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408155732.000002D6F14E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F14E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f14e0000_lsass.jbxd
                                                              Similarity
                                                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                              • String ID: csm$csm$csm
                                                              • API String ID: 849930591-393685449
                                                              • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                              • Instruction ID: d823906c8357baff7e49bf9f9c1525c5136429e0f71f4035b6608ff5472b74b6
                                                              • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                              • Instruction Fuzzy Hash: 11E16C72604B808EEB60DF65E49C39D77A0F795BD8F100516EE8A97F99CB38CA91C700

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 703 2d6f151a544-2d6f151a5ac call 2d6f151b414 706 2d6f151a5b2-2d6f151a5b5 703->706 707 2d6f151aa13-2d6f151aa1b call 2d6f151c748 703->707 706->707 708 2d6f151a5bb-2d6f151a5c1 706->708 710 2d6f151a5c7-2d6f151a5cb 708->710 711 2d6f151a690-2d6f151a6a2 708->711 710->711 715 2d6f151a5d1-2d6f151a5dc 710->715 713 2d6f151a6a8-2d6f151a6ac 711->713 714 2d6f151a963-2d6f151a967 711->714 713->714 718 2d6f151a6b2-2d6f151a6bd 713->718 716 2d6f151a969-2d6f151a970 714->716 717 2d6f151a9a0-2d6f151a9aa call 2d6f1519634 714->717 715->711 719 2d6f151a5e2-2d6f151a5e7 715->719 716->707 720 2d6f151a976-2d6f151a99b call 2d6f151aa1c 716->720 717->707 731 2d6f151a9ac-2d6f151a9cb call 2d6f1517940 717->731 718->714 722 2d6f151a6c3-2d6f151a6ca 718->722 719->711 723 2d6f151a5ed-2d6f151a5f7 call 2d6f1519634 719->723 720->717 727 2d6f151a6d0-2d6f151a707 call 2d6f1519a10 722->727 728 2d6f151a894-2d6f151a8a0 722->728 723->731 734 2d6f151a5fd-2d6f151a628 call 2d6f1519634 * 2 call 2d6f1519d24 723->734 727->728 739 2d6f151a70d-2d6f151a715 727->739 728->717 732 2d6f151a8a6-2d6f151a8aa 728->732 736 2d6f151a8ac-2d6f151a8b8 call 2d6f1519ce4 732->736 737 2d6f151a8ba-2d6f151a8c2 732->737 771 2d6f151a648-2d6f151a652 call 2d6f1519634 734->771 772 2d6f151a62a-2d6f151a62e 734->772 736->737 747 2d6f151a8db-2d6f151a8e3 736->747 737->717 738 2d6f151a8c8-2d6f151a8d5 call 2d6f15198b4 737->738 738->717 738->747 744 2d6f151a719-2d6f151a74b 739->744 749 2d6f151a887-2d6f151a88e 744->749 750 2d6f151a751-2d6f151a75c 744->750 752 2d6f151a8e9-2d6f151a8ed 747->752 753 2d6f151a9f6-2d6f151aa12 call 2d6f1519634 * 2 call 2d6f151c6a8 747->753 749->728 749->744 750->749 754 2d6f151a762-2d6f151a77b 750->754 756 2d6f151a900 752->756 757 2d6f151a8ef-2d6f151a8fe call 2d6f1519ce4 752->757 753->707 758 2d6f151a781-2d6f151a7c6 call 2d6f1519cf8 * 2 754->758 759 2d6f151a874-2d6f151a879 754->759 767 2d6f151a903-2d6f151a90d call 2d6f151b4ac 756->767 757->767 784 2d6f151a7c8-2d6f151a7ee call 2d6f1519cf8 call 2d6f151ac38 758->784 785 2d6f151a804-2d6f151a80a 758->785 764 2d6f151a884 759->764 764->749 767->717 782 2d6f151a913-2d6f151a961 call 2d6f1519944 call 2d6f1519b50 767->782 771->711 788 2d6f151a654-2d6f151a674 call 2d6f1519634 * 2 call 2d6f151b4ac 771->788 772->771 776 2d6f151a630-2d6f151a63b 772->776 776->771 781 2d6f151a63d-2d6f151a642 776->781 781->707 781->771 782->717 803 2d6f151a7f0-2d6f151a802 784->803 804 2d6f151a815-2d6f151a872 call 2d6f151a470 784->804 790 2d6f151a87b 785->790 791 2d6f151a80c-2d6f151a810 785->791 809 2d6f151a676-2d6f151a680 call 2d6f151b59c 788->809 810 2d6f151a68b 788->810 796 2d6f151a880 790->796 791->758 796->764 803->784 803->785 804->796 813 2d6f151a686-2d6f151a9ef call 2d6f15192ac call 2d6f151aff4 call 2d6f15194a0 809->813 814 2d6f151a9f0-2d6f151a9f5 call 2d6f151c6a8 809->814 810->711 813->814 814->753
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                              • String ID: csm$csm$csm
                                                              • API String ID: 849930591-393685449
                                                              • Opcode ID: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                              • Instruction ID: c723f1f196541d97861d438692a693aba2ea927f234d4d4577a4b0ac93f6314a
                                                              • Opcode Fuzzy Hash: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                              • Instruction Fuzzy Hash: C6E15DB6604B808AEB629FA5E44C39D77A0F745BD8F100517EE8E67F99CB38D991C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeLibraryProc
                                                              • String ID: api-ms-$ext-ms-
                                                              • API String ID: 3013587201-537541572
                                                              • Opcode ID: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                              • Instruction ID: 261ecf9bf2a1f0678fa278aa22b30c90f33c111913abcd05092592ff9b1f8fec
                                                              • Opcode Fuzzy Hash: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                              • Instruction Fuzzy Hash: B44192A2311E409AEA1BCF26B84C7566395B749BE0F5941279D1FA7F84EE3CCC498350
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                              • String ID: d
                                                              • API String ID: 3743429067-2564639436
                                                              • Opcode ID: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                              • Instruction ID: 7c308a324f3a3b915ae5c740d95f6965976605312a1237647059209b5cbc419f
                                                              • Opcode Fuzzy Hash: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                              • Instruction Fuzzy Hash: AC413D73614F84CAEB61CF21E44879AB7A1F388B98F54811ADA8A17B58DF3CD945CB40
                                                              APIs
                                                              • FlsGetValue.KERNEL32(?,?,?,000002D6F151C7DE,?,?,?,?,?,?,?,?,000002D6F151CF9D,?,?,00000001), ref: 000002D6F151D087
                                                              • FlsSetValue.KERNEL32(?,?,?,000002D6F151C7DE,?,?,?,?,?,?,?,?,000002D6F151CF9D,?,?,00000001), ref: 000002D6F151D0A6
                                                              • FlsSetValue.KERNEL32(?,?,?,000002D6F151C7DE,?,?,?,?,?,?,?,?,000002D6F151CF9D,?,?,00000001), ref: 000002D6F151D0CE
                                                              • FlsSetValue.KERNEL32(?,?,?,000002D6F151C7DE,?,?,?,?,?,?,?,?,000002D6F151CF9D,?,?,00000001), ref: 000002D6F151D0DF
                                                              • FlsSetValue.KERNEL32(?,?,?,000002D6F151C7DE,?,?,?,?,?,?,?,?,000002D6F151CF9D,?,?,00000001), ref: 000002D6F151D0F0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID: 1%$Y%
                                                              • API String ID: 3702945584-1395475152
                                                              • Opcode ID: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                              • Instruction ID: 2480a359072ec50eb541e18d4b91d9545f280b7cfca78c1f54feae84ed9f0741
                                                              • Opcode Fuzzy Hash: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                              • Instruction Fuzzy Hash: A61103E0705E444AFA6A5F36755E36962429B447F0F144727983F67EDAEE2CDC428600
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                              • String ID:
                                                              • API String ID: 190073905-0
                                                              • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction ID: 9e9a13fecbd3ee6dd4b9af7d8544c3df26673650e91134e0a1763e142b039acf
                                                              • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction Fuzzy Hash: 8A81B0E1600E418EFB56AF6DB84D3992691A7857C0F544827AA0F67F97EB7CCC468700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: Library$Load$AddressErrorFreeLastProc
                                                              • String ID: api-ms-
                                                              • API String ID: 2559590344-2084034818
                                                              • Opcode ID: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                              • Instruction ID: 1b9a7946070453fa793877a5e81080cf6b3e7f40ad096b1fe8965e9392f62bd4
                                                              • Opcode Fuzzy Hash: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                              • Instruction Fuzzy Hash: E331A3A2212E40EDEE17DF42F41C7552294B748BE4F590A269D2F1BB94EF3DC8858310
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                              • String ID: CONOUT$
                                                              • API String ID: 3230265001-3130406586
                                                              • Opcode ID: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                              • Instruction ID: f7805de5885bb23c4ed2acbf2a3bac675694138274e2d29da4d1e0af9514ac00
                                                              • Opcode Fuzzy Hash: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                              • Instruction Fuzzy Hash: D8112BA2210FC08AE7908B56F85D71966A0F788FE4F144226EE5F87B94DB7CC9158744
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcessProtectVirtual$HandleModule
                                                              • String ID: wr
                                                              • API String ID: 1092925422-2678910430
                                                              • Opcode ID: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                              • Instruction ID: 56a1fc91981ff5b9860e83c331195b973d21dc503a25c2b603b9cee17e6af388
                                                              • Opcode Fuzzy Hash: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                              • Instruction Fuzzy Hash: FD1157AA705B81CAEF559F21F41C66962B0FB88BD5F44042ADE8E07B94EF3DCA05C704
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: Thread$Current$Context
                                                              • String ID:
                                                              • API String ID: 1666949209-0
                                                              • Opcode ID: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                                                              • Instruction ID: 48f46886f9a4c9f0af87d4b559936913019cc1f1eed6d2fcc966534f28762692
                                                              • Opcode Fuzzy Hash: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                                                              • Instruction Fuzzy Hash: 76D187B6214F8889DA719F1AF49835A77A0F389BC4F104216EA8E57BA5DF7CC941CF40
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$AllocFree
                                                              • String ID: dialer
                                                              • API String ID: 756756679-3528709123
                                                              • Opcode ID: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                              • Instruction ID: 6f7c6b014d4bd7126e3bbbff313cacc6244a2be32cd63f79b011c0dee58239f0
                                                              • Opcode Fuzzy Hash: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                              • Instruction Fuzzy Hash: F631CDA2301F918AEB56CF16F54C72A67A0FB44BC0F1880269E4E57F55EF3CD8A18300
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$Free
                                                              • String ID: C:\Windows\system32\lsass.exe
                                                              • API String ID: 3168794593-3553486595
                                                              • Opcode ID: d27b9b8ca154d9eedff1e610dfbacc8608a6d25d7c3fe3b6d17278c798082fda
                                                              • Instruction ID: 4c3fb5dbda590ede340f70e239d951b1946e93fc28bd49ed613bd9f4bb13803d
                                                              • Opcode Fuzzy Hash: d27b9b8ca154d9eedff1e610dfbacc8608a6d25d7c3fe3b6d17278c798082fda
                                                              • Instruction Fuzzy Hash: 77219EEB509ED08EF651DF25B89D29D27A0F749BC4F194017DF4E93A43DA2DAC048700
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorLast
                                                              • String ID:
                                                              • API String ID: 2506987500-0
                                                              • Opcode ID: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                              • Instruction ID: 64ae360e53322a3fe6ae1786423e02a03aa622958712b9455162e794dcab319a
                                                              • Opcode Fuzzy Hash: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                              • Instruction Fuzzy Hash: 931157E0301E804AFA6A9F35765D73952529B447F0F144717983F67FD6DE6DCC428600
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                              • String ID:
                                                              • API String ID: 517849248-0
                                                              • Opcode ID: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                              • Instruction ID: cff459d1bd899cdfd44676a5a381a09abba527aeb6cc39614b6ef60cc1fcaaaf
                                                              • Opcode Fuzzy Hash: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                              • Instruction Fuzzy Hash: 070129B2300E808AEB54DB62B89C75967A5F788BC4F984036DE4E53B55DF3CC989C740
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                              • String ID:
                                                              • API String ID: 449555515-0
                                                              • Opcode ID: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                              • Instruction ID: 4cb24c3c5e9fa141b5df1c6a7c4a8c5dc67f34b77b6b13790439d7932f787d30
                                                              • Opcode Fuzzy Hash: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                              • Instruction Fuzzy Hash: 320129A6611F808AFF659B22F81C71963B0BB49BC6F04042ACE4E07B64EF3DC919C704
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 2395640692-629598281
                                                              • Opcode ID: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                                                              • Instruction ID: 3b0e631b75504db4463a701d796cd14c903cf2e77cba2ed9bb482b335b50820a
                                                              • Opcode Fuzzy Hash: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                                                              • Instruction Fuzzy Hash: 7C518AB2601A408EEB16DF15F85CB5937A6F384BC8F55852ADE0B67B88DB39DD81C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: CombinePath
                                                              • String ID: \\.\pipe\
                                                              • API String ID: 3422762182-91387939
                                                              • Opcode ID: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                              • Instruction ID: 3e4723502f59a8f1e07ded70428830228723a6d762285bf7447ffc8a7d9f86c1
                                                              • Opcode Fuzzy Hash: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                              • Instruction Fuzzy Hash: 16F01CA6714FC486EA548F57B91C11966A1BB58FE0F089132EE4F57F18DF3CC8558700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                              • String ID: CorExitProcess$mscoree.dll
                                                              • API String ID: 4061214504-1276376045
                                                              • Opcode ID: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                              • Instruction ID: 23a4a7cfba681eafd7acd153de910ccfab7048bd4207ecad1fa1577b34c1d807
                                                              • Opcode Fuzzy Hash: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                              • Instruction Fuzzy Hash: 55F06DA2211E8585EB248F24F84C3696330EB99BE5F94121ACE6F46AE4CF2CC9488340
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: CurrentThread
                                                              • String ID:
                                                              • API String ID: 2882836952-0
                                                              • Opcode ID: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                                                              • Instruction ID: 42075970a9a9322463efdc1a56445cb29a1d8840ca77651260a4224c7a6fbde6
                                                              • Opcode Fuzzy Hash: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                                                              • Instruction Fuzzy Hash: 7302B576219B848AEB61CF55F49835AB7A1F3857D4F100016EA8E97BA9DB7CC884CF00
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: CurrentThread
                                                              • String ID:
                                                              • API String ID: 2882836952-0
                                                              • Opcode ID: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                                                              • Instruction ID: 3ee684a2051b0626537bb21df19f72d7656a23c79b275dde9432cc418d5cd82d
                                                              • Opcode Fuzzy Hash: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                                                              • Instruction Fuzzy Hash: 4461B2B6529E84CAEA618F15F49D31AB7A1F3897C4F100116EA8E57FA8DB7CC841CF40
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408155732.000002D6F14E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F14E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f14e0000_lsass.jbxd
                                                              Similarity
                                                              • API ID: _set_statfp
                                                              • String ID:
                                                              • API String ID: 1156100317-0
                                                              • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction ID: ba703c9331ee713b56c495894a3d73b0a2062aaebb232e8d6e30e25fb009abb4
                                                              • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction Fuzzy Hash: 12117323A14E5119FBA41769F45D36911816BD93F4F889A3AAA770FFDECA2CCC45C110
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: _set_statfp
                                                              • String ID:
                                                              • API String ID: 1156100317-0
                                                              • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction ID: 424267331a93190a57d2639305031bc8998964835541697d1ff8627115ec689c
                                                              • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction Fuzzy Hash: E11173A7B10FD119F7641768F45D36621416F783F8F280626EA7F17ED6CA6CCC418200
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408155732.000002D6F14E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F14E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f14e0000_lsass.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID: Tuesday$Wednesday$or copy constructor iterator'
                                                              • API String ID: 3215553584-4202648911
                                                              • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                              • Instruction ID: e6160abfd5a2cc9cf80f440168c8954cb50692cc9a53660c5a43eaca46e9ff2f
                                                              • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                              • Instruction Fuzzy Hash: C3619C72601E448AFA6DCB69F54C32AAAA1A7C67C0F55451BCA0B07FECDB3DCE458301
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: CallEncodePointerTranslator
                                                              • String ID: MOC$RCC
                                                              • API String ID: 3544855599-2084237596
                                                              • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction ID: 1d7432d42cb839326b1ec519d8e3b4db095f3ae002e7f932d77f27b7b20c2c01
                                                              • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction Fuzzy Hash: 556158B7600B848AEB22DFA5E44879D77A0F344BDCF044616EE4E27B98DB78C995C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408155732.000002D6F14E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F14E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f14e0000_lsass.jbxd
                                                              Similarity
                                                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                              • String ID: csm$csm
                                                              • API String ID: 3896166516-3733052814
                                                              • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction ID: cfee3a79a6332420dfddfd621a8844a6e200f43d99eb8e2e0c62dd5cb1a16251
                                                              • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction Fuzzy Hash: 89517C32100A80CEEB64CB25A54C35877A1F795BD4F288217DA9A87FD9CB7CDA90CB11
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                              • String ID: csm$csm
                                                              • API String ID: 3896166516-3733052814
                                                              • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction ID: a1fa52ff5b8a92164aef8a90dc21d442fce71749ed4764205dc9c63b39132c2b
                                                              • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction Fuzzy Hash: 72517CB6100AC08EEB668FA5A48C35977A0F354BD9F144217DA9EA7FD5CB3CD891C701
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408155732.000002D6F14E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F14E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f14e0000_lsass.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritable__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 3242871069-629598281
                                                              • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                              • Instruction ID: 972f85bd260c2ee75a15eccb82eca9add97efd3e6d8f92d2c71b54b9a0724d42
                                                              • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                              • Instruction Fuzzy Hash: 07518832601A028EEF64CB16F44CB1937A5F3D4BD8F558526DA1747B8CEB39DE418B04
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408155732.000002D6F14E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F14E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f14e0000_lsass.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritable__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 3242871069-629598281
                                                              • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                              • Instruction ID: fac092133bcf5273d306a1bfba47854e7a8849c5731493164c1dc531c6143850
                                                              • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                              • Instruction Fuzzy Hash: D6314672601A419AEB14DF12F84CB5977A4F780BD8F15852AAE6B07B8CDB3CCE41CB04
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: FileWrite$ConsoleErrorLastOutput
                                                              • String ID:
                                                              • API String ID: 2718003287-0
                                                              • Opcode ID: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                              • Instruction ID: 46840878b0cc5d224b34d7d0e9dac87f5955736167c6a31398be0b02f4667bf4
                                                              • Opcode Fuzzy Hash: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                              • Instruction Fuzzy Hash: CED1BFB7714A808DE711CFA9E44829C3BB1F7547D8F14421ADE5E9BF99DA38C906C780
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: ConsoleErrorLastMode
                                                              • String ID:
                                                              • API String ID: 953036326-0
                                                              • Opcode ID: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                              • Instruction ID: c9214aef26bfacb35296ae088b721dff4a15a35e123c9ee8ba9635ca1e8333b4
                                                              • Opcode Fuzzy Hash: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                              • Instruction Fuzzy Hash: 5A9177A7700E909DFB649F65A48C3AD2BA0A754BC8F54410EDE4F67E95DB78C882C700
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                              • String ID:
                                                              • API String ID: 2933794660-0
                                                              • Opcode ID: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                              • Instruction ID: 46c5aac05c874f4bb09711078cff6ceae9bbf1676f6b8508b6834c3418bbca38
                                                              • Opcode Fuzzy Hash: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                              • Instruction Fuzzy Hash: 30111C66710F418AEF008F60E8993A833A4F719798F440E22DE6E46BA4DB7CD5998380
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408155732.000002D6F14E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F14E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f14e0000_lsass.jbxd
                                                              Similarity
                                                              • API ID: CallTranslator
                                                              • String ID: MOC$RCC
                                                              • API String ID: 3163161869-2084237596
                                                              • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction ID: d070504b4f6ab16698584910d28eb8b80bc01e4cc0e3f10349b5f2c037af8c0d
                                                              • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction Fuzzy Hash: 6E616B73600F848AEB20DF65E4583AD7BA0F784BD8F144216EF4A57B99DB38DA95C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: FileType
                                                              • String ID: \\.\pipe\
                                                              • API String ID: 3081899298-91387939
                                                              • Opcode ID: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                              • Instruction ID: 394cc914bfb9ce43346b5ff93633d9b94699b0b3b218dfcc43da45d9579c068f
                                                              • Opcode Fuzzy Hash: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                              • Instruction Fuzzy Hash: 1951F5B2204B8189E6769F2AB09C3AA6BA1F3857C0F65412BDD4F27F49DA7DCD04C740
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastWrite
                                                              • String ID: U
                                                              • API String ID: 442123175-4171548499
                                                              • Opcode ID: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                              • Instruction ID: 824dda5bf0e141a0eccdff39b2f392aa61083a03da449fe0be0865378a6b09d5
                                                              • Opcode Fuzzy Hash: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                              • Instruction Fuzzy Hash: 75419FB3314B808ADB208F25F84C3A9A7A1F7987D4F444126EE4E87B94EB7CC841CB40
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFileHeaderRaise
                                                              • String ID: csm
                                                              • API String ID: 2573137834-1018135373
                                                              • Opcode ID: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                              • Instruction ID: 0179ef454bca868754a89d0f14593ff5d1bafe773b9c0e76b87cdcda21dd5abb
                                                              • Opcode Fuzzy Hash: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                              • Instruction Fuzzy Hash: C6113A76214F8086EB618F15F458359B7E5FB88B98F594222EE8E17B68DF3CC951CB00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408155732.000002D6F14E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F14E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f14e0000_lsass.jbxd
                                                              Similarity
                                                              • API ID: __std_exception_copy
                                                              • String ID: ierarchy Descriptor'$riptor at (
                                                              • API String ID: 592178966-758928094
                                                              • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                              • Instruction ID: 42604dadee08075db72dd804d857af22540e6553bd8cf7546b60624dadb498d8
                                                              • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                              • Instruction Fuzzy Hash: 2DE08661640F4594DF058F22F84829873A0DB99BA4F499123996D0B315FA3CD6F9C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408155732.000002D6F14E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F14E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f14e0000_lsass.jbxd
                                                              Similarity
                                                              • API ID: __std_exception_copy
                                                              • String ID: Locator'$riptor at (
                                                              • API String ID: 592178966-4215709766
                                                              • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                              • Instruction ID: d05b7e5c656130d9458ccdc22e0b75791a29142332b64578b38792f26bb6b93c
                                                              • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                              • Instruction Fuzzy Hash: 41E08661640F4484DF058F21F8441987360E799B94B889123C96D0B355EA3CD5E5C700
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$AllocFree
                                                              • String ID:
                                                              • API String ID: 756756679-0
                                                              • Opcode ID: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                              • Instruction ID: fd815924ccaf22e34c037317531bc049dc234f77afa6770aba1465aea0f85cca
                                                              • Opcode Fuzzy Hash: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                              • Instruction Fuzzy Hash: F5118C66601F8489EE05DF66F84C22973A1FB89FC4F18406ADE4E57B66DE3CD842C300
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000015.00000002.3408805169.000002D6F1510000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002D6F1510000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_21_2_2d6f1510000_lsass.jbxd
                                                              Similarity
                                                              • API ID: Heap$AllocProcess
                                                              • String ID:
                                                              • API String ID: 1617791916-0
                                                              • Opcode ID: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                              • Instruction ID: 5530d73242211928b6024003faf75465f242705db9492874eec173ea436ce9dc
                                                              • Opcode Fuzzy Hash: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                              • Instruction Fuzzy Hash: 48E092B6601A848AEB048F62E80C34A36E1FB8DF86F14C024CD0E07751DF7D98D9CB50

                                                              Execution Graph

                                                              Execution Coverage:0.7%
                                                              Dynamic/Decrypted Code Coverage:0%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:74
                                                              Total number of Limit Nodes:2
                                                              execution_graph 15131 14e41fd1abc 15136 14e41fd1628 GetProcessHeap 15131->15136 15133 14e41fd1acb 15134 14e41fd1ad2 Sleep SleepEx 15133->15134 15135 14e41fd1598 StrCmpIW StrCmpW 15133->15135 15134->15133 15135->15133 15137 14e41fd1648 __free_lconv_mon 15136->15137 15181 14e41fd1268 GetProcessHeap 15137->15181 15139 14e41fd1650 15140 14e41fd1268 2 API calls 15139->15140 15141 14e41fd1661 15140->15141 15142 14e41fd1268 2 API calls 15141->15142 15143 14e41fd166a 15142->15143 15144 14e41fd1268 2 API calls 15143->15144 15145 14e41fd1673 15144->15145 15146 14e41fd168e RegOpenKeyExW 15145->15146 15147 14e41fd18a6 15146->15147 15148 14e41fd16c0 RegOpenKeyExW 15146->15148 15147->15133 15149 14e41fd16e9 15148->15149 15150 14e41fd16ff RegOpenKeyExW 15148->15150 15185 14e41fd12bc RegQueryInfoKeyW 15149->15185 15152 14e41fd173a RegOpenKeyExW 15150->15152 15153 14e41fd1723 15150->15153 15155 14e41fd1775 RegOpenKeyExW 15152->15155 15156 14e41fd175e 15152->15156 15196 14e41fd104c RegQueryInfoKeyW 15153->15196 15160 14e41fd1799 15155->15160 15161 14e41fd17b0 RegOpenKeyExW 15155->15161 15159 14e41fd12bc 13 API calls 15156->15159 15162 14e41fd176b RegCloseKey 15159->15162 15163 14e41fd12bc 13 API calls 15160->15163 15164 14e41fd17eb RegOpenKeyExW 15161->15164 15165 14e41fd17d4 15161->15165 15162->15155 15166 14e41fd17a6 RegCloseKey 15163->15166 15168 14e41fd1826 RegOpenKeyExW 15164->15168 15169 14e41fd180f 15164->15169 15167 14e41fd12bc 13 API calls 15165->15167 15166->15161 15173 14e41fd17e1 RegCloseKey 15167->15173 15171 14e41fd184a 15168->15171 15172 14e41fd1861 RegOpenKeyExW 15168->15172 15170 14e41fd104c 5 API calls 15169->15170 15174 14e41fd181c RegCloseKey 15170->15174 15175 14e41fd104c 5 API calls 15171->15175 15176 14e41fd189c RegCloseKey 15172->15176 15177 14e41fd1885 15172->15177 15173->15164 15174->15168 15178 14e41fd1857 RegCloseKey 15175->15178 15176->15147 15179 14e41fd104c 5 API calls 15177->15179 15178->15172 15180 14e41fd1892 RegCloseKey 15179->15180 15180->15176 15202 14e41fe6168 15181->15202 15183 14e41fd1283 GetProcessHeap 15184 14e41fd12ae __free_lconv_mon 15183->15184 15184->15139 15186 14e41fd148a RegCloseKey 15185->15186 15187 14e41fd1327 GetProcessHeap 15185->15187 15186->15150 15193 14e41fd133e __free_lconv_mon 15187->15193 15188 14e41fd1476 GetProcessHeap HeapFree 15188->15186 15189 14e41fd1352 RegEnumValueW 15189->15193 15191 14e41fd13d3 GetProcessHeap 15191->15193 15192 14e41fd141e lstrlenW GetProcessHeap 15192->15193 15193->15188 15193->15189 15193->15191 15193->15192 15194 14e41fd13f3 GetProcessHeap HeapFree 15193->15194 15195 14e41fd1443 StrCpyW 15193->15195 15204 14e41fd152c 15193->15204 15194->15192 15195->15193 15197 14e41fd11b5 RegCloseKey 15196->15197 15200 14e41fd10bf __free_lconv_mon 15196->15200 15197->15152 15198 14e41fd10cf RegEnumValueW 15198->15200 15199 14e41fd114e GetProcessHeap 15199->15200 15200->15197 15200->15198 15200->15199 15201 14e41fd116e GetProcessHeap HeapFree 15200->15201 15201->15200 15203 14e41fe6177 15202->15203 15205 14e41fd157c 15204->15205 15206 14e41fd1546 15204->15206 15205->15193 15206->15205 15207 14e41fd155d StrCmpIW 15206->15207 15208 14e41fd1565 StrCmpW 15206->15208 15207->15206 15208->15206 15209 14e41fa273c 15211 14e41fa276a 15209->15211 15210 14e41fa2858 LoadLibraryA 15210->15211 15211->15210 15212 14e41fa28d4 15211->15212

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                              • String ID:
                                                              • API String ID: 1683269324-0
                                                              • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                              • Instruction ID: 701d4b212a0684b59ab9b099f346debbb554c1cfb4979cb8b986742d3a5a455b
                                                              • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                              • Instruction Fuzzy Hash: CB1139B271864182FF60AB61BB1D3F9A3E4BF54344F5841259A0BC16B5EF7CC1468230

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 0000014E41FD1628: GetProcessHeap.KERNEL32 ref: 0000014E41FD1633
                                                                • Part of subcall function 0000014E41FD1628: HeapAlloc.KERNEL32 ref: 0000014E41FD1642
                                                                • Part of subcall function 0000014E41FD1628: RegOpenKeyExW.ADVAPI32 ref: 0000014E41FD16B2
                                                                • Part of subcall function 0000014E41FD1628: RegOpenKeyExW.ADVAPI32 ref: 0000014E41FD16DF
                                                                • Part of subcall function 0000014E41FD1628: RegCloseKey.ADVAPI32 ref: 0000014E41FD16F9
                                                                • Part of subcall function 0000014E41FD1628: RegOpenKeyExW.ADVAPI32 ref: 0000014E41FD1719
                                                                • Part of subcall function 0000014E41FD1628: RegCloseKey.ADVAPI32 ref: 0000014E41FD1734
                                                                • Part of subcall function 0000014E41FD1628: RegOpenKeyExW.ADVAPI32 ref: 0000014E41FD1754
                                                                • Part of subcall function 0000014E41FD1628: RegCloseKey.ADVAPI32 ref: 0000014E41FD176F
                                                                • Part of subcall function 0000014E41FD1628: RegOpenKeyExW.ADVAPI32 ref: 0000014E41FD178F
                                                                • Part of subcall function 0000014E41FD1628: RegCloseKey.ADVAPI32 ref: 0000014E41FD17AA
                                                                • Part of subcall function 0000014E41FD1628: RegOpenKeyExW.ADVAPI32 ref: 0000014E41FD17CA
                                                              • Sleep.KERNEL32 ref: 0000014E41FD1AD7
                                                              • SleepEx.KERNELBASE ref: 0000014E41FD1ADD
                                                                • Part of subcall function 0000014E41FD1628: RegCloseKey.ADVAPI32 ref: 0000014E41FD17E5
                                                                • Part of subcall function 0000014E41FD1628: RegOpenKeyExW.ADVAPI32 ref: 0000014E41FD1805
                                                                • Part of subcall function 0000014E41FD1628: RegCloseKey.ADVAPI32 ref: 0000014E41FD1820
                                                                • Part of subcall function 0000014E41FD1628: RegOpenKeyExW.ADVAPI32 ref: 0000014E41FD1840
                                                                • Part of subcall function 0000014E41FD1628: RegCloseKey.ADVAPI32 ref: 0000014E41FD185B
                                                                • Part of subcall function 0000014E41FD1628: RegOpenKeyExW.ADVAPI32 ref: 0000014E41FD187B
                                                                • Part of subcall function 0000014E41FD1628: RegCloseKey.ADVAPI32 ref: 0000014E41FD1896
                                                                • Part of subcall function 0000014E41FD1628: RegCloseKey.ADVAPI32 ref: 0000014E41FD18A0
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CloseOpen$HeapSleep$AllocProcess
                                                              • String ID:
                                                              • API String ID: 1534210851-0
                                                              • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                              • Instruction ID: 27739bd1d7c2b649979a3e3ac9a2f5b2f111066e3f9e7ba65cc6bd2b1fdd864d
                                                              • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                              • Instruction Fuzzy Hash: 1231B771308A4182EF509B66DA593F9A3E4BF84BD0F0C55229E0BC76B6EF24C8538330

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 57 14e41fd3844-14e41fd384f 58 14e41fd3869-14e41fd3870 57->58 59 14e41fd3851-14e41fd3864 StrCmpNIW 57->59 59->58 60 14e41fd3866 59->60 60->58
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: dialer
                                                              • API String ID: 0-3528709123
                                                              • Opcode ID: 65427932a6511f3c8dca5889eed1792e2f2e2d3e0b30565664b7cb78ea33e46c
                                                              • Instruction ID: edc9b53c890d6efa8cfb08019f2e5464623e49ddff2869f1cd1f5de1b6805b2a
                                                              • Opcode Fuzzy Hash: 65427932a6511f3c8dca5889eed1792e2f2e2d3e0b30565664b7cb78ea33e46c
                                                              • Instruction Fuzzy Hash: 8BD05EB13117058AFF14DFAA88CD6B0A390BF04754F8C40208A0181660DB18C99E9620

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3390979377.0000014E41FA0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FA0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fa0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID:
                                                              • API String ID: 1029625771-0
                                                              • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                              • Instruction ID: 67325ab9c1bf59a10d455d8bffd91d13401eaaa9fb1b126a29269b2ed4ac34ab
                                                              • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                              • Instruction Fuzzy Hash: CA61DD32B0169087DF54CF9590487ADB3E2FB58BE4F1C8121EE5A87B98DA38D853D720

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 367 14e41fd2b2c-14e41fd2ba5 call 14e41ff2ce0 370 14e41fd2bab-14e41fd2bb1 367->370 371 14e41fd2ee0-14e41fd2f03 367->371 370->371 372 14e41fd2bb7-14e41fd2bba 370->372 372->371 373 14e41fd2bc0-14e41fd2bc3 372->373 373->371 374 14e41fd2bc9-14e41fd2bd9 GetModuleHandleA 373->374 375 14e41fd2bdb-14e41fd2beb call 14e41fe6090 374->375 376 14e41fd2bed 374->376 378 14e41fd2bf0-14e41fd2c0e 375->378 376->378 378->371 381 14e41fd2c14-14e41fd2c33 StrCmpNIW 378->381 381->371 382 14e41fd2c39-14e41fd2c3d 381->382 382->371 383 14e41fd2c43-14e41fd2c4d 382->383 383->371 384 14e41fd2c53-14e41fd2c5a 383->384 384->371 385 14e41fd2c60-14e41fd2c73 384->385 386 14e41fd2c83 385->386 387 14e41fd2c75-14e41fd2c81 385->387 388 14e41fd2c86-14e41fd2c8a 386->388 387->388 389 14e41fd2c9a 388->389 390 14e41fd2c8c-14e41fd2c98 388->390 391 14e41fd2c9d-14e41fd2ca7 389->391 390->391 392 14e41fd2d9d-14e41fd2da1 391->392 393 14e41fd2cad-14e41fd2cb0 391->393 396 14e41fd2da7-14e41fd2daa 392->396 397 14e41fd2ed2-14e41fd2eda 392->397 394 14e41fd2cc2-14e41fd2ccc 393->394 395 14e41fd2cb2-14e41fd2cbf call 14e41fd199c 393->395 399 14e41fd2cce-14e41fd2cdb 394->399 400 14e41fd2d00-14e41fd2d0a 394->400 395->394 401 14e41fd2dbb-14e41fd2dc5 396->401 402 14e41fd2dac-14e41fd2db8 call 14e41fd199c 396->402 397->371 397->385 399->400 407 14e41fd2cdd-14e41fd2cea 399->407 408 14e41fd2d3a-14e41fd2d3d 400->408 409 14e41fd2d0c-14e41fd2d19 400->409 404 14e41fd2dc7-14e41fd2dd4 401->404 405 14e41fd2df5-14e41fd2df8 401->405 402->401 404->405 413 14e41fd2dd6-14e41fd2de3 404->413 414 14e41fd2dfa-14e41fd2e03 call 14e41fd1bbc 405->414 415 14e41fd2e05-14e41fd2e12 lstrlenW 405->415 416 14e41fd2ced-14e41fd2cf3 407->416 411 14e41fd2d4b-14e41fd2d58 lstrlenW 408->411 412 14e41fd2d3f-14e41fd2d49 call 14e41fd1bbc 408->412 409->408 417 14e41fd2d1b-14e41fd2d28 409->417 419 14e41fd2d7b-14e41fd2d8d call 14e41fd3844 411->419 420 14e41fd2d5a-14e41fd2d64 411->420 412->411 424 14e41fd2d93-14e41fd2d98 412->424 421 14e41fd2de6-14e41fd2dec 413->421 414->415 431 14e41fd2e4a-14e41fd2e55 414->431 425 14e41fd2e35-14e41fd2e3f call 14e41fd3844 415->425 426 14e41fd2e14-14e41fd2e1e 415->426 423 14e41fd2cf9-14e41fd2cfe 416->423 416->424 427 14e41fd2d2b-14e41fd2d31 417->427 419->424 435 14e41fd2e42-14e41fd2e44 419->435 420->419 430 14e41fd2d66-14e41fd2d79 call 14e41fd152c 420->430 421->431 432 14e41fd2dee-14e41fd2df3 421->432 423->400 423->416 424->435 425->435 426->425 436 14e41fd2e20-14e41fd2e33 call 14e41fd152c 426->436 427->424 437 14e41fd2d33-14e41fd2d38 427->437 430->419 430->424 439 14e41fd2ecc-14e41fd2ed0 431->439 440 14e41fd2e57-14e41fd2e5b 431->440 432->405 432->421 435->397 435->431 436->425 436->431 437->408 437->427 439->397 444 14e41fd2e5d-14e41fd2e61 440->444 445 14e41fd2e63-14e41fd2e7d call 14e41fd85c0 440->445 444->445 448 14e41fd2e80-14e41fd2e83 444->448 445->448 451 14e41fd2ea6-14e41fd2ea9 448->451 452 14e41fd2e85-14e41fd2ea3 call 14e41fd85c0 448->452 451->439 454 14e41fd2eab-14e41fd2ec9 call 14e41fd85c0 451->454 452->451 454->439
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                              • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                              • API String ID: 2119608203-3850299575
                                                              • Opcode ID: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                              • Instruction ID: effd1d481dd4490a16ad21cf9b2687bc37b8d46439eecc8b1afc957421dada5b
                                                              • Opcode Fuzzy Hash: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                              • Instruction Fuzzy Hash: DBB16972310A9086FF649FA5D4587E9A3E5FF44B94F485016EE0A937A4DB35CC42C7A0
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 3140674995-0
                                                              • Opcode ID: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                              • Instruction ID: 4a8a08b1cb576b9d78726fe8905b333cbd284622d38cdc1c56e494f92cae6b39
                                                              • Opcode Fuzzy Hash: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                              • Instruction Fuzzy Hash: 4B316172305B8489EF609F60E8543EDB3A0FB84758F48412ADA4E87BA4EF38C549C720
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 1239891234-0
                                                              • Opcode ID: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                              • Instruction ID: 6ff2dff154542a0378403bbbd0c8e4de9d1707aa7ebe8d406dd5d67eefb56c20
                                                              • Opcode Fuzzy Hash: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                              • Instruction Fuzzy Hash: 39313136314F8086DB60CF25E8443EEB3A4FB89764F580116EA9E87BA5DF38C556CB10

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                              • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                              • API String ID: 106492572-2879589442
                                                              • Opcode ID: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                              • Instruction ID: a2090c4e061c94f1704aee29069009e9ac06c7e615b494ced23eb7a84219142a
                                                              • Opcode Fuzzy Hash: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                              • Instruction Fuzzy Hash: ED712836318B1486EF10AF61E8886E9A3F5FB84B98F091111DE4E87B39DF38C546C360

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                              • String ID: d
                                                              • API String ID: 2005889112-2564639436
                                                              • Opcode ID: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                              • Instruction ID: 013e14f2c87ef41763d25eff144d490c8d2c3adaa6cff7853b3d531281aa9866
                                                              • Opcode Fuzzy Hash: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                              • Instruction Fuzzy Hash: D5513036708B8886EB55CF62E5483AAB7E1FB89F95F494124DE4A47768DF3CC046C710

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentThread$AddressHandleModuleProc
                                                              • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                              • API String ID: 4175298099-1975688563
                                                              • Opcode ID: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                              • Instruction ID: d2164b162b6ae80d87fccfd4c10993e61a433f491f5e0695c4aef27492673104
                                                              • Opcode Fuzzy Hash: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                              • Instruction Fuzzy Hash: 60318274704A4AA0FF04EFA9E8597E4E3A1BF54354F8D5013941A97676AF78C24BC3B0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 209 14e41fa6910-14e41fa6916 210 14e41fa6918-14e41fa691b 209->210 211 14e41fa6951-14e41fa695b 209->211 212 14e41fa691d-14e41fa6920 210->212 213 14e41fa6945-14e41fa6984 call 14e41fa6fc0 210->213 214 14e41fa6a78-14e41fa6a8d 211->214 215 14e41fa6938 __scrt_dllmain_crt_thread_attach 212->215 216 14e41fa6922-14e41fa6925 212->216 232 14e41fa698a-14e41fa699f call 14e41fa6e54 213->232 233 14e41fa6a52 213->233 217 14e41fa6a9c-14e41fa6ab6 call 14e41fa6e54 214->217 218 14e41fa6a8f 214->218 224 14e41fa693d-14e41fa6944 215->224 220 14e41fa6927-14e41fa6930 216->220 221 14e41fa6931-14e41fa6936 call 14e41fa6f04 216->221 230 14e41fa6ab8-14e41fa6aed call 14e41fa6f7c call 14e41fa6e1c call 14e41fa7318 call 14e41fa7130 call 14e41fa7154 call 14e41fa6fac 217->230 231 14e41fa6aef-14e41fa6b20 call 14e41fa7190 217->231 222 14e41fa6a91-14e41fa6a9b 218->222 221->224 230->222 243 14e41fa6b31-14e41fa6b37 231->243 244 14e41fa6b22-14e41fa6b28 231->244 241 14e41fa6a6a-14e41fa6a77 call 14e41fa7190 232->241 242 14e41fa69a5-14e41fa69b6 call 14e41fa6ec4 232->242 237 14e41fa6a54-14e41fa6a69 233->237 241->214 259 14e41fa69b8-14e41fa69dc call 14e41fa72dc call 14e41fa6e0c call 14e41fa6e38 call 14e41faac0c 242->259 260 14e41fa6a07-14e41fa6a11 call 14e41fa7130 242->260 249 14e41fa6b39-14e41fa6b43 243->249 250 14e41fa6b7e-14e41fa6b94 call 14e41fa268c 243->250 244->243 248 14e41fa6b2a-14e41fa6b2c 244->248 255 14e41fa6c1f-14e41fa6c2c 248->255 256 14e41fa6b4f-14e41fa6b5d call 14e41fb5780 249->256 257 14e41fa6b45-14e41fa6b4d 249->257 270 14e41fa6b96-14e41fa6b98 250->270 271 14e41fa6bcc-14e41fa6bce 250->271 262 14e41fa6b63-14e41fa6b78 call 14e41fa6910 256->262 274 14e41fa6c15-14e41fa6c1d 256->274 257->262 259->260 312 14e41fa69de-14e41fa69e5 __scrt_dllmain_after_initialize_c 259->312 260->233 282 14e41fa6a13-14e41fa6a1f call 14e41fa7180 260->282 262->250 262->274 270->271 279 14e41fa6b9a-14e41fa6bbc call 14e41fa268c call 14e41fa6a78 270->279 272 14e41fa6bd0-14e41fa6bd3 271->272 273 14e41fa6bd5-14e41fa6bea call 14e41fa6910 271->273 272->273 272->274 273->274 291 14e41fa6bec-14e41fa6bf6 273->291 274->255 279->271 306 14e41fa6bbe-14e41fa6bc6 call 14e41fb5780 279->306 299 14e41fa6a21-14e41fa6a2b call 14e41fa7098 282->299 300 14e41fa6a45-14e41fa6a50 282->300 296 14e41fa6bf8-14e41fa6bff 291->296 297 14e41fa6c01-14e41fa6c11 call 14e41fb5780 291->297 296->274 297->274 299->300 311 14e41fa6a2d-14e41fa6a3b 299->311 300->237 306->271 311->300 312->260 313 14e41fa69e7-14e41fa6a04 call 14e41faabc8 312->313 313->260
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3390979377.0000014E41FA0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FA0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fa0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                              • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                                                              • API String ID: 190073905-1786718095
                                                              • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction ID: 3e159b189dba1bc57bfc5d577fc7ac4b56b81dc430d962f8f9d12e70aa5f2c50
                                                              • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction Fuzzy Hash: 3C81C03170064286FE90AB6694593D9E3D0FF897E0F5C80259A09C7FB6EB3DC8478720

                                                              Control-flow Graph

                                                              APIs
                                                              • GetLastError.KERNEL32 ref: 0000014E41FDCE37
                                                              • FlsGetValue.KERNEL32(?,?,?,0000014E41FE0A6B,?,?,?,0000014E41FE045C,?,?,?,0000014E41FDC84F), ref: 0000014E41FDCE4C
                                                              • FlsSetValue.KERNEL32(?,?,?,0000014E41FE0A6B,?,?,?,0000014E41FE045C,?,?,?,0000014E41FDC84F), ref: 0000014E41FDCE6D
                                                              • FlsSetValue.KERNEL32(?,?,?,0000014E41FE0A6B,?,?,?,0000014E41FE045C,?,?,?,0000014E41FDC84F), ref: 0000014E41FDCE9A
                                                              • FlsSetValue.KERNEL32(?,?,?,0000014E41FE0A6B,?,?,?,0000014E41FE045C,?,?,?,0000014E41FDC84F), ref: 0000014E41FDCEAB
                                                              • FlsSetValue.KERNEL32(?,?,?,0000014E41FE0A6B,?,?,?,0000014E41FE045C,?,?,?,0000014E41FDC84F), ref: 0000014E41FDCEBC
                                                              • SetLastError.KERNEL32 ref: 0000014E41FDCED7
                                                              • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,0000014E41FE0A6B,?,?,?,0000014E41FE045C,?,?,?,0000014E41FDC84F), ref: 0000014E41FDCF0D
                                                              • FlsSetValue.KERNEL32(?,?,00000001,0000014E41FDECCC,?,?,?,?,0000014E41FDBF9F,?,?,?,?,?,0000014E41FD7AB0), ref: 0000014E41FDCF2C
                                                                • Part of subcall function 0000014E41FDD6CC: HeapAlloc.KERNEL32 ref: 0000014E41FDD721
                                                              • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,0000014E41FE0A6B,?,?,?,0000014E41FE045C,?,?,?,0000014E41FDC84F), ref: 0000014E41FDCF54
                                                                • Part of subcall function 0000014E41FDD744: HeapFree.KERNEL32 ref: 0000014E41FDD75A
                                                                • Part of subcall function 0000014E41FDD744: GetLastError.KERNEL32 ref: 0000014E41FDD764
                                                              • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,0000014E41FE0A6B,?,?,?,0000014E41FE045C,?,?,?,0000014E41FDC84F), ref: 0000014E41FDCF65
                                                              • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,0000014E41FE0A6B,?,?,?,0000014E41FE045C,?,?,?,0000014E41FDC84F), ref: 0000014E41FDCF76
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorLast$Heap$AllocFree
                                                              • String ID:
                                                              • API String ID: 570795689-0
                                                              • Opcode ID: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                              • Instruction ID: d05d1a81437cdd74f7d820c0fbdd9315d75b8d778be0daec336e8a8adf9e924f
                                                              • Opcode Fuzzy Hash: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                              • Instruction Fuzzy Hash: 8141E7B034528441FE69A735955D7F9E3C2BF847B0F1C0B28A92BC66F6EE68D5039230

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                              • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                              • API String ID: 2171963597-1373409510
                                                              • Opcode ID: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                              • Instruction ID: 7e5f448f2627fb39cf378e58a67f4c7b29978e30c1d81c84a71b5fabbdbaa53a
                                                              • Opcode Fuzzy Hash: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                              • Instruction Fuzzy Hash: B0213032718B5482FB10CB25E4483A9A7E0FB85BA4F580215DA5A42BB8CF7CC54ACB10

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 588 14e41fda544-14e41fda5ac call 14e41fdb414 591 14e41fdaa13-14e41fdaa1b call 14e41fdc748 588->591 592 14e41fda5b2-14e41fda5b5 588->592 592->591 593 14e41fda5bb-14e41fda5c1 592->593 595 14e41fda5c7-14e41fda5cb 593->595 596 14e41fda690-14e41fda6a2 593->596 595->596 600 14e41fda5d1-14e41fda5dc 595->600 598 14e41fda6a8-14e41fda6ac 596->598 599 14e41fda963-14e41fda967 596->599 598->599 601 14e41fda6b2-14e41fda6bd 598->601 603 14e41fda969-14e41fda970 599->603 604 14e41fda9a0-14e41fda9aa call 14e41fd9634 599->604 600->596 602 14e41fda5e2-14e41fda5e7 600->602 601->599 606 14e41fda6c3-14e41fda6ca 601->606 602->596 607 14e41fda5ed-14e41fda5f7 call 14e41fd9634 602->607 603->591 608 14e41fda976-14e41fda99b call 14e41fdaa1c 603->608 604->591 614 14e41fda9ac-14e41fda9cb call 14e41fd7940 604->614 611 14e41fda894-14e41fda8a0 606->611 612 14e41fda6d0-14e41fda707 call 14e41fd9a10 606->612 607->614 622 14e41fda5fd-14e41fda628 call 14e41fd9634 * 2 call 14e41fd9d24 607->622 608->604 611->604 615 14e41fda8a6-14e41fda8aa 611->615 612->611 626 14e41fda70d-14e41fda715 612->626 619 14e41fda8ba-14e41fda8c2 615->619 620 14e41fda8ac-14e41fda8b8 call 14e41fd9ce4 615->620 619->604 625 14e41fda8c8-14e41fda8d5 call 14e41fd98b4 619->625 620->619 633 14e41fda8db-14e41fda8e3 620->633 656 14e41fda62a-14e41fda62e 622->656 657 14e41fda648-14e41fda652 call 14e41fd9634 622->657 625->604 625->633 630 14e41fda719-14e41fda74b 626->630 635 14e41fda887-14e41fda88e 630->635 636 14e41fda751-14e41fda75c 630->636 637 14e41fda9f6-14e41fdaa12 call 14e41fd9634 * 2 call 14e41fdc6a8 633->637 638 14e41fda8e9-14e41fda8ed 633->638 635->611 635->630 636->635 639 14e41fda762-14e41fda77b 636->639 637->591 641 14e41fda8ef-14e41fda8fe call 14e41fd9ce4 638->641 642 14e41fda900 638->642 643 14e41fda874-14e41fda879 639->643 644 14e41fda781-14e41fda7c6 call 14e41fd9cf8 * 2 639->644 652 14e41fda903-14e41fda90d call 14e41fdb4ac 641->652 642->652 648 14e41fda884 643->648 669 14e41fda7c8-14e41fda7ee call 14e41fd9cf8 call 14e41fdac38 644->669 670 14e41fda804-14e41fda80a 644->670 648->635 652->604 667 14e41fda913-14e41fda961 call 14e41fd9944 call 14e41fd9b50 652->667 656->657 661 14e41fda630-14e41fda63b 656->661 657->596 673 14e41fda654-14e41fda674 call 14e41fd9634 * 2 call 14e41fdb4ac 657->673 661->657 666 14e41fda63d-14e41fda642 661->666 666->591 666->657 667->604 688 14e41fda815-14e41fda872 call 14e41fda470 669->688 689 14e41fda7f0-14e41fda802 669->689 677 14e41fda87b 670->677 678 14e41fda80c-14e41fda810 670->678 694 14e41fda68b 673->694 695 14e41fda676-14e41fda680 call 14e41fdb59c 673->695 679 14e41fda880 677->679 678->644 679->648 688->679 689->669 689->670 694->596 698 14e41fda686-14e41fda9ef call 14e41fd92ac call 14e41fdaff4 call 14e41fd94a0 695->698 699 14e41fda9f0-14e41fda9f5 call 14e41fdc6a8 695->699 698->699 699->637
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                              • String ID: csm$csm$csm
                                                              • API String ID: 849930591-393685449
                                                              • Opcode ID: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                              • Instruction ID: d2352766757894f1e6b2819fe3e7d64d43612c435bf147b291665c758718f4e6
                                                              • Opcode Fuzzy Hash: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                              • Instruction Fuzzy Hash: 43E16B72704B408AEF60DF6594493EDB7E0FB85B98F180115EE8E97BA9CB34C492C725

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 467 14e41fa9944-14e41fa99ac call 14e41faa814 470 14e41fa99b2-14e41fa99b5 467->470 471 14e41fa9e13-14e41fa9e1b call 14e41fabb48 467->471 470->471 473 14e41fa99bb-14e41fa99c1 470->473 474 14e41fa99c7-14e41fa99cb 473->474 475 14e41fa9a90-14e41fa9aa2 473->475 474->475 479 14e41fa99d1-14e41fa99dc 474->479 477 14e41fa9aa8-14e41fa9aac 475->477 478 14e41fa9d63-14e41fa9d67 475->478 477->478 480 14e41fa9ab2-14e41fa9abd 477->480 482 14e41fa9d69-14e41fa9d70 478->482 483 14e41fa9da0-14e41fa9daa call 14e41fa8a34 478->483 479->475 481 14e41fa99e2-14e41fa99e7 479->481 480->478 484 14e41fa9ac3-14e41fa9aca 480->484 481->475 485 14e41fa99ed-14e41fa99f7 call 14e41fa8a34 481->485 482->471 486 14e41fa9d76-14e41fa9d9b call 14e41fa9e1c 482->486 483->471 496 14e41fa9dac-14e41fa9dcb call 14e41fa6d40 483->496 488 14e41fa9ad0-14e41fa9b07 call 14e41fa8e10 484->488 489 14e41fa9c94-14e41fa9ca0 484->489 485->496 500 14e41fa99fd-14e41fa9a28 call 14e41fa8a34 * 2 call 14e41fa9124 485->500 486->483 488->489 504 14e41fa9b0d-14e41fa9b15 488->504 489->483 493 14e41fa9ca6-14e41fa9caa 489->493 497 14e41fa9cac-14e41fa9cb8 call 14e41fa90e4 493->497 498 14e41fa9cba-14e41fa9cc2 493->498 497->498 511 14e41fa9cdb-14e41fa9ce3 497->511 498->483 503 14e41fa9cc8-14e41fa9cd5 call 14e41fa8cb4 498->503 535 14e41fa9a48-14e41fa9a52 call 14e41fa8a34 500->535 536 14e41fa9a2a-14e41fa9a2e 500->536 503->483 503->511 509 14e41fa9b19-14e41fa9b4b 504->509 513 14e41fa9c87-14e41fa9c8e 509->513 514 14e41fa9b51-14e41fa9b5c 509->514 516 14e41fa9ce9-14e41fa9ced 511->516 517 14e41fa9df6-14e41fa9e12 call 14e41fa8a34 * 2 call 14e41fabaa8 511->517 513->489 513->509 514->513 518 14e41fa9b62-14e41fa9b7b 514->518 520 14e41fa9d00 516->520 521 14e41fa9cef-14e41fa9cfe call 14e41fa90e4 516->521 517->471 522 14e41fa9b81-14e41fa9bc6 call 14e41fa90f8 * 2 518->522 523 14e41fa9c74-14e41fa9c79 518->523 531 14e41fa9d03-14e41fa9d0d call 14e41faa8ac 520->531 521->531 551 14e41fa9bc8-14e41fa9bee call 14e41fa90f8 call 14e41faa038 522->551 552 14e41fa9c04-14e41fa9c0a 522->552 528 14e41fa9c84 523->528 528->513 531->483 543 14e41fa9d13-14e41fa9d61 call 14e41fa8d44 call 14e41fa8f50 531->543 535->475 550 14e41fa9a54-14e41fa9a74 call 14e41fa8a34 * 2 call 14e41faa8ac 535->550 536->535 542 14e41fa9a30-14e41fa9a3b 536->542 542->535 547 14e41fa9a3d-14e41fa9a42 542->547 543->483 547->471 547->535 573 14e41fa9a76-14e41fa9a80 call 14e41faa99c 550->573 574 14e41fa9a8b 550->574 567 14e41fa9bf0-14e41fa9c02 551->567 568 14e41fa9c15-14e41fa9c72 call 14e41fa9870 551->568 556 14e41fa9c0c-14e41fa9c10 552->556 557 14e41fa9c7b 552->557 556->522 561 14e41fa9c80 557->561 561->528 567->551 567->552 568->561 577 14e41fa9a86-14e41fa9def call 14e41fa86ac call 14e41faa3f4 call 14e41fa88a0 573->577 578 14e41fa9df0-14e41fa9df5 call 14e41fabaa8 573->578 574->475 577->578 578->517
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3390979377.0000014E41FA0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FA0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fa0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                              • String ID: csm$csm$csm
                                                              • API String ID: 849930591-393685449
                                                              • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                              • Instruction ID: 092061804e2acfd85856a6fbf8df1efce0ac3395992e54896de2f0b233cc8006
                                                              • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                              • Instruction Fuzzy Hash: F5E16A72704B408AEF609BA5D4883DDB7E0FB557D8F5C4125EA8997FA5CB38C092C760

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeLibraryProc
                                                              • String ID: api-ms-$ext-ms-
                                                              • API String ID: 3013587201-537541572
                                                              • Opcode ID: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                              • Instruction ID: eccfb42c00e0fcebc11fba8db2cb5dd556603cf0515602b7340d8b3a720e917a
                                                              • Opcode Fuzzy Hash: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                              • Instruction Fuzzy Hash: A0418032315A5091FF16CB56E808BE9A3D6BF46BA0F5D42299D0FD77A4EE38C4478360

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 739 14e41fd104c-14e41fd10b9 RegQueryInfoKeyW 740 14e41fd11b5-14e41fd11d0 739->740 741 14e41fd10bf-14e41fd10c9 739->741 741->740 742 14e41fd10cf-14e41fd111f RegEnumValueW 741->742 743 14e41fd11a5-14e41fd11af 742->743 744 14e41fd1125-14e41fd112a 742->744 743->740 743->742 744->743 745 14e41fd112c-14e41fd1135 744->745 746 14e41fd1147-14e41fd114c 745->746 747 14e41fd1137 745->747 748 14e41fd1199-14e41fd11a3 746->748 749 14e41fd114e-14e41fd1193 GetProcessHeap call 14e41fe6168 GetProcessHeap HeapFree 746->749 750 14e41fd113b-14e41fd113f 747->750 748->743 749->748 750->743 752 14e41fd1141-14e41fd1145 750->752 752->746 752->750
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                              • String ID: d
                                                              • API String ID: 3743429067-2564639436
                                                              • Opcode ID: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                              • Instruction ID: dcb51b6df01793caf54422eba4bcf925065baaae7f996ed60d537fcaac24bad6
                                                              • Opcode Fuzzy Hash: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                              • Instruction Fuzzy Hash: 4A414233218B84C6EB60CF21E44879EB7E5F789B98F448119DA8A47768DF3CC546CB50
                                                              APIs
                                                              • FlsGetValue.KERNEL32(?,?,?,0000014E41FDC7DE,?,?,?,?,?,?,?,?,0000014E41FDCF9D,?,?,00000001), ref: 0000014E41FDD087
                                                              • FlsSetValue.KERNEL32(?,?,?,0000014E41FDC7DE,?,?,?,?,?,?,?,?,0000014E41FDCF9D,?,?,00000001), ref: 0000014E41FDD0A6
                                                              • FlsSetValue.KERNEL32(?,?,?,0000014E41FDC7DE,?,?,?,?,?,?,?,?,0000014E41FDCF9D,?,?,00000001), ref: 0000014E41FDD0CE
                                                              • FlsSetValue.KERNEL32(?,?,?,0000014E41FDC7DE,?,?,?,?,?,?,?,?,0000014E41FDCF9D,?,?,00000001), ref: 0000014E41FDD0DF
                                                              • FlsSetValue.KERNEL32(?,?,?,0000014E41FDC7DE,?,?,?,?,?,?,?,?,0000014E41FDCF9D,?,?,00000001), ref: 0000014E41FDD0F0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID: 1%$Y%
                                                              • API String ID: 3702945584-1395475152
                                                              • Opcode ID: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                              • Instruction ID: a9bf51a53c9a1f80fc76c82896e2421d109dbda82caf93dda9c71af6b8fc7838
                                                              • Opcode Fuzzy Hash: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                              • Instruction Fuzzy Hash: D0111C7070468441FE68A735995D7F9E3C6BF847F0F1C4325A82BC6AFADE68C5039620
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                              • String ID:
                                                              • API String ID: 190073905-0
                                                              • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction ID: a28f0207ded7251b2138ce8eaabf7731b6e17eb6dd1893435d04d01492ed5137
                                                              • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction Fuzzy Hash: D781F271704B418AFF50AB6598493F9E3D0BF85788F5C46169A0ACB7B6EB78C8078730
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Library$Load$AddressErrorFreeLastProc
                                                              • String ID: api-ms-
                                                              • API String ID: 2559590344-2084034818
                                                              • Opcode ID: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                              • Instruction ID: 03ee9c64fc4e5180bd68ea4e23d85fb7920b7978f1ef5f904570876798f634f1
                                                              • Opcode Fuzzy Hash: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                              • Instruction Fuzzy Hash: 80317231316A40A1EF169B82A4087E9A3D4BF48BA0F5D46259D1F87BA5DF39C5468330
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                              • String ID: CONOUT$
                                                              • API String ID: 3230265001-3130406586
                                                              • Opcode ID: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                              • Instruction ID: 58d35a48e73ae5a6a2069cbe50502fe36390fdbaf60b5645c7a944c23e30e8f6
                                                              • Opcode Fuzzy Hash: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                              • Instruction Fuzzy Hash: 86116031318B8486EB608F52E858359B7E0FB88FE4F094225EA5EC77A4DF7CC5168750
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcessProtectVirtual$HandleModule
                                                              • String ID: wr
                                                              • API String ID: 1092925422-2678910430
                                                              • Opcode ID: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                              • Instruction ID: 8310219fc58ae82eb0bcc7bfba685b767ad38c6a0f57641c290d7d667e99c083
                                                              • Opcode Fuzzy Hash: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                              • Instruction Fuzzy Hash: 80115B76708B4582EF549B21E5082A9B7F1FB88B95F490029DF8E877A4EF3DC506C724
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Thread$Current$Context
                                                              • String ID:
                                                              • API String ID: 1666949209-0
                                                              • Opcode ID: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                                                              • Instruction ID: 07ea2566a821138ba5b41bcd2566ad333a6cc9f6e2a32e52345a153ce6aaa6b8
                                                              • Opcode Fuzzy Hash: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                                                              • Instruction Fuzzy Hash: 61D18D76209B8881DE709B16E4943AAB7F0F788B84F144216EACE87B75DF7CC552CB50
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$AllocFree
                                                              • String ID: dialer
                                                              • API String ID: 756756679-3528709123
                                                              • Opcode ID: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                              • Instruction ID: 64828584eb3bfdbaceddc1153c386e701d38d80c8c2db94475a50a70e660af8b
                                                              • Opcode Fuzzy Hash: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                              • Instruction Fuzzy Hash: 48317832705B5582FF15CF56A9487AAA7E0BF44B94F0C85249E4A87B65EB38C4A38360
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$Free
                                                              • String ID: C:\Windows\system32\svchost.exe
                                                              • API String ID: 3168794593-4180442734
                                                              • Opcode ID: 335002606d0c58216c4b7b8c214cf2e956f7ef49abbb5e195d674a66fc258290
                                                              • Instruction ID: 1ea6c2aa508163f35958e79cb2a9901d7fd2f010a3072b3d942776ec3241fee8
                                                              • Opcode Fuzzy Hash: 335002606d0c58216c4b7b8c214cf2e956f7ef49abbb5e195d674a66fc258290
                                                              • Instruction Fuzzy Hash: D021917B60CBD88AEB52DF2598592DDABE1FB49F64F0E4016DB45C3363DA2DC4068720
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorLast
                                                              • String ID:
                                                              • API String ID: 2506987500-0
                                                              • Opcode ID: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                              • Instruction ID: 4c605ab0eebe7c8a65e16142fd15fb062952cf9a22b794a22443e09c107b39ea
                                                              • Opcode Fuzzy Hash: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                              • Instruction Fuzzy Hash: 9511063030528042FE64A735955D7F9A3D2BF847F0F1C4729A92BC6AFAEE69C4039620
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                              • String ID:
                                                              • API String ID: 517849248-0
                                                              • Opcode ID: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                              • Instruction ID: 45260b5053477a1902ed5b314b8ddb3b202787d03d162f4498fe3015baeaf19a
                                                              • Opcode Fuzzy Hash: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                              • Instruction Fuzzy Hash: 0B012931308B4486EB64DB52A85C799A3E5FB88FD4F894035DE4A83765DF3CC98AC760
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                              • String ID:
                                                              • API String ID: 449555515-0
                                                              • Opcode ID: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                              • Instruction ID: 27845c9942124fe15b1c72357d23f614dfff2e05e98621f38ac1f8b99baeb5ad
                                                              • Opcode Fuzzy Hash: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                              • Instruction Fuzzy Hash: 44011B75315B4482FF259B61E81C3A9A7F1BF45B96F090429CA4E87774EF3DC10A8720
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 2395640692-629598281
                                                              • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                              • Instruction ID: a1bf88d4b9d8004459b5fa9669b2167566428502909aa59e78964a9a5b042688
                                                              • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                              • Instruction Fuzzy Hash: 8951D63270160186EF14DF75E44CBB9B7D6FB45B98F598128DA1B83BA8DB75C842C720
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 2395640692-629598281
                                                              • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                              • Instruction ID: 6bc827c4c3bb3e0c98ca9239eca2c50e04eb8a87f0c80140b29f13db2d6fb965
                                                              • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                              • Instruction Fuzzy Hash: 2631D43230074096EF14DF61E84C7A9B7E5FB44B98F098118EE5B83BA9DB39C942C724
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: FinalHandleNamePathlstrlen
                                                              • String ID: \\?\
                                                              • API String ID: 2719912262-4282027825
                                                              • Opcode ID: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                              • Instruction ID: b12ca8b25fa5122955bb982c68454bcc7e018bb98c49cc1ed73afc7e3ae07854
                                                              • Opcode Fuzzy Hash: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                              • Instruction Fuzzy Hash: 30F0493270874591EF608B51F888799A7E0FB48B98F884120DA4986A64DF3CC64FC710
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                              • String ID: CorExitProcess$mscoree.dll
                                                              • API String ID: 4061214504-1276376045
                                                              • Opcode ID: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                              • Instruction ID: 035e3789f53f373a927057afabb0f361c24ef996c6f03b6afc748e9683801fc8
                                                              • Opcode Fuzzy Hash: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                              • Instruction Fuzzy Hash: 9FF06271319B0881EF148F24E44C3A9A3A0FF89775F590319CA6A853F4CF2CC1468760
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CombinePath
                                                              • String ID: \\.\pipe\
                                                              • API String ID: 3422762182-91387939
                                                              • Opcode ID: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                              • Instruction ID: cc80a717613b9aef5249e127a8ce4b2df5163e301108ee4070d8aa47fa087152
                                                              • Opcode Fuzzy Hash: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                              • Instruction Fuzzy Hash: A7F05E70308B8482EF108B12B90C1A9A3A1BF48FE4F0D4120EE4A87B28DE2CC4468720
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentThread
                                                              • String ID:
                                                              • API String ID: 2882836952-0
                                                              • Opcode ID: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                                                              • Instruction ID: 742035003ab41573749cbaf50ab97c77026f2c65be4dc385caaa5c533d93989b
                                                              • Opcode Fuzzy Hash: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                                                              • Instruction Fuzzy Hash: 7402B432219B8486EB60CB59E4943AAB7F0F7C5794F144116EA8E87BB8DF7CD485CB10
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentThread
                                                              • String ID:
                                                              • API String ID: 2882836952-0
                                                              • Opcode ID: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                                                              • Instruction ID: 4debb5f53ed61f6123289aa0e5a7e5e44eede09a84607efc51eced9d514b7eed
                                                              • Opcode Fuzzy Hash: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                                                              • Instruction Fuzzy Hash: B561A736619A84C6EB60CB15E44836AB7F0F788784F140216EA8E87BB8DB7CD456CB10
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: _set_statfp
                                                              • String ID:
                                                              • API String ID: 1156100317-0
                                                              • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction ID: e72965eb51f99d8a0ac95fcd431345854843bb65debfdf1bdb0de3510e35bf29
                                                              • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction Fuzzy Hash: 6E118F32B58B5011FF665568D45D3E593C17FA83A8E0F062CA976C67F68A2CC9438224
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3390979377.0000014E41FA0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FA0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fa0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: _set_statfp
                                                              • String ID:
                                                              • API String ID: 1156100317-0
                                                              • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction ID: ead154b9435ffe6a454870689a50e6f6704023e04e4d2936ba47f9ea0b1d783b
                                                              • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction Fuzzy Hash: 0711A0B2BD0E1351FEA41569E75E3E993C07FD8374F4C8628A966862F7CA28C8474230
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3390979377.0000014E41FA0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FA0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fa0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID: Tuesday$Wednesday$or copy constructor iterator'
                                                              • API String ID: 3215553584-4202648911
                                                              • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                              • Instruction ID: 9afa7e71d04fa23ee4952312235bac51a1d74b63e64a95d112a04740b73905c4
                                                              • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                              • Instruction Fuzzy Hash: 45614C7670064042FE659B65E58C3EEEBE1BF867C0F5D4515DA0A9BFB4EA3CD8438220
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CallEncodePointerTranslator
                                                              • String ID: MOC$RCC
                                                              • API String ID: 3544855599-2084237596
                                                              • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction ID: 0789a3831c1f6d771d65473aec04d891a6e65c0c978cd43e319f5209d2f070c5
                                                              • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction Fuzzy Hash: F7614833705B848AEB209F65D4443EDB7E0FB84B98F084215EE4A57BA8DB38D596C714
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                              • String ID: csm$csm
                                                              • API String ID: 3896166516-3733052814
                                                              • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction ID: 321aa2bf97eac6cafb4f774fd1c13e020d27b9bfb404d6bee772e39a7e361af9
                                                              • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction Fuzzy Hash: 54516E722003808AEF648F26D5883A9B7E0FB94B95F1C4255DA9E87BE5CB38D453C718
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3390979377.0000014E41FA0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FA0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fa0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                              • String ID: csm$csm
                                                              • API String ID: 3896166516-3733052814
                                                              • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction ID: 9fc2ac829e4d419cfb4e4e7491d5e77e61521fb2b31f7c138b84e684f10f9101
                                                              • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction Fuzzy Hash: E0516E32200380CAEF648B659548398B7E0FB55BD4F1C4116DA9DC7FA5CB7ED466CB20
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3390979377.0000014E41FA0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FA0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fa0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritable__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 3242871069-629598281
                                                              • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                              • Instruction ID: 0bce45575947cd2407113779943a525e14445a621b98b0471fe801dac2351894
                                                              • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                              • Instruction Fuzzy Hash: C951B4327412008EDF54CB15D40CB98B7E5FB94BE9F9C8124DE8683B6CE7B8D8428724
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3390979377.0000014E41FA0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FA0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fa0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritable__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 3242871069-629598281
                                                              • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                              • Instruction ID: c159a0ba046949333dfa247496e2d25aa9719a0157f25d5229989bbc026eab31
                                                              • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                              • Instruction Fuzzy Hash: A2319E313416409AEB14DF11E848799B7E4FB44BD9F9D8018EE9B83BA8DB7CD942C724
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: FileWrite$ConsoleErrorLastOutput
                                                              • String ID:
                                                              • API String ID: 2718003287-0
                                                              • Opcode ID: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                              • Instruction ID: afeff5cfcaf4403b8b152d041e9c12e6ce2064c04c3d4c674498ddf2345b7502
                                                              • Opcode Fuzzy Hash: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                              • Instruction Fuzzy Hash: 44D1D072718B8089EB11CFA9D4443ECBBF1FB54798F194216CE5A97BAAEA34C507C350
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: ConsoleErrorLastMode
                                                              • String ID:
                                                              • API String ID: 953036326-0
                                                              • Opcode ID: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                              • Instruction ID: cea13cf84bf215eda1d4e32a4ca8aa5317b936fd82c1a643056d64915862160e
                                                              • Opcode Fuzzy Hash: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                              • Instruction Fuzzy Hash: 2091B372708B5485FF60DFA994883EDABE0BB44B98F1D4109DE0A977A5EB74C483C720
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                              • String ID:
                                                              • API String ID: 2933794660-0
                                                              • Opcode ID: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                              • Instruction ID: dfc3c1974cbad934db9993865ec08b5f9e443c71fc6a37ba405ddabd85e8d405
                                                              • Opcode Fuzzy Hash: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                              • Instruction Fuzzy Hash: 65113032714F4589EF00CF60E8583E873B4FB59B68F480E25DA6D867A4DF78C1998390
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: FileType
                                                              • String ID: \\.\pipe\
                                                              • API String ID: 3081899298-91387939
                                                              • Opcode ID: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                              • Instruction ID: a326b1bb8bb403e4a0d4c0446bf3a53fe52e6195dedbf9b24ed740f8b36a4abd
                                                              • Opcode Fuzzy Hash: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                              • Instruction Fuzzy Hash: B171C236304B8185EF359E65D8483FAA7D4FB85784F4A0126DE0B83BA9DF35C6468750
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3390979377.0000014E41FA0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FA0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fa0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CallTranslator
                                                              • String ID: MOC$RCC
                                                              • API String ID: 3163161869-2084237596
                                                              • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction ID: 9082f48436bddb50fbe074ea12ed5132107a6f235155bfae31550afec4f2ce97
                                                              • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction Fuzzy Hash: ED613736A00B848AEB20DFA5D4843DDB7A0FB44BC8F184215EF4957FA9DB78D596C720
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: FileType
                                                              • String ID: \\.\pipe\
                                                              • API String ID: 3081899298-91387939
                                                              • Opcode ID: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                              • Instruction ID: cc360d09ba06bcdff2f15c29ced7a4e175476a6bb9ba5d9fe31b0890df6299d6
                                                              • Opcode Fuzzy Hash: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                              • Instruction Fuzzy Hash: 7851E73230478181FF259A69A55C3FAE7E1FBC6750F8D0125DE4B83B6ECA39C50687A0
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastWrite
                                                              • String ID: U
                                                              • API String ID: 442123175-4171548499
                                                              • Opcode ID: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                              • Instruction ID: c83ac0f76dcb79476ddf21a95a19c8a865843251dc56904ff8b0029dd694ac40
                                                              • Opcode Fuzzy Hash: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                              • Instruction Fuzzy Hash: E941A232318B8082DF20CF65E8483E9A7A0FB98794F494022EE4EC77A4EB7CC542C750
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFileHeaderRaise
                                                              • String ID: csm
                                                              • API String ID: 2573137834-1018135373
                                                              • Opcode ID: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                              • Instruction ID: 558f2c2fa83ee08c27e1fc5abc980bded73aea70065ff57803d74eae209385c4
                                                              • Opcode Fuzzy Hash: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                              • Instruction Fuzzy Hash: 0F112832218B8482EF618B15F448399B7E5FB88B94F5D8220EE8D47B69DF3DC552CB00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3390979377.0000014E41FA0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FA0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fa0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: __std_exception_copy
                                                              • String ID: ierarchy Descriptor'$riptor at (
                                                              • API String ID: 592178966-758928094
                                                              • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                              • Instruction ID: eb669838bcd11bd9391b268dc568cb615196d67751b03d9664e942e19c7f9c9a
                                                              • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                              • Instruction Fuzzy Hash: F0E08671740B4490DF018F21E8442D873E0EF59B64B8C9122D95C46331FA3CD1FAC310
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3390979377.0000014E41FA0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FA0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fa0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: __std_exception_copy
                                                              • String ID: Locator'$riptor at (
                                                              • API String ID: 592178966-4215709766
                                                              • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                              • Instruction ID: dcf211704ab779cfcff42d5391f5e7064cd144a077eba1243619bea389c199af
                                                              • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                              • Instruction Fuzzy Hash: 92E08671740B4480EF028F21D4401D8B3A0FB59B54B8C9122C94C46331EA3CD1E6C310
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$AllocFree
                                                              • String ID:
                                                              • API String ID: 756756679-0
                                                              • Opcode ID: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                              • Instruction ID: f9751e398ec6f9e8c393d2d9c50e353c79f978f663c39b1dde9fddacf25f1213
                                                              • Opcode Fuzzy Hash: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                              • Instruction Fuzzy Hash: E2115535705B8881EF059B66A8082AAB3E1FB89FD0F1D40289E4E83776DF78C842C310
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000016.00000002.3391758050.0000014E41FD0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000014E41FD0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_22_2_14e41fd0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Heap$AllocProcess
                                                              • String ID:
                                                              • API String ID: 1617791916-0
                                                              • Opcode ID: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                              • Instruction ID: 58e4b1372e48106c13d9c210e95dfed249a6192135837390fc88e392b1da2cd8
                                                              • Opcode Fuzzy Hash: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                              • Instruction Fuzzy Hash: 52E0393570170886EB058B62D80838AB7E1FB89F26F0A8028890947361DF7DC49AC760

                                                              Execution Graph

                                                              Execution Coverage:1.6%
                                                              Dynamic/Decrypted Code Coverage:95.2%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:126
                                                              Total number of Limit Nodes:16
                                                              execution_graph 15157 1d15b0428c8 15159 1d15b04290e 15157->15159 15158 1d15b042970 15159->15158 15161 1d15b043844 15159->15161 15162 1d15b043851 StrCmpNIW 15161->15162 15163 1d15b043866 15161->15163 15162->15163 15163->15159 15164 1d15b04554d 15166 1d15b045554 15164->15166 15165 1d15b0455bb 15166->15165 15167 1d15b045637 VirtualProtect 15166->15167 15168 1d15b045671 15167->15168 15169 1d15b045663 GetLastError 15167->15169 15169->15168 15170 1d15b01273c 15171 1d15b01276a 15170->15171 15172 1d15b0127c5 VirtualAlloc 15171->15172 15174 1d15b0128d4 15171->15174 15172->15174 15175 1d15b0127ec 15172->15175 15173 1d15b012858 LoadLibraryA 15173->15175 15175->15173 15175->15174 15176 1d15b045cf0 15177 1d15b045cfd 15176->15177 15178 1d15b045d09 15177->15178 15185 1d15b045e1a 15177->15185 15179 1d15b045d3e 15178->15179 15180 1d15b045d8d 15178->15180 15181 1d15b045d66 SetThreadContext 15179->15181 15181->15180 15182 1d15b045e41 VirtualProtect FlushInstructionCache 15182->15185 15183 1d15b045efe 15184 1d15b045f1e 15183->15184 15198 1d15b0443e0 15183->15198 15194 1d15b044df0 GetCurrentProcess 15184->15194 15185->15182 15185->15183 15188 1d15b045f23 15189 1d15b045f77 15188->15189 15190 1d15b045f37 ResumeThread 15188->15190 15202 1d15b047940 15189->15202 15191 1d15b045f6b 15190->15191 15191->15188 15193 1d15b045fbf 15195 1d15b044e0c 15194->15195 15196 1d15b044e22 VirtualProtect FlushInstructionCache 15195->15196 15197 1d15b044e53 15195->15197 15196->15195 15197->15188 15200 1d15b0443fc 15198->15200 15199 1d15b04445f 15199->15184 15200->15199 15201 1d15b044412 VirtualFree 15200->15201 15201->15200 15204 1d15b047949 _log10_special 15202->15204 15203 1d15b047954 15203->15193 15204->15203 15207 1d15b048320 15204->15207 15206 1d15b048157 15206->15193 15209 1d15b048331 capture_current_context 15207->15209 15208 1d15b04833a RtlLookupFunctionEntry 15208->15209 15210 1d15b048389 15208->15210 15209->15208 15209->15210 15210->15206 15211 1d15b043ab9 15214 1d15b043a06 15211->15214 15212 1d15b043a70 15213 1d15b043a56 VirtualQuery 15213->15212 15213->15214 15214->15212 15214->15213 15215 1d15b043a8a VirtualAlloc 15214->15215 15215->15212 15216 1d15b043abb GetLastError 15215->15216 15216->15214 15217 1d15b041abc 15222 1d15b041628 GetProcessHeap 15217->15222 15219 1d15b041ad2 Sleep SleepEx 15220 1d15b041acb 15219->15220 15220->15219 15221 1d15b041598 StrCmpIW StrCmpW 15220->15221 15221->15220 15223 1d15b041648 _invalid_parameter_noinfo 15222->15223 15267 1d15b041268 GetProcessHeap 15223->15267 15225 1d15b041650 15226 1d15b041268 2 API calls 15225->15226 15227 1d15b041661 15226->15227 15228 1d15b041268 2 API calls 15227->15228 15229 1d15b04166a 15228->15229 15230 1d15b041268 2 API calls 15229->15230 15231 1d15b041673 15230->15231 15232 1d15b04168e RegOpenKeyExW 15231->15232 15233 1d15b0418a6 15232->15233 15234 1d15b0416c0 RegOpenKeyExW 15232->15234 15233->15220 15235 1d15b0416ff RegOpenKeyExW 15234->15235 15236 1d15b0416e9 15234->15236 15238 1d15b041723 15235->15238 15239 1d15b04173a RegOpenKeyExW 15235->15239 15278 1d15b0412bc RegQueryInfoKeyW 15236->15278 15271 1d15b04104c RegQueryInfoKeyW 15238->15271 15242 1d15b041775 RegOpenKeyExW 15239->15242 15243 1d15b04175e 15239->15243 15246 1d15b0417b0 RegOpenKeyExW 15242->15246 15247 1d15b041799 15242->15247 15245 1d15b0412bc 13 API calls 15243->15245 15250 1d15b04176b RegCloseKey 15245->15250 15248 1d15b0417d4 15246->15248 15249 1d15b0417eb RegOpenKeyExW 15246->15249 15251 1d15b0412bc 13 API calls 15247->15251 15253 1d15b0412bc 13 API calls 15248->15253 15254 1d15b041826 RegOpenKeyExW 15249->15254 15255 1d15b04180f 15249->15255 15250->15242 15252 1d15b0417a6 RegCloseKey 15251->15252 15252->15246 15256 1d15b0417e1 RegCloseKey 15253->15256 15258 1d15b041861 RegOpenKeyExW 15254->15258 15259 1d15b04184a 15254->15259 15257 1d15b04104c 5 API calls 15255->15257 15256->15249 15260 1d15b04181c RegCloseKey 15257->15260 15262 1d15b041885 15258->15262 15263 1d15b04189c RegCloseKey 15258->15263 15261 1d15b04104c 5 API calls 15259->15261 15260->15254 15264 1d15b041857 RegCloseKey 15261->15264 15265 1d15b04104c 5 API calls 15262->15265 15263->15233 15264->15258 15266 1d15b041892 RegCloseKey 15265->15266 15266->15263 15289 1d15b056168 15267->15289 15269 1d15b041283 GetProcessHeap 15270 1d15b0412ae _invalid_parameter_noinfo 15269->15270 15270->15225 15272 1d15b0411b5 RegCloseKey 15271->15272 15273 1d15b0410bf 15271->15273 15272->15239 15273->15272 15274 1d15b0410cf RegEnumValueW 15273->15274 15275 1d15b041125 _invalid_parameter_noinfo 15274->15275 15275->15272 15275->15274 15276 1d15b04114e GetProcessHeap 15275->15276 15277 1d15b04116e GetProcessHeap HeapFree 15275->15277 15276->15275 15277->15275 15279 1d15b041327 GetProcessHeap 15278->15279 15280 1d15b04148a RegCloseKey 15278->15280 15283 1d15b04133e _invalid_parameter_noinfo 15279->15283 15280->15235 15281 1d15b041476 GetProcessHeap HeapFree 15281->15280 15282 1d15b041352 RegEnumValueW 15282->15283 15283->15281 15283->15282 15285 1d15b0413d3 GetProcessHeap 15283->15285 15286 1d15b04141e lstrlenW GetProcessHeap 15283->15286 15287 1d15b0413f3 GetProcessHeap HeapFree 15283->15287 15288 1d15b041443 StrCpyW 15283->15288 15291 1d15b04152c 15283->15291 15285->15283 15286->15283 15287->15286 15288->15283 15290 1d15b056177 15289->15290 15292 1d15b041546 15291->15292 15295 1d15b04157c 15291->15295 15293 1d15b041565 StrCmpW 15292->15293 15294 1d15b04155d StrCmpIW 15292->15294 15292->15295 15293->15292 15294->15292 15295->15283

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                              • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                              • API String ID: 106492572-2879589442
                                                              • Opcode ID: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                              • Instruction ID: 453843c826014ee9d4a6b1b80832e57562e63a9a670120dbd6c5dd4b91236827
                                                              • Opcode Fuzzy Hash: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                              • Instruction Fuzzy Hash: B471E936210A10B6EB109FA5F9557DA27B4F7C6B98F401212DE4E47B69EF3CC455CB40

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcessProtectVirtual$HandleModule
                                                              • String ID: wr
                                                              • API String ID: 1092925422-2678910430
                                                              • Opcode ID: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                              • Instruction ID: 09a9871909fb91616313d3dfe72f3358092feacd673046fb11bcacce72f9df50
                                                              • Opcode Fuzzy Hash: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                              • Instruction Fuzzy Hash: CF118E36300740A3EF549BA1F5083AAB2B0F78AB84F04063ADE8903B94EF3DC545CB04

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 59 1d15b045b30-1d15b045b57 60 1d15b045b59-1d15b045b68 59->60 61 1d15b045b6b-1d15b045b76 GetCurrentThreadId 59->61 60->61 62 1d15b045b78-1d15b045b7d 61->62 63 1d15b045b82-1d15b045b89 61->63 66 1d15b045faf-1d15b045fc6 call 1d15b047940 62->66 64 1d15b045b9b-1d15b045baf 63->64 65 1d15b045b8b-1d15b045b96 call 1d15b045960 63->65 69 1d15b045bbe-1d15b045bc4 64->69 65->66 72 1d15b045c95-1d15b045cb6 69->72 73 1d15b045bca-1d15b045bd3 69->73 77 1d15b045e1f-1d15b045e30 call 1d15b0474bf 72->77 78 1d15b045cbc-1d15b045cdc GetThreadContext 72->78 75 1d15b045bd5-1d15b045c18 call 1d15b0485c0 73->75 76 1d15b045c1a-1d15b045c8d call 1d15b044510 call 1d15b0444b0 call 1d15b044470 73->76 88 1d15b045c90 75->88 76->88 92 1d15b045e35-1d15b045e3b 77->92 81 1d15b045ce2-1d15b045d03 78->81 82 1d15b045e1a 78->82 81->82 91 1d15b045d09-1d15b045d12 81->91 82->77 88->69 94 1d15b045d92-1d15b045da3 91->94 95 1d15b045d14-1d15b045d25 91->95 96 1d15b045e41-1d15b045e98 VirtualProtect FlushInstructionCache 92->96 97 1d15b045efe-1d15b045f0e 92->97 106 1d15b045e15 94->106 107 1d15b045da5-1d15b045dc3 94->107 102 1d15b045d27-1d15b045d3c 95->102 103 1d15b045d8d 95->103 104 1d15b045ec9-1d15b045ef9 call 1d15b0478ac 96->104 105 1d15b045e9a-1d15b045ea4 96->105 100 1d15b045f1e-1d15b045f2a call 1d15b044df0 97->100 101 1d15b045f10-1d15b045f17 97->101 121 1d15b045f2f-1d15b045f35 100->121 101->100 110 1d15b045f19 call 1d15b0443e0 101->110 102->103 112 1d15b045d3e-1d15b045d88 call 1d15b043970 SetThreadContext 102->112 103->106 104->92 105->104 113 1d15b045ea6-1d15b045ec1 call 1d15b044390 105->113 107->106 108 1d15b045dc5-1d15b045e10 call 1d15b043900 call 1d15b0474dd 107->108 108->106 110->100 112->103 113->104 125 1d15b045f77-1d15b045f95 121->125 126 1d15b045f37-1d15b045f75 ResumeThread call 1d15b0478ac 121->126 128 1d15b045f97-1d15b045fa6 125->128 129 1d15b045fa9 125->129 126->121 128->129 129->66
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: Thread$Current$Context
                                                              • String ID:
                                                              • API String ID: 1666949209-0
                                                              • Opcode ID: aba7c51250b0bd2785b454d2868164715ffdc60c22b63475f1bba81942d6465a
                                                              • Instruction ID: 9b023f872805ecaba43b1b218ad38660bce20da88bab6f021ba470494500eab3
                                                              • Opcode Fuzzy Hash: aba7c51250b0bd2785b454d2868164715ffdc60c22b63475f1bba81942d6465a
                                                              • Instruction Fuzzy Hash: C6D18776208B88A6DA709B4AF59439A77B0F7C9B84F100617EA8D87BA5DF7CC541CF40

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 131 1d15b0450d0-1d15b0450fc 132 1d15b04510d-1d15b045116 131->132 133 1d15b0450fe-1d15b045106 131->133 134 1d15b045127-1d15b045130 132->134 135 1d15b045118-1d15b045120 132->135 133->132 136 1d15b045141-1d15b04514a 134->136 137 1d15b045132-1d15b04513a 134->137 135->134 138 1d15b045156-1d15b045161 GetCurrentThreadId 136->138 139 1d15b04514c-1d15b045151 136->139 137->136 141 1d15b045163-1d15b045168 138->141 142 1d15b04516d-1d15b045174 138->142 140 1d15b0456d3-1d15b0456da 139->140 141->140 143 1d15b045176-1d15b04517c 142->143 144 1d15b045181-1d15b04518a 142->144 143->140 145 1d15b045196-1d15b0451a2 144->145 146 1d15b04518c-1d15b045191 144->146 147 1d15b0451a4-1d15b0451c9 145->147 148 1d15b0451ce-1d15b045225 call 1d15b0456e0 * 2 145->148 146->140 147->140 153 1d15b045227-1d15b04522e 148->153 154 1d15b04523a-1d15b045243 148->154 157 1d15b045236 153->157 158 1d15b045230 153->158 155 1d15b045255-1d15b04525e 154->155 156 1d15b045245-1d15b045252 154->156 159 1d15b045273-1d15b045298 call 1d15b047870 155->159 160 1d15b045260-1d15b045270 155->160 156->155 157->154 162 1d15b0452a6-1d15b0452aa 157->162 161 1d15b0452b0-1d15b0452b6 158->161 170 1d15b04532d-1d15b045342 call 1d15b043cc0 159->170 171 1d15b04529e 159->171 160->159 164 1d15b0452e5-1d15b0452eb 161->164 165 1d15b0452b8-1d15b0452d4 call 1d15b044390 161->165 162->161 168 1d15b045315-1d15b045328 164->168 169 1d15b0452ed-1d15b04530c call 1d15b0478ac 164->169 165->164 174 1d15b0452d6-1d15b0452de 165->174 168->140 169->168 178 1d15b045351-1d15b04535a 170->178 179 1d15b045344-1d15b04534c 170->179 171->162 174->164 180 1d15b04536c-1d15b0453ba call 1d15b048c60 178->180 181 1d15b04535c-1d15b045369 178->181 179->162 184 1d15b0453c2-1d15b0453ca 180->184 181->180 185 1d15b0454d7-1d15b0454df 184->185 186 1d15b0453d0-1d15b0454bb call 1d15b047440 184->186 187 1d15b0454e1-1d15b0454f4 call 1d15b044590 185->187 188 1d15b045523-1d15b04552b 185->188 198 1d15b0454bd 186->198 199 1d15b0454bf-1d15b0454ce call 1d15b044060 186->199 200 1d15b0454f6 187->200 201 1d15b0454f8-1d15b045521 187->201 191 1d15b045537-1d15b045546 188->191 192 1d15b04552d-1d15b045535 188->192 196 1d15b045548 191->196 197 1d15b04554f 191->197 192->191 195 1d15b045554-1d15b045561 192->195 203 1d15b045563 195->203 204 1d15b045564-1d15b0455b9 call 1d15b0485c0 195->204 196->197 197->195 198->185 208 1d15b0454d2 199->208 209 1d15b0454d0 199->209 200->188 201->185 203->204 210 1d15b0455c8-1d15b045661 call 1d15b044510 call 1d15b044470 VirtualProtect 204->210 211 1d15b0455bb-1d15b0455c3 204->211 208->184 209->185 216 1d15b045671-1d15b0456d1 210->216 217 1d15b045663-1d15b045668 GetLastError 210->217 216->140 217->216
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: CurrentThread
                                                              • String ID:
                                                              • API String ID: 2882836952-0
                                                              • Opcode ID: a9eeae0eee8a65d3360f20c0190c6c2044be682fe56af66e10426f66e33a6bd7
                                                              • Instruction ID: da1cee91b76316671709d0c2ddac76896230337d1aa948a32c7c28ce66da79ac
                                                              • Opcode Fuzzy Hash: a9eeae0eee8a65d3360f20c0190c6c2044be682fe56af66e10426f66e33a6bd7
                                                              • Instruction Fuzzy Hash: CA02BB32619B84A6EB60CB95F59039AB7B0F3C6794F105516EA8E87BA9DF7CC444CF00

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: Virtual$AllocQuery
                                                              • String ID:
                                                              • API String ID: 31662377-0
                                                              • Opcode ID: ad31f8c641c3994e4c662b42b06090e17ab0b09933d29211a4965d6dca603ca4
                                                              • Instruction ID: ce5e2d355a247ae9cd240daf42ee24941c63a16161df7f87918a567be0b6b48d
                                                              • Opcode Fuzzy Hash: ad31f8c641c3994e4c662b42b06090e17ab0b09933d29211a4965d6dca603ca4
                                                              • Instruction Fuzzy Hash: 25311E32219A84B1EA30DA95F15539EA6B0F3CA784F101776F6CE46BA8DF7CC5948F04

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                              • String ID:
                                                              • API String ID: 1683269324-0
                                                              • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                              • Instruction ID: 22544b8be529a5e8a95904585740c79996de017cecdbbc7f9568830ed788161b
                                                              • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                              • Instruction Fuzzy Hash: 20119270614641B2FB609BE1FB093DA23B4BBD7746F60633BA946825D1EF7CC4588E10

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: CacheCurrentFlushInstructionProcessProtectVirtual
                                                              • String ID:
                                                              • API String ID: 3733156554-0
                                                              • Opcode ID: efc513032ac2f8104d68ff6d1779eae6f51007478eb3e1ac0120cc0a77f626c8
                                                              • Instruction ID: 4934cd98a60dfd5feda394540bd5bea279a0c3649f9ce5edad0d1af88ecc479f
                                                              • Opcode Fuzzy Hash: efc513032ac2f8104d68ff6d1779eae6f51007478eb3e1ac0120cc0a77f626c8
                                                              • Instruction Fuzzy Hash: 54F01D36218A04A0D6709B82F6403AA6BB0F3C97D4F140212FA8E43B69DF3CC6808F40

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 265 1d15b01273c-1d15b0127a4 call 1d15b0129d4 * 4 274 1d15b0129b2 265->274 275 1d15b0127aa-1d15b0127ad 265->275 276 1d15b0129b4-1d15b0129d0 274->276 275->274 277 1d15b0127b3-1d15b0127b6 275->277 277->274 278 1d15b0127bc-1d15b0127bf 277->278 278->274 279 1d15b0127c5-1d15b0127e6 VirtualAlloc 278->279 279->274 280 1d15b0127ec-1d15b01280c 279->280 281 1d15b012838-1d15b01283f 280->281 282 1d15b01280e-1d15b012836 280->282 283 1d15b012845-1d15b012852 281->283 284 1d15b0128df-1d15b0128e6 281->284 282->281 282->282 283->284 287 1d15b012858-1d15b01286a LoadLibraryA 283->287 285 1d15b012992-1d15b0129b0 284->285 286 1d15b0128ec-1d15b012901 284->286 285->276 286->285 288 1d15b012907 286->288 289 1d15b0128ca-1d15b0128d2 287->289 290 1d15b01286c-1d15b012878 287->290 291 1d15b01290d-1d15b012921 288->291 289->287 293 1d15b0128d4-1d15b0128d9 289->293 292 1d15b0128c5-1d15b0128c8 290->292 295 1d15b012982-1d15b01298c 291->295 296 1d15b012923-1d15b012934 291->296 292->289 297 1d15b01287a-1d15b01287d 292->297 293->284 295->285 295->291 299 1d15b012936-1d15b01293d 296->299 300 1d15b01293f-1d15b012943 296->300 301 1d15b0128a7-1d15b0128b7 297->301 302 1d15b01287f-1d15b0128a5 297->302 303 1d15b012970-1d15b012980 299->303 304 1d15b012945-1d15b01294b 300->304 305 1d15b01294d-1d15b012951 300->305 306 1d15b0128ba-1d15b0128c1 301->306 302->306 303->295 303->296 304->303 307 1d15b012963-1d15b012967 305->307 308 1d15b012953-1d15b012961 305->308 306->292 307->303 310 1d15b012969-1d15b01296c 307->310 308->303 310->303
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443608691.000001D15B010000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B010000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b010000_dwm.jbxd
                                                              Similarity
                                                              • API ID: AllocLibraryLoadVirtual
                                                              • String ID:
                                                              • API String ID: 3550616410-0
                                                              • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                              • Instruction ID: 55679c72331ed3e7bab0be7cb74d28a35aaaa4e86c910775603edd0d527ff162
                                                              • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                              • Instruction Fuzzy Hash: 80612932B01694A7DB58CF99EA007AD73B2F795B94F548226DE59077C4DE3CD852CB00

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 000001D15B041628: GetProcessHeap.KERNEL32 ref: 000001D15B041633
                                                                • Part of subcall function 000001D15B041628: HeapAlloc.KERNEL32 ref: 000001D15B041642
                                                                • Part of subcall function 000001D15B041628: RegOpenKeyExW.ADVAPI32 ref: 000001D15B0416B2
                                                                • Part of subcall function 000001D15B041628: RegOpenKeyExW.ADVAPI32 ref: 000001D15B0416DF
                                                                • Part of subcall function 000001D15B041628: RegCloseKey.ADVAPI32 ref: 000001D15B0416F9
                                                                • Part of subcall function 000001D15B041628: RegOpenKeyExW.ADVAPI32 ref: 000001D15B041719
                                                                • Part of subcall function 000001D15B041628: RegCloseKey.ADVAPI32 ref: 000001D15B041734
                                                                • Part of subcall function 000001D15B041628: RegOpenKeyExW.ADVAPI32 ref: 000001D15B041754
                                                                • Part of subcall function 000001D15B041628: RegCloseKey.ADVAPI32 ref: 000001D15B04176F
                                                                • Part of subcall function 000001D15B041628: RegOpenKeyExW.ADVAPI32 ref: 000001D15B04178F
                                                                • Part of subcall function 000001D15B041628: RegCloseKey.ADVAPI32 ref: 000001D15B0417AA
                                                                • Part of subcall function 000001D15B041628: RegOpenKeyExW.ADVAPI32 ref: 000001D15B0417CA
                                                              • Sleep.KERNEL32 ref: 000001D15B041AD7
                                                              • SleepEx.KERNELBASE ref: 000001D15B041ADD
                                                                • Part of subcall function 000001D15B041628: RegCloseKey.ADVAPI32 ref: 000001D15B0417E5
                                                                • Part of subcall function 000001D15B041628: RegOpenKeyExW.ADVAPI32 ref: 000001D15B041805
                                                                • Part of subcall function 000001D15B041628: RegCloseKey.ADVAPI32 ref: 000001D15B041820
                                                                • Part of subcall function 000001D15B041628: RegOpenKeyExW.ADVAPI32 ref: 000001D15B041840
                                                                • Part of subcall function 000001D15B041628: RegCloseKey.ADVAPI32 ref: 000001D15B04185B
                                                                • Part of subcall function 000001D15B041628: RegOpenKeyExW.ADVAPI32 ref: 000001D15B04187B
                                                                • Part of subcall function 000001D15B041628: RegCloseKey.ADVAPI32 ref: 000001D15B041896
                                                                • Part of subcall function 000001D15B041628: RegCloseKey.ADVAPI32 ref: 000001D15B0418A0
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: CloseOpen$HeapSleep$AllocProcess
                                                              • String ID:
                                                              • API String ID: 1534210851-0
                                                              • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                              • Instruction ID: fea29bda833cbf6feecde1edf61a05fd6ff1c728ed5deaf4c81c3ae280df4bee
                                                              • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                              • Instruction Fuzzy Hash: 69311EB1210641B1FF509BA6FB413E927B4FBC6FD0F2456239E0987695FE6CC851CA50

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 573 1d15b042b2c-1d15b042ba5 call 1d15b062ce0 576 1d15b042ee0-1d15b042f03 573->576 577 1d15b042bab-1d15b042bb1 573->577 577->576 578 1d15b042bb7-1d15b042bba 577->578 578->576 579 1d15b042bc0-1d15b042bc3 578->579 579->576 580 1d15b042bc9-1d15b042bd9 GetModuleHandleA 579->580 581 1d15b042bed 580->581 582 1d15b042bdb-1d15b042beb call 1d15b056090 580->582 584 1d15b042bf0-1d15b042c0e 581->584 582->584 584->576 587 1d15b042c14-1d15b042c33 StrCmpNIW 584->587 587->576 588 1d15b042c39-1d15b042c3d 587->588 588->576 589 1d15b042c43-1d15b042c4d 588->589 589->576 590 1d15b042c53-1d15b042c5a 589->590 590->576 591 1d15b042c60-1d15b042c73 590->591 592 1d15b042c75-1d15b042c81 591->592 593 1d15b042c83 591->593 594 1d15b042c86-1d15b042c8a 592->594 593->594 595 1d15b042c9a 594->595 596 1d15b042c8c-1d15b042c98 594->596 597 1d15b042c9d-1d15b042ca7 595->597 596->597 598 1d15b042d9d-1d15b042da1 597->598 599 1d15b042cad-1d15b042cb0 597->599 600 1d15b042da7-1d15b042daa 598->600 601 1d15b042ed2-1d15b042eda 598->601 602 1d15b042cc2-1d15b042ccc 599->602 603 1d15b042cb2-1d15b042cbf call 1d15b04199c 599->603 606 1d15b042dbb-1d15b042dc5 600->606 607 1d15b042dac-1d15b042db8 call 1d15b04199c 600->607 601->576 601->591 604 1d15b042cce-1d15b042cdb 602->604 605 1d15b042d00-1d15b042d0a 602->605 603->602 604->605 610 1d15b042cdd-1d15b042cea 604->610 611 1d15b042d3a-1d15b042d3d 605->611 612 1d15b042d0c-1d15b042d19 605->612 614 1d15b042df5-1d15b042df8 606->614 615 1d15b042dc7-1d15b042dd4 606->615 607->606 618 1d15b042ced-1d15b042cf3 610->618 620 1d15b042d3f-1d15b042d49 call 1d15b041bbc 611->620 621 1d15b042d4b-1d15b042d58 lstrlenW 611->621 612->611 619 1d15b042d1b-1d15b042d28 612->619 616 1d15b042e05-1d15b042e12 lstrlenW 614->616 617 1d15b042dfa-1d15b042e03 call 1d15b041bbc 614->617 615->614 623 1d15b042dd6-1d15b042de3 615->623 630 1d15b042e35-1d15b042e3f call 1d15b043844 616->630 631 1d15b042e14-1d15b042e1e 616->631 617->616 636 1d15b042e4a-1d15b042e55 617->636 628 1d15b042d93-1d15b042d98 618->628 629 1d15b042cf9-1d15b042cfe 618->629 632 1d15b042d2b-1d15b042d31 619->632 620->621 620->628 624 1d15b042d5a-1d15b042d64 621->624 625 1d15b042d7b-1d15b042d8d call 1d15b043844 621->625 626 1d15b042de6-1d15b042dec 623->626 624->625 634 1d15b042d66-1d15b042d79 call 1d15b04152c 624->634 625->628 639 1d15b042e42-1d15b042e44 625->639 635 1d15b042dee-1d15b042df3 626->635 626->636 628->639 629->605 629->618 630->639 631->630 640 1d15b042e20-1d15b042e33 call 1d15b04152c 631->640 632->628 641 1d15b042d33-1d15b042d38 632->641 634->625 634->628 635->614 635->626 644 1d15b042e57-1d15b042e5b 636->644 645 1d15b042ecc-1d15b042ed0 636->645 639->601 639->636 640->630 640->636 641->611 641->632 650 1d15b042e63-1d15b042e7d call 1d15b0485c0 644->650 651 1d15b042e5d-1d15b042e61 644->651 645->601 654 1d15b042e80-1d15b042e83 650->654 651->650 651->654 657 1d15b042e85-1d15b042ea3 call 1d15b0485c0 654->657 658 1d15b042ea6-1d15b042ea9 654->658 657->658 658->645 660 1d15b042eab-1d15b042ec9 call 1d15b0485c0 658->660 660->645
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                              • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                              • API String ID: 2119608203-3850299575
                                                              • Opcode ID: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                              • Instruction ID: c3f45f54cfe0e6efe55a1f18bcb72a9f2d9a57496c34c3394087bd1612bcbc7c
                                                              • Opcode Fuzzy Hash: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                              • Instruction Fuzzy Hash: 25B17F72320A50B2EB549FA6E6407E963B5FB86B94F545217EE0A53B94DF3CCC84CB40
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 3140674995-0
                                                              • Opcode ID: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                              • Instruction ID: a34cf7e0d496b590cbfd30a297da93d07b58e5048821cf8556a3df1515db0795
                                                              • Opcode Fuzzy Hash: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                              • Instruction Fuzzy Hash: BE316F72205B80AAEB609FA0F9403EE7370F786744F44462ADA4E57B94EF3CC548CB10
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 1239891234-0
                                                              • Opcode ID: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                              • Instruction ID: eb2f7c0e75e15c37d588947af3a4c728285934d8ab349f98802041ec9af97f6a
                                                              • Opcode Fuzzy Hash: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                              • Instruction Fuzzy Hash: 9C314C32214B80A6EB609F65E9413EE73B4F7CA794F500226EA9D43B95DF3CC546CB00

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                              • String ID: d
                                                              • API String ID: 2005889112-2564639436
                                                              • Opcode ID: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                              • Instruction ID: c3a5b493701ebe3be855de449fbcfcac54c230e3a369df843498cc9476486bd5
                                                              • Opcode Fuzzy Hash: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                              • Instruction Fuzzy Hash: 24513E36604B84A6EB54CFA2F6483AA77B1F7CAF95F544225DA4907B68DF3CC045CB00

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: CurrentThread$AddressHandleModuleProc
                                                              • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                              • API String ID: 4175298099-1975688563
                                                              • Opcode ID: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                              • Instruction ID: 847c38b232b83622efb6ab40ef388ee6e63c0594573860f4b8bb776333f38959
                                                              • Opcode Fuzzy Hash: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                              • Instruction Fuzzy Hash: 7931827421094AB1FA04EFE5FA52BD46731BBC6394F905313984A029A6AF7C868ECF50

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 415 1d15b016910-1d15b016916 416 1d15b016951-1d15b01695b 415->416 417 1d15b016918-1d15b01691b 415->417 420 1d15b016a78-1d15b016a8d 416->420 418 1d15b016945-1d15b016984 call 1d15b016fc0 417->418 419 1d15b01691d-1d15b016920 417->419 435 1d15b016a52 418->435 436 1d15b01698a-1d15b01699f call 1d15b016e54 418->436 421 1d15b016922-1d15b016925 419->421 422 1d15b016938 __scrt_dllmain_crt_thread_attach 419->422 423 1d15b016a9c-1d15b016ab6 call 1d15b016e54 420->423 424 1d15b016a8f 420->424 426 1d15b016931-1d15b016936 call 1d15b016f04 421->426 427 1d15b016927-1d15b016930 421->427 430 1d15b01693d-1d15b016944 422->430 438 1d15b016ab8-1d15b016aed call 1d15b016f7c call 1d15b016e1c call 1d15b017318 call 1d15b017130 call 1d15b017154 call 1d15b016fac 423->438 439 1d15b016aef-1d15b016b20 call 1d15b017190 423->439 428 1d15b016a91-1d15b016a9b 424->428 426->430 440 1d15b016a54-1d15b016a69 435->440 447 1d15b0169a5-1d15b0169b6 call 1d15b016ec4 436->447 448 1d15b016a6a-1d15b016a77 call 1d15b017190 436->448 438->428 449 1d15b016b22-1d15b016b28 439->449 450 1d15b016b31-1d15b016b37 439->450 467 1d15b0169b8-1d15b0169dc call 1d15b0172dc call 1d15b016e0c call 1d15b016e38 call 1d15b01ac0c 447->467 468 1d15b016a07-1d15b016a11 call 1d15b017130 447->468 448->420 449->450 454 1d15b016b2a-1d15b016b2c 449->454 455 1d15b016b39-1d15b016b43 450->455 456 1d15b016b7e-1d15b016b94 call 1d15b01268c 450->456 461 1d15b016c1f-1d15b016c2c 454->461 462 1d15b016b45-1d15b016b4d 455->462 463 1d15b016b4f-1d15b016b5d call 1d15b025780 455->463 476 1d15b016b96-1d15b016b98 456->476 477 1d15b016bcc-1d15b016bce 456->477 470 1d15b016b63-1d15b016b78 call 1d15b016910 462->470 463->470 480 1d15b016c15-1d15b016c1d 463->480 467->468 518 1d15b0169de-1d15b0169e5 __scrt_dllmain_after_initialize_c 467->518 468->435 488 1d15b016a13-1d15b016a1f call 1d15b017180 468->488 470->456 470->480 476->477 485 1d15b016b9a-1d15b016bbc call 1d15b01268c call 1d15b016a78 476->485 478 1d15b016bd5-1d15b016bea call 1d15b016910 477->478 479 1d15b016bd0-1d15b016bd3 477->479 478->480 497 1d15b016bec-1d15b016bf6 478->497 479->478 479->480 480->461 485->477 512 1d15b016bbe-1d15b016bc6 call 1d15b025780 485->512 505 1d15b016a21-1d15b016a2b call 1d15b017098 488->505 506 1d15b016a45-1d15b016a50 488->506 502 1d15b016c01-1d15b016c11 call 1d15b025780 497->502 503 1d15b016bf8-1d15b016bff 497->503 502->480 503->480 505->506 517 1d15b016a2d-1d15b016a3b 505->517 506->440 512->477 517->506 518->468 519 1d15b0169e7-1d15b016a04 call 1d15b01abc8 518->519 519->468
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443608691.000001D15B010000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B010000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b010000_dwm.jbxd
                                                              Similarity
                                                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                              • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                                                              • API String ID: 190073905-1786718095
                                                              • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction ID: 0f92f31a59dc00eaf722c44483f8f73cd2cc03c828f1b8628713d74c64339858
                                                              • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction Fuzzy Hash: 9481AE71701241B6FA58ABE5FE413EA62B1BBC7780F588727AA0547796EF3DC8458F00

                                                              Control-flow Graph

                                                              APIs
                                                              • GetLastError.KERNEL32 ref: 000001D15B04CE37
                                                              • FlsGetValue.KERNEL32(?,?,?,000001D15B050A6B,?,?,?,000001D15B05045C,?,?,?,000001D15B04C84F), ref: 000001D15B04CE4C
                                                              • FlsSetValue.KERNEL32(?,?,?,000001D15B050A6B,?,?,?,000001D15B05045C,?,?,?,000001D15B04C84F), ref: 000001D15B04CE6D
                                                              • FlsSetValue.KERNEL32(?,?,?,000001D15B050A6B,?,?,?,000001D15B05045C,?,?,?,000001D15B04C84F), ref: 000001D15B04CE9A
                                                              • FlsSetValue.KERNEL32(?,?,?,000001D15B050A6B,?,?,?,000001D15B05045C,?,?,?,000001D15B04C84F), ref: 000001D15B04CEAB
                                                              • FlsSetValue.KERNEL32(?,?,?,000001D15B050A6B,?,?,?,000001D15B05045C,?,?,?,000001D15B04C84F), ref: 000001D15B04CEBC
                                                              • SetLastError.KERNEL32 ref: 000001D15B04CED7
                                                              • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,000001D15B050A6B,?,?,?,000001D15B05045C,?,?,?,000001D15B04C84F), ref: 000001D15B04CF0D
                                                              • FlsSetValue.KERNEL32(?,?,00000001,000001D15B04ECCC,?,?,?,?,000001D15B04BF9F,?,?,?,?,?,000001D15B047AB0), ref: 000001D15B04CF2C
                                                                • Part of subcall function 000001D15B04D6CC: HeapAlloc.KERNEL32 ref: 000001D15B04D721
                                                              • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000001D15B050A6B,?,?,?,000001D15B05045C,?,?,?,000001D15B04C84F), ref: 000001D15B04CF54
                                                                • Part of subcall function 000001D15B04D744: HeapFree.KERNEL32 ref: 000001D15B04D75A
                                                                • Part of subcall function 000001D15B04D744: GetLastError.KERNEL32 ref: 000001D15B04D764
                                                              • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000001D15B050A6B,?,?,?,000001D15B05045C,?,?,?,000001D15B04C84F), ref: 000001D15B04CF65
                                                              • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,000001D15B050A6B,?,?,?,000001D15B05045C,?,?,?,000001D15B04C84F), ref: 000001D15B04CF76
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorLast$Heap$AllocFree
                                                              • String ID:
                                                              • API String ID: 570795689-0
                                                              • Opcode ID: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                              • Instruction ID: f4e4c5d8a9473628a33d2f5077bad01fe2aff28fa31526ffdc9f22cb9663eb6f
                                                              • Opcode Fuzzy Hash: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                              • Instruction Fuzzy Hash: 76416E3030174476FE78A7F177563E922727BC77B4F244726A93A466E6EE6CC4118E00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                              • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                              • API String ID: 2171963597-1373409510
                                                              • Opcode ID: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                              • Instruction ID: 1814f6f17bd4eb66c9f2dddb447243add5568939834a825ba936ce2150b15ff5
                                                              • Opcode Fuzzy Hash: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                              • Instruction Fuzzy Hash: D9213A36614A40A2EB10CB65F6447AA77B0F7CABA5F500316EA5903AE8DF3CC149CF00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443608691.000001D15B010000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B010000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b010000_dwm.jbxd
                                                              Similarity
                                                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                              • String ID: csm$csm$csm
                                                              • API String ID: 849930591-393685449
                                                              • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                              • Instruction ID: b53b4730d465f63d2a7def7e89c16d69a2edfaff4366ff9ac57791692d03caa6
                                                              • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                              • Instruction Fuzzy Hash: 35E18172605740BAEF68DFA5EA803DD77B4F786B98F500216EE8957B55CB38C192CB00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                              • String ID: csm$csm$csm
                                                              • API String ID: 849930591-393685449
                                                              • Opcode ID: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                              • Instruction ID: 17998792467375abc9129f657349386c6784c676afe6f45b0ab8792e5e6f4a6e
                                                              • Opcode Fuzzy Hash: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                              • Instruction Fuzzy Hash: 6BE17D72604B90BAEB60DFA5E6803DD77B4F796798F100216EE8957B99CB3CC591CB00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeLibraryProc
                                                              • String ID: api-ms-$ext-ms-
                                                              • API String ID: 3013587201-537541572
                                                              • Opcode ID: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                              • Instruction ID: 3b4d740a519865691dfe855b5d6464f370dee77d0199f89936172b489e873010
                                                              • Opcode Fuzzy Hash: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                              • Instruction Fuzzy Hash: 0741A332311A00B1FA56CBE6BA447D623B5B7CABE0F1957279D0E97794EE3CC4458B10
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                              • String ID: d
                                                              • API String ID: 3743429067-2564639436
                                                              • Opcode ID: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                              • Instruction ID: 372c0fc510a34042df3b78ae393c332b75fef1e6576bf3f42cee1a02985385ae
                                                              • Opcode Fuzzy Hash: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                              • Instruction Fuzzy Hash: A9414F73214B84E6E760CF61E54479A77B1F38AB98F54822ADA8A07B68DF3CC545CB40
                                                              APIs
                                                              • FlsGetValue.KERNEL32(?,?,?,000001D15B04C7DE,?,?,?,?,?,?,?,?,000001D15B04CF9D,?,?,00000001), ref: 000001D15B04D087
                                                              • FlsSetValue.KERNEL32(?,?,?,000001D15B04C7DE,?,?,?,?,?,?,?,?,000001D15B04CF9D,?,?,00000001), ref: 000001D15B04D0A6
                                                              • FlsSetValue.KERNEL32(?,?,?,000001D15B04C7DE,?,?,?,?,?,?,?,?,000001D15B04CF9D,?,?,00000001), ref: 000001D15B04D0CE
                                                              • FlsSetValue.KERNEL32(?,?,?,000001D15B04C7DE,?,?,?,?,?,?,?,?,000001D15B04CF9D,?,?,00000001), ref: 000001D15B04D0DF
                                                              • FlsSetValue.KERNEL32(?,?,?,000001D15B04C7DE,?,?,?,?,?,?,?,?,000001D15B04CF9D,?,?,00000001), ref: 000001D15B04D0F0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID: 1%$Y%
                                                              • API String ID: 3702945584-1395475152
                                                              • Opcode ID: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                              • Instruction ID: aaa40cc3dae03fe42047bf22d2dee8f6eb8b998fca8c59d9ce6efb97ee1b705c
                                                              • Opcode Fuzzy Hash: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                              • Instruction Fuzzy Hash: 93117C3070464475FE68A7A57B533EA61617BC77F0F245327A939476EADE6CC8038E00
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                              • String ID:
                                                              • API String ID: 190073905-0
                                                              • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction ID: 7ef64722bd0dc5fb4b9f500cacf65c22ac5721653966aa96bf1b5e2c7589d070
                                                              • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction Fuzzy Hash: E881D470600241BAFB55ABE5B7413F922B1BBC7B80F54872BAA08877D6DB7CC9458F00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: Library$Load$AddressErrorFreeLastProc
                                                              • String ID: api-ms-
                                                              • API String ID: 2559590344-2084034818
                                                              • Opcode ID: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                              • Instruction ID: 6542dcfbc63717f96d7d63913bac547d86f1b1a7744658e0e453bbadd4220068
                                                              • Opcode Fuzzy Hash: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                              • Instruction Fuzzy Hash: CA318331312A40F9EE61DB83B6407E562B4B78ABA0F590B369D1E4B795EF3DC4458B10
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                              • String ID: CONOUT$
                                                              • API String ID: 3230265001-3130406586
                                                              • Opcode ID: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                              • Instruction ID: ef750de1a3247c2b990a38252a26ec16a1a500887a1a57f35be73e00687f7190
                                                              • Opcode Fuzzy Hash: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                              • Instruction Fuzzy Hash: DD118231710B40A6E7508B92F94435976B0F7CAFE4F144316EA5A87BE4CF7CC5548B44
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$AllocFree
                                                              • String ID: dialer
                                                              • API String ID: 756756679-3528709123
                                                              • Opcode ID: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                              • Instruction ID: 470472a3f7cd5d0495c0947c9801221add11dfc7a548ebf5f89e7b2cb495ddd3
                                                              • Opcode Fuzzy Hash: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                              • Instruction Fuzzy Hash: 3E319032711B51B2EB55DF96F6407A977B0FB86B84F4842329E4847B65EF3CD4A18B00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$Free
                                                              • String ID: C:\Windows\system32\dwm.exe
                                                              • API String ID: 3168794593-3609004125
                                                              • Opcode ID: d27b9b8ca154d9eedff1e610dfbacc8608a6d25d7c3fe3b6d17278c798082fda
                                                              • Instruction ID: dabdbcab862d5c823847bb9f1a36c8033248665f108b1bacb787cf94f28979d4
                                                              • Opcode Fuzzy Hash: d27b9b8ca154d9eedff1e610dfbacc8608a6d25d7c3fe3b6d17278c798082fda
                                                              • Instruction Fuzzy Hash: D321CE7B509AD0BAE250DBA5BA553E937B0F7CAB44F0D4117DB4583BA3DA2CC8048B04
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorLast
                                                              • String ID:
                                                              • API String ID: 2506987500-0
                                                              • Opcode ID: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                              • Instruction ID: 6c26d7327e980a861b3c673c3d551bd8f8f308b2d161f0646f62ba0765a90d2e
                                                              • Opcode Fuzzy Hash: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                              • Instruction Fuzzy Hash: 37116D3030464475FE64A7B177463E922727BC77B4F244727A936477EADE6CC8028E00
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                              • String ID:
                                                              • API String ID: 517849248-0
                                                              • Opcode ID: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                              • Instruction ID: 4c96f278e092e0b0f794ec832aa575c1f647d4affd0ad6e980a144d8dc4d615a
                                                              • Opcode Fuzzy Hash: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                              • Instruction Fuzzy Hash: EF016D31300A40A2EB50DB92B55839963B1FBC9BC4F584176DE4A43BA4DF3CC549CB00
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                              • String ID:
                                                              • API String ID: 449555515-0
                                                              • Opcode ID: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                              • Instruction ID: 40e51d0f4e9512fbc0a718f310f1a3067eebee3720eb786dbb6ef4ec6dc5c18b
                                                              • Opcode Fuzzy Hash: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                              • Instruction Fuzzy Hash: B6012D75311B40B2FB249BA2FA0839673B0BB86B96F144626CD4907BA5EF3DC5588B10
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 2395640692-629598281
                                                              • Opcode ID: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                                                              • Instruction ID: 3fee21bba9d3fe2bfa8deb657e831f747f53e45e90f46698b57da63f8244e478
                                                              • Opcode Fuzzy Hash: 255e8a15c903f04b3fededc0bb6945c1536f1eb34c4f108c78a5ad073a1a53ec
                                                              • Instruction Fuzzy Hash: 3851A032601600BEEF54DB95FA48B9937B5F387B88F108636DA16477A8DB3DD841CB00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: FinalHandleNamePathlstrlen
                                                              • String ID: \\?\
                                                              • API String ID: 2719912262-4282027825
                                                              • Opcode ID: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                              • Instruction ID: a9b1f993bb0293b32e3b46a0da01bbb9d5a4d3da55de9a8386228187a2bfec33
                                                              • Opcode Fuzzy Hash: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                              • Instruction Fuzzy Hash: EEF04F32304641B2EB608BA1FA9479A6771FB89BC8F944222DA4946994DF3CC68DCF00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: CombinePath
                                                              • String ID: \\.\pipe\
                                                              • API String ID: 3422762182-91387939
                                                              • Opcode ID: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                              • Instruction ID: 8de4b29a83fd7d82f2757d8ceb37c35c38af776b9c637d1fa30d62fbef3d41a5
                                                              • Opcode Fuzzy Hash: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                              • Instruction Fuzzy Hash: C1F0FE74714B84B2EB549B92BA142996671BB8AFD0F445232EE4647B99DE3CC445CB00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                              • String ID: CorExitProcess$mscoree.dll
                                                              • API String ID: 4061214504-1276376045
                                                              • Opcode ID: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                              • Instruction ID: 0feca59dc5012b5cd855235799a9d2ce8aef14da6f8a5b0d5747376c96c0ed5f
                                                              • Opcode Fuzzy Hash: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                              • Instruction Fuzzy Hash: E0F09071311B04B1EB109FA4F9843AA6331FBCABA1F54031BDA6A46AE4DF3DC048CB00
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: CurrentThread
                                                              • String ID:
                                                              • API String ID: 2882836952-0
                                                              • Opcode ID: 0c7f3a11ae4e5ff47235e902b7b6ce7055ed727b420134bb2449cab27e882fd8
                                                              • Instruction ID: d0d8aac31dab52b84cafc33b616324b7f1738be150fbe118ae97fb46216a54bb
                                                              • Opcode Fuzzy Hash: 0c7f3a11ae4e5ff47235e902b7b6ce7055ed727b420134bb2449cab27e882fd8
                                                              • Instruction Fuzzy Hash: 5B61C936519B44E6EB608F95F64035AB7B0F7C9784F20521AEA8D87BA8DBBCC444CF00
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443608691.000001D15B010000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B010000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b010000_dwm.jbxd
                                                              Similarity
                                                              • API ID: _set_statfp
                                                              • String ID:
                                                              • API String ID: 1156100317-0
                                                              • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction ID: 30584bc57789e6ee81416ff34d8a95e2d7b77e77304d0cfcf3086ea6b74576e2
                                                              • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction Fuzzy Hash: AE11A732610A2139FA5415E8F7523E9D1A07BDB3B4F98472BA96E063D6CB2CC88D4E00
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: _set_statfp
                                                              • String ID:
                                                              • API String ID: 1156100317-0
                                                              • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction ID: 87c04dc855c83be6cf03c2d5bce00b20f52ab8d45107f2f1f9cfc53284570236
                                                              • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction Fuzzy Hash: 8B115132A10A5131F6E415E8F6573ED1171BBEB3F8F190726A97607EFE9A2CC8414A08
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443608691.000001D15B010000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B010000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b010000_dwm.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID: Tuesday$Wednesday$or copy constructor iterator'
                                                              • API String ID: 3215553584-4202648911
                                                              • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                              • Instruction ID: 4255c40cf4609273125910dc4f725253a0c0094a12a1b1d3e0a6b5997d5294aa
                                                              • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                              • Instruction Fuzzy Hash: 9D619C76600A40B2FA6D9BE9FF443EA6AB1B7C7790F544717DA0A077A5DB3CC8458E00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: CallEncodePointerTranslator
                                                              • String ID: MOC$RCC
                                                              • API String ID: 3544855599-2084237596
                                                              • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction ID: 67b3543c748d2b3be81196d0d9147a1e7aa28ffd8122ffd7290412c99aa1c4c4
                                                              • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction Fuzzy Hash: BE614732600B94AAEB20DFA5E6803DD77B1F389B98F044216EF4917B99DB7CC595CB40
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443608691.000001D15B010000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B010000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b010000_dwm.jbxd
                                                              Similarity
                                                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                              • String ID: csm$csm
                                                              • API String ID: 3896166516-3733052814
                                                              • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction ID: 7438c07df478a27d675d7ffde1f1338b61774b9e45e667ffbb933001aba2f3ff
                                                              • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction Fuzzy Hash: D1516E32100390FAEB688F95AA4439977B0F396B94F184317EAA987BD5CB3CD491CF01
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                              • String ID: csm$csm
                                                              • API String ID: 3896166516-3733052814
                                                              • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction ID: c511c1d56ef009ebeb2e79d06855cd9913738c7efc7b967cda3122ace8f4b95b
                                                              • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction Fuzzy Hash: 87517D72100690BAEB748F96A68439977B0F3D6B95F144317EA9A47BD5CB3CD491CF00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443608691.000001D15B010000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B010000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b010000_dwm.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritable__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 3242871069-629598281
                                                              • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                              • Instruction ID: a65d357b83cb533cf093432d5ab809af4dcfb38c6c0eda6697071d7300313a4c
                                                              • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                              • Instruction Fuzzy Hash: 2351A132701700BBDB18CF55FA44BA937B6F396B98F548226DA0643788FB38CA418F04
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443608691.000001D15B010000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B010000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b010000_dwm.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritable__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 3242871069-629598281
                                                              • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                              • Instruction ID: 935151499f3d542732ff949c3ca27a4128c0367f1ef5e7c9261de7048f993fb3
                                                              • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                              • Instruction Fuzzy Hash: CB316832201740B6E7189F51FA44BA977B5F386B98F558216EE5A07788EF3CCA40CB04
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: FileWrite$ConsoleErrorLastOutput
                                                              • String ID:
                                                              • API String ID: 2718003287-0
                                                              • Opcode ID: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                              • Instruction ID: 549096681085db3ec9784c85d99991bdbb80500f4305d58c37b34a5c93628a8d
                                                              • Opcode Fuzzy Hash: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                              • Instruction Fuzzy Hash: A1D1E032B14A80A9EB11CFA9E6403EC3BB1F796798F144316DE5997FD9DA38D406CB40
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: ConsoleErrorLastMode
                                                              • String ID:
                                                              • API String ID: 953036326-0
                                                              • Opcode ID: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                              • Instruction ID: 7b79d4494b9c56ce8ae86e1994d304fe12ae4d8a6305853edd73f5b12fe13e73
                                                              • Opcode Fuzzy Hash: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                              • Instruction Fuzzy Hash: 1E919072710654B9F7649FA5A6503ED3BB0BB96B88F14420BDE4A67ED5DB3CC482CB00
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                              • String ID:
                                                              • API String ID: 2933794660-0
                                                              • Opcode ID: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                              • Instruction ID: 5b5c35b1175247e5273e9bf437aab90f0a04240741291e3a26e916c0b6d18cd4
                                                              • Opcode Fuzzy Hash: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                              • Instruction Fuzzy Hash: 90111C32710B01AAEF408FA0E9553A833B4F75A758F441E22DA6D86BA4DF7CC1988780
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: FileType
                                                              • String ID: \\.\pipe\
                                                              • API String ID: 3081899298-91387939
                                                              • Opcode ID: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                              • Instruction ID: b822d88d406f96f7f5968053efa4e95dab568485db567580b04a688fd4eb3749
                                                              • Opcode Fuzzy Hash: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                              • Instruction Fuzzy Hash: 3071E136320781B6E7249FA6BA443EA67B4F7CAB84F544227DD0953B89DA3CC6458F00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443608691.000001D15B010000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B010000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b010000_dwm.jbxd
                                                              Similarity
                                                              • API ID: CallTranslator
                                                              • String ID: MOC$RCC
                                                              • API String ID: 3163161869-2084237596
                                                              • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction ID: 837f3a118a1ffc4853e67fdd03e407b5c6d28617691c74c45fea9710cc7b4a26
                                                              • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction Fuzzy Hash: 4D617D37601B84AAEB28DFA5E9803DD77B0F385B88F144216EF4917B99DB38D195CB00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: FileType
                                                              • String ID: \\.\pipe\
                                                              • API String ID: 3081899298-91387939
                                                              • Opcode ID: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                              • Instruction ID: da552857855effc6cb260d69286bdff249e21fb565f997edec76b48a8281462b
                                                              • Opcode Fuzzy Hash: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                              • Instruction Fuzzy Hash: 2A51CF32724781B1E6649EAAB6683FAA7B1F3C7780F450727DE5903B99DA3DC5048F40
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastWrite
                                                              • String ID: U
                                                              • API String ID: 442123175-4171548499
                                                              • Opcode ID: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                              • Instruction ID: edfa0340a2b61bc4df6774f2da4fb4af1873c429cd1ec09329ee9fff47884b31
                                                              • Opcode Fuzzy Hash: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                              • Instruction Fuzzy Hash: C141A032715A84A6EB20CFA5F9443EA67B4F799794F504222EE4D87B98EB3CC541CB40
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFileHeaderRaise
                                                              • String ID: csm
                                                              • API String ID: 2573137834-1018135373
                                                              • Opcode ID: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                              • Instruction ID: 95977bb38f9df96595b236887bcfd50ef01fd6f04194bab099295ba62419ba2e
                                                              • Opcode Fuzzy Hash: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                              • Instruction Fuzzy Hash: 5D112832214B80A2EB618B15F544399B7E5FBC9B94F584322EE8D47B68DF3CC551CB00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443608691.000001D15B010000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B010000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b010000_dwm.jbxd
                                                              Similarity
                                                              • API ID: __std_exception_copy
                                                              • String ID: ierarchy Descriptor'$riptor at (
                                                              • API String ID: 592178966-758928094
                                                              • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                              • Instruction ID: 8f66a92c325a30d226c3968c140b7013ecc90217a4077a61c1c7d0017b0ed424
                                                              • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                              • Instruction Fuzzy Hash: 8EE04F61640B44B0DB028F61E9412D873A1AB99B64B889222995C46311FA3CD2E9C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443608691.000001D15B010000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B010000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b010000_dwm.jbxd
                                                              Similarity
                                                              • API ID: __std_exception_copy
                                                              • String ID: Locator'$riptor at (
                                                              • API String ID: 592178966-4215709766
                                                              • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                              • Instruction ID: 837328f5ae0287d0af7e7d5c6260f2d9ab2d69ed995cdf6e96feb25a95f52fd5
                                                              • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                              • Instruction Fuzzy Hash: 18E08671600B44B0DF018F61E9412E87371F799B64F88D223CD4C46311EA3CD1E9C700
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$AllocFree
                                                              • String ID:
                                                              • API String ID: 756756679-0
                                                              • Opcode ID: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                              • Instruction ID: 804419b86838cfa2a071d65cdf2e5bc7eb77247df5a01ac741e4d9c9ac48bae4
                                                              • Opcode Fuzzy Hash: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                              • Instruction Fuzzy Hash: 38116035601B44A1EA44DBA7B9043AA77B1F7CAFC0F184226DE4D43B65DE3CC4428B00
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000017.00000002.3443668911.000001D15B040000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001D15B040000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_23_2_1d15b040000_dwm.jbxd
                                                              Similarity
                                                              • API ID: Heap$AllocProcess
                                                              • String ID:
                                                              • API String ID: 1617791916-0
                                                              • Opcode ID: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                              • Instruction ID: dd047e11ee53c4bbb03a0791eb1b859c29dce02efb5b6fd11d193f6817388917
                                                              • Opcode Fuzzy Hash: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                              • Instruction Fuzzy Hash: 5AE09235601604A6EB448FA2E9083AA36F1FBCEF06F08C124C90907BA1DF7DC4D9CB50

                                                              Execution Graph

                                                              Execution Coverage:0.7%
                                                              Dynamic/Decrypted Code Coverage:0%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:74
                                                              Total number of Limit Nodes:2
                                                              execution_graph 14946 23af32b273c 14947 23af32b276a 14946->14947 14948 23af32b2858 LoadLibraryA 14947->14948 14949 23af32b28d4 14947->14949 14948->14947 14950 23af32e1abc 14955 23af32e1628 GetProcessHeap 14950->14955 14952 23af32e1ad2 Sleep SleepEx 14953 23af32e1acb 14952->14953 14953->14952 14954 23af32e1598 StrCmpIW StrCmpW 14953->14954 14954->14953 14956 23af32e1648 Concurrency::details::SchedulerProxy::DeleteThis 14955->14956 15000 23af32e1268 GetProcessHeap 14956->15000 14958 23af32e1650 14959 23af32e1268 2 API calls 14958->14959 14960 23af32e1661 14959->14960 14961 23af32e1268 2 API calls 14960->14961 14962 23af32e166a 14961->14962 14963 23af32e1268 2 API calls 14962->14963 14964 23af32e1673 14963->14964 14965 23af32e168e RegOpenKeyExW 14964->14965 14966 23af32e18a6 14965->14966 14967 23af32e16c0 RegOpenKeyExW 14965->14967 14966->14953 14968 23af32e16e9 14967->14968 14969 23af32e16ff RegOpenKeyExW 14967->14969 15004 23af32e12bc RegQueryInfoKeyW 14968->15004 14971 23af32e1723 14969->14971 14972 23af32e173a RegOpenKeyExW 14969->14972 15015 23af32e104c RegQueryInfoKeyW 14971->15015 14975 23af32e1775 RegOpenKeyExW 14972->14975 14976 23af32e175e 14972->14976 14977 23af32e1799 14975->14977 14978 23af32e17b0 RegOpenKeyExW 14975->14978 14980 23af32e12bc 13 API calls 14976->14980 14981 23af32e12bc 13 API calls 14977->14981 14982 23af32e17d4 14978->14982 14983 23af32e17eb RegOpenKeyExW 14978->14983 14984 23af32e176b RegCloseKey 14980->14984 14985 23af32e17a6 RegCloseKey 14981->14985 14986 23af32e12bc 13 API calls 14982->14986 14987 23af32e1826 RegOpenKeyExW 14983->14987 14988 23af32e180f 14983->14988 14984->14975 14985->14978 14989 23af32e17e1 RegCloseKey 14986->14989 14991 23af32e1861 RegOpenKeyExW 14987->14991 14992 23af32e184a 14987->14992 14990 23af32e104c 5 API calls 14988->14990 14989->14983 14995 23af32e181c RegCloseKey 14990->14995 14993 23af32e1885 14991->14993 14994 23af32e189c RegCloseKey 14991->14994 14996 23af32e104c 5 API calls 14992->14996 14997 23af32e104c 5 API calls 14993->14997 14994->14966 14995->14987 14998 23af32e1857 RegCloseKey 14996->14998 14999 23af32e1892 RegCloseKey 14997->14999 14998->14991 14999->14994 15021 23af32f6168 15000->15021 15002 23af32e1283 GetProcessHeap 15003 23af32e12ae Concurrency::details::SchedulerProxy::DeleteThis 15002->15003 15003->14958 15005 23af32e1327 GetProcessHeap 15004->15005 15006 23af32e148a RegCloseKey 15004->15006 15007 23af32e133e Concurrency::details::SchedulerProxy::DeleteThis 15005->15007 15006->14969 15008 23af32e1476 GetProcessHeap HeapFree 15007->15008 15009 23af32e1352 RegEnumValueW 15007->15009 15011 23af32e13d3 GetProcessHeap 15007->15011 15012 23af32e141e lstrlenW GetProcessHeap 15007->15012 15013 23af32e13f3 GetProcessHeap HeapFree 15007->15013 15014 23af32e1443 StrCpyW 15007->15014 15023 23af32e152c 15007->15023 15008->15006 15009->15007 15011->15007 15012->15007 15013->15012 15014->15007 15016 23af32e11b5 RegCloseKey 15015->15016 15018 23af32e10bf Concurrency::details::SchedulerProxy::DeleteThis 15015->15018 15016->14972 15017 23af32e10cf RegEnumValueW 15017->15018 15018->15016 15018->15017 15019 23af32e114e GetProcessHeap 15018->15019 15020 23af32e116e GetProcessHeap HeapFree 15018->15020 15019->15018 15020->15018 15022 23af32f6177 15021->15022 15024 23af32e157c 15023->15024 15027 23af32e1546 15023->15027 15024->15007 15025 23af32e1565 StrCmpW 15025->15027 15026 23af32e155d StrCmpIW 15026->15027 15027->15024 15027->15025 15027->15026

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                              • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                              • API String ID: 106492572-2879589442
                                                              • Opcode ID: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                              • Instruction ID: ee723ffc3aa04360758a76d5d7d100dccbb7a60cfb46d6529805fec6e03ef3e0
                                                              • Opcode Fuzzy Hash: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                              • Instruction Fuzzy Hash: 57711B26310A1086EB149F36E85969D7368FBA4F88F401135DD8E47FA8DF3EC684C741

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                              • String ID:
                                                              • API String ID: 1683269324-0
                                                              • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                              • Instruction ID: bfc441e202b70e990e34d141dd28dcd24dd31b6297016785c974490ec41ce35d
                                                              • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                              • Instruction Fuzzy Hash: 3211617061064082F7689721F88EB69A39CBF7474AF584138AADA81DD1EF7FC3C48752

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 0000023AF32E1628: GetProcessHeap.KERNEL32 ref: 0000023AF32E1633
                                                                • Part of subcall function 0000023AF32E1628: HeapAlloc.KERNEL32 ref: 0000023AF32E1642
                                                                • Part of subcall function 0000023AF32E1628: RegOpenKeyExW.ADVAPI32 ref: 0000023AF32E16B2
                                                                • Part of subcall function 0000023AF32E1628: RegOpenKeyExW.ADVAPI32 ref: 0000023AF32E16DF
                                                                • Part of subcall function 0000023AF32E1628: RegCloseKey.ADVAPI32 ref: 0000023AF32E16F9
                                                                • Part of subcall function 0000023AF32E1628: RegOpenKeyExW.ADVAPI32 ref: 0000023AF32E1719
                                                                • Part of subcall function 0000023AF32E1628: RegCloseKey.ADVAPI32 ref: 0000023AF32E1734
                                                                • Part of subcall function 0000023AF32E1628: RegOpenKeyExW.ADVAPI32 ref: 0000023AF32E1754
                                                                • Part of subcall function 0000023AF32E1628: RegCloseKey.ADVAPI32 ref: 0000023AF32E176F
                                                                • Part of subcall function 0000023AF32E1628: RegOpenKeyExW.ADVAPI32 ref: 0000023AF32E178F
                                                                • Part of subcall function 0000023AF32E1628: RegCloseKey.ADVAPI32 ref: 0000023AF32E17AA
                                                                • Part of subcall function 0000023AF32E1628: RegOpenKeyExW.ADVAPI32 ref: 0000023AF32E17CA
                                                              • Sleep.KERNEL32 ref: 0000023AF32E1AD7
                                                              • SleepEx.KERNELBASE ref: 0000023AF32E1ADD
                                                                • Part of subcall function 0000023AF32E1628: RegCloseKey.ADVAPI32 ref: 0000023AF32E17E5
                                                                • Part of subcall function 0000023AF32E1628: RegOpenKeyExW.ADVAPI32 ref: 0000023AF32E1805
                                                                • Part of subcall function 0000023AF32E1628: RegCloseKey.ADVAPI32 ref: 0000023AF32E1820
                                                                • Part of subcall function 0000023AF32E1628: RegOpenKeyExW.ADVAPI32 ref: 0000023AF32E1840
                                                                • Part of subcall function 0000023AF32E1628: RegCloseKey.ADVAPI32 ref: 0000023AF32E185B
                                                                • Part of subcall function 0000023AF32E1628: RegOpenKeyExW.ADVAPI32 ref: 0000023AF32E187B
                                                                • Part of subcall function 0000023AF32E1628: RegCloseKey.ADVAPI32 ref: 0000023AF32E1896
                                                                • Part of subcall function 0000023AF32E1628: RegCloseKey.ADVAPI32 ref: 0000023AF32E18A0
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CloseOpen$HeapSleep$AllocProcess
                                                              • String ID:
                                                              • API String ID: 1534210851-0
                                                              • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                              • Instruction ID: d293a7ecf22ae8c07a26979ff054afc44229310735744583370fa13e0ba43a09
                                                              • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                              • Instruction Fuzzy Hash: 8331F16120064141FF58DB26DA4A3A993ACAF64BC4F0854359E8D87FD9FF1EE6D1C212

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 110 23af32b273c-23af32b27a4 call 23af32b29d4 * 4 119 23af32b29b2 110->119 120 23af32b27aa-23af32b27ad 110->120 122 23af32b29b4-23af32b29d0 119->122 120->119 121 23af32b27b3-23af32b27b6 120->121 121->119 123 23af32b27bc-23af32b27bf 121->123 123->119 124 23af32b27c5-23af32b27e6 123->124 124->119 126 23af32b27ec-23af32b280c 124->126 127 23af32b2838-23af32b283f 126->127 128 23af32b280e-23af32b2836 126->128 129 23af32b2845-23af32b2852 127->129 130 23af32b28df-23af32b28e6 127->130 128->127 128->128 129->130 133 23af32b2858-23af32b286a LoadLibraryA 129->133 131 23af32b2992-23af32b29b0 130->131 132 23af32b28ec-23af32b2901 130->132 131->122 132->131 134 23af32b2907 132->134 135 23af32b286c-23af32b2878 133->135 136 23af32b28ca-23af32b28d2 133->136 140 23af32b290d-23af32b2921 134->140 137 23af32b28c5-23af32b28c8 135->137 136->133 138 23af32b28d4-23af32b28d9 136->138 137->136 141 23af32b287a-23af32b287d 137->141 138->130 142 23af32b2923-23af32b2934 140->142 143 23af32b2982-23af32b298c 140->143 144 23af32b28a7-23af32b28b7 141->144 145 23af32b287f-23af32b28a5 141->145 147 23af32b2936-23af32b293d 142->147 148 23af32b293f-23af32b2943 142->148 143->131 143->140 151 23af32b28ba-23af32b28c1 144->151 145->151 152 23af32b2970-23af32b2980 147->152 149 23af32b2945-23af32b294b 148->149 150 23af32b294d-23af32b2951 148->150 149->152 153 23af32b2963-23af32b2967 150->153 154 23af32b2953-23af32b2961 150->154 151->137 152->142 152->143 153->152 156 23af32b2969-23af32b296c 153->156 154->152 156->152
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3388365829.0000023AF32B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32B0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID:
                                                              • API String ID: 1029625771-0
                                                              • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                              • Instruction ID: 3da15631c9552bda4809b53278dd1c51c7a8308e220c86789214b26559236580
                                                              • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                              • Instruction Fuzzy Hash: 3861FF32B01B9087EB588F15900872DB3A2FB64BA4F688135DE9D07BC8DB3DE952C711

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 363 23af32e2b2c-23af32e2ba5 call 23af3302ce0 366 23af32e2ee0-23af32e2f03 363->366 367 23af32e2bab-23af32e2bb1 363->367 367->366 368 23af32e2bb7-23af32e2bba 367->368 368->366 369 23af32e2bc0-23af32e2bc3 368->369 369->366 370 23af32e2bc9-23af32e2bd9 GetModuleHandleA 369->370 371 23af32e2bed 370->371 372 23af32e2bdb-23af32e2beb call 23af32f6090 370->372 374 23af32e2bf0-23af32e2c0e 371->374 372->374 374->366 377 23af32e2c14-23af32e2c33 StrCmpNIW 374->377 377->366 378 23af32e2c39-23af32e2c3d 377->378 378->366 379 23af32e2c43-23af32e2c4d 378->379 379->366 380 23af32e2c53-23af32e2c5a 379->380 380->366 381 23af32e2c60-23af32e2c73 380->381 382 23af32e2c75-23af32e2c81 381->382 383 23af32e2c83 381->383 384 23af32e2c86-23af32e2c8a 382->384 383->384 385 23af32e2c8c-23af32e2c98 384->385 386 23af32e2c9a 384->386 387 23af32e2c9d-23af32e2ca7 385->387 386->387 388 23af32e2d9d-23af32e2da1 387->388 389 23af32e2cad-23af32e2cb0 387->389 390 23af32e2da7-23af32e2daa 388->390 391 23af32e2ed2-23af32e2eda 388->391 392 23af32e2cc2-23af32e2ccc 389->392 393 23af32e2cb2-23af32e2cbf call 23af32e199c 389->393 396 23af32e2dac-23af32e2db8 call 23af32e199c 390->396 397 23af32e2dbb-23af32e2dc5 390->397 391->366 391->381 394 23af32e2d00-23af32e2d0a 392->394 395 23af32e2cce-23af32e2cdb 392->395 393->392 401 23af32e2d0c-23af32e2d19 394->401 402 23af32e2d3a-23af32e2d3d 394->402 395->394 400 23af32e2cdd-23af32e2cea 395->400 396->397 404 23af32e2dc7-23af32e2dd4 397->404 405 23af32e2df5-23af32e2df8 397->405 408 23af32e2ced-23af32e2cf3 400->408 401->402 409 23af32e2d1b-23af32e2d28 401->409 410 23af32e2d3f-23af32e2d49 call 23af32e1bbc 402->410 411 23af32e2d4b-23af32e2d58 lstrlenW 402->411 404->405 413 23af32e2dd6-23af32e2de3 404->413 406 23af32e2e05-23af32e2e12 lstrlenW 405->406 407 23af32e2dfa-23af32e2e03 call 23af32e1bbc 405->407 420 23af32e2e14-23af32e2e1e 406->420 421 23af32e2e35-23af32e2e3f call 23af32e3844 406->421 407->406 426 23af32e2e4a-23af32e2e55 407->426 418 23af32e2cf9-23af32e2cfe 408->418 419 23af32e2d93-23af32e2d98 408->419 422 23af32e2d2b-23af32e2d31 409->422 410->411 410->419 414 23af32e2d5a-23af32e2d64 411->414 415 23af32e2d7b-23af32e2d8d call 23af32e3844 411->415 416 23af32e2de6-23af32e2dec 413->416 414->415 424 23af32e2d66-23af32e2d79 call 23af32e152c 414->424 415->419 429 23af32e2e42-23af32e2e44 415->429 425 23af32e2dee-23af32e2df3 416->425 416->426 418->394 418->408 419->429 420->421 430 23af32e2e20-23af32e2e33 call 23af32e152c 420->430 421->429 422->419 431 23af32e2d33-23af32e2d38 422->431 424->415 424->419 425->405 425->416 434 23af32e2e57-23af32e2e5b 426->434 435 23af32e2ecc-23af32e2ed0 426->435 429->391 429->426 430->421 430->426 431->402 431->422 440 23af32e2e63-23af32e2e7d call 23af32e85c0 434->440 441 23af32e2e5d-23af32e2e61 434->441 435->391 444 23af32e2e80-23af32e2e83 440->444 441->440 441->444 447 23af32e2ea6-23af32e2ea9 444->447 448 23af32e2e85-23af32e2ea3 call 23af32e85c0 444->448 447->435 450 23af32e2eab-23af32e2ec9 call 23af32e85c0 447->450 448->447 450->435
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                              • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                              • API String ID: 2119608203-3850299575
                                                              • Opcode ID: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                              • Instruction ID: 98dc20d53b9ffa1a8ca992e3ea5a6f8ebec1cdeae552b08220cceac7e5cea71a
                                                              • Opcode Fuzzy Hash: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                              • Instruction Fuzzy Hash: 0AB1926221075082EB5CEF25D4497A9A3A9FB64B84F445036DE8A53FD4DF3EDE80C781
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 3140674995-0
                                                              • Opcode ID: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                              • Instruction ID: f80704e4090aec457dd619ddbf93a46e313ac98ba8684ae4ab85bc3349a4acc6
                                                              • Opcode Fuzzy Hash: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                              • Instruction Fuzzy Hash: 48315D72305B808AEB649F64E8447ED7368F794B44F44402ADA8D57B98EF3DC648CB10
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 1239891234-0
                                                              • Opcode ID: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                              • Instruction ID: 9624eecabc732b79e81a6373d390755405d02b5869d1bd8e9f427c0fee0c5b47
                                                              • Opcode Fuzzy Hash: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                              • Instruction Fuzzy Hash: A6317E32214B808AEB64CF25E84539E73A8FB99B54F500126EADD43F98DF3DC695CB01

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                              • String ID: d
                                                              • API String ID: 2005889112-2564639436
                                                              • Opcode ID: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                              • Instruction ID: 44ec96c4dca53712827799cb354bea119c19488123cee649313871abe28699f2
                                                              • Opcode Fuzzy Hash: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                              • Instruction Fuzzy Hash: 49516C76200B8486EB58DF62E44835EB7A5F798F89F044134DE8A07B98DF3EC249CB01

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentThread$AddressHandleModuleProc
                                                              • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                              • API String ID: 4175298099-1975688563
                                                              • Opcode ID: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                              • Instruction ID: de7cba9eaa82766f2ac71d34862b1f30ad60a327fc8075d0386d60777f2da56b
                                                              • Opcode Fuzzy Hash: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                              • Instruction Fuzzy Hash: 9E31AEA4210A4AA0EB08EF65E85A7D4A324BB24744F84513394D942DEADF7FC389D793

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 205 23af32b6910-23af32b6916 206 23af32b6918-23af32b691b 205->206 207 23af32b6951-23af32b695b 205->207 209 23af32b6945-23af32b6984 call 23af32b6fc0 206->209 210 23af32b691d-23af32b6920 206->210 208 23af32b6a78-23af32b6a8d 207->208 214 23af32b6a9c-23af32b6ab6 call 23af32b6e54 208->214 215 23af32b6a8f 208->215 228 23af32b6a52 209->228 229 23af32b698a-23af32b699f call 23af32b6e54 209->229 212 23af32b6922-23af32b6925 210->212 213 23af32b6938 __scrt_dllmain_crt_thread_attach 210->213 219 23af32b6927-23af32b6930 212->219 220 23af32b6931-23af32b6936 call 23af32b6f04 212->220 217 23af32b693d-23af32b6944 213->217 226 23af32b6ab8-23af32b6aed call 23af32b6f7c call 23af32b6e1c call 23af32b7318 call 23af32b7130 call 23af32b7154 call 23af32b6fac 214->226 227 23af32b6aef-23af32b6b20 call 23af32b7190 214->227 221 23af32b6a91-23af32b6a9b 215->221 220->217 226->221 237 23af32b6b22-23af32b6b28 227->237 238 23af32b6b31-23af32b6b37 227->238 232 23af32b6a54-23af32b6a69 228->232 240 23af32b69a5-23af32b69b6 call 23af32b6ec4 229->240 241 23af32b6a6a-23af32b6a77 call 23af32b7190 229->241 237->238 242 23af32b6b2a-23af32b6b2c 237->242 243 23af32b6b39-23af32b6b43 238->243 244 23af32b6b7e-23af32b6b94 call 23af32b268c 238->244 259 23af32b69b8-23af32b69dc call 23af32b72dc call 23af32b6e0c call 23af32b6e38 call 23af32bac0c 240->259 260 23af32b6a07-23af32b6a11 call 23af32b7130 240->260 241->208 248 23af32b6c1f-23af32b6c2c 242->248 249 23af32b6b45-23af32b6b4d 243->249 250 23af32b6b4f-23af32b6b5d call 23af32c5780 243->250 262 23af32b6b96-23af32b6b98 244->262 263 23af32b6bcc-23af32b6bce 244->263 256 23af32b6b63-23af32b6b78 call 23af32b6910 249->256 250->256 272 23af32b6c15-23af32b6c1d 250->272 256->244 256->272 259->260 308 23af32b69de-23af32b69e5 __scrt_dllmain_after_initialize_c 259->308 260->228 281 23af32b6a13-23af32b6a1f call 23af32b7180 260->281 262->263 269 23af32b6b9a-23af32b6bbc call 23af32b268c call 23af32b6a78 262->269 270 23af32b6bd5-23af32b6bea call 23af32b6910 263->270 271 23af32b6bd0-23af32b6bd3 263->271 269->263 302 23af32b6bbe-23af32b6bc6 call 23af32c5780 269->302 270->272 290 23af32b6bec-23af32b6bf6 270->290 271->270 271->272 272->248 292 23af32b6a45-23af32b6a50 281->292 293 23af32b6a21-23af32b6a2b call 23af32b7098 281->293 296 23af32b6bf8-23af32b6bff 290->296 297 23af32b6c01-23af32b6c11 call 23af32c5780 290->297 292->232 293->292 307 23af32b6a2d-23af32b6a3b 293->307 296->272 297->272 302->263 307->292 308->260 309 23af32b69e7-23af32b6a04 call 23af32babc8 308->309 309->260
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3388365829.0000023AF32B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32B0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                              • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                                                              • API String ID: 190073905-1786718095
                                                              • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction ID: aa7523ff3450d8138d324d1415d18bdd61c465b0ca31d792af1584c48e49331f
                                                              • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction Fuzzy Hash: 0281BF2170064186FB5CAB66944D35962A0FBB5B80F5880359AC987FE7DF3FCB868743

                                                              Control-flow Graph

                                                              APIs
                                                              • GetLastError.KERNEL32 ref: 0000023AF32ECE37
                                                              • FlsGetValue.KERNEL32(?,?,?,0000023AF32F0A6B,?,?,?,0000023AF32F045C,?,?,?,0000023AF32EC84F), ref: 0000023AF32ECE4C
                                                              • FlsSetValue.KERNEL32(?,?,?,0000023AF32F0A6B,?,?,?,0000023AF32F045C,?,?,?,0000023AF32EC84F), ref: 0000023AF32ECE6D
                                                              • FlsSetValue.KERNEL32(?,?,?,0000023AF32F0A6B,?,?,?,0000023AF32F045C,?,?,?,0000023AF32EC84F), ref: 0000023AF32ECE9A
                                                              • FlsSetValue.KERNEL32(?,?,?,0000023AF32F0A6B,?,?,?,0000023AF32F045C,?,?,?,0000023AF32EC84F), ref: 0000023AF32ECEAB
                                                              • FlsSetValue.KERNEL32(?,?,?,0000023AF32F0A6B,?,?,?,0000023AF32F045C,?,?,?,0000023AF32EC84F), ref: 0000023AF32ECEBC
                                                              • SetLastError.KERNEL32 ref: 0000023AF32ECED7
                                                              • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,0000023AF32F0A6B,?,?,?,0000023AF32F045C,?,?,?,0000023AF32EC84F), ref: 0000023AF32ECF0D
                                                              • FlsSetValue.KERNEL32(?,?,00000001,0000023AF32EECCC,?,?,?,?,0000023AF32EBF9F,?,?,?,?,?,0000023AF32E7AB0), ref: 0000023AF32ECF2C
                                                                • Part of subcall function 0000023AF32ED6CC: HeapAlloc.KERNEL32 ref: 0000023AF32ED721
                                                              • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,0000023AF32F0A6B,?,?,?,0000023AF32F045C,?,?,?,0000023AF32EC84F), ref: 0000023AF32ECF54
                                                                • Part of subcall function 0000023AF32ED744: HeapFree.KERNEL32 ref: 0000023AF32ED75A
                                                                • Part of subcall function 0000023AF32ED744: GetLastError.KERNEL32 ref: 0000023AF32ED764
                                                              • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,0000023AF32F0A6B,?,?,?,0000023AF32F045C,?,?,?,0000023AF32EC84F), ref: 0000023AF32ECF65
                                                              • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,0000023AF32F0A6B,?,?,?,0000023AF32F045C,?,?,?,0000023AF32EC84F), ref: 0000023AF32ECF76
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorLast$Heap$AllocFree
                                                              • String ID:
                                                              • API String ID: 570795689-0
                                                              • Opcode ID: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                              • Instruction ID: 4f1da59daabb27cd6b0dd6ca2d60cef7b0ed2b74a20c8addae82343016ffbeb4
                                                              • Opcode Fuzzy Hash: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                              • Instruction Fuzzy Hash: 52419D6060025446FB6CA3B9554F369B24A5F647B4F184734E8F606EEADE3EDBC18203

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                              • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                              • API String ID: 2171963597-1373409510
                                                              • Opcode ID: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                              • Instruction ID: a8d4ddb08ab43e39ca41348e59499764ae55964e0db52882bde19170e5b30b0e
                                                              • Opcode Fuzzy Hash: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                              • Instruction Fuzzy Hash: 84213D3261475083EB14DB25E54875A67A4F799BA4F500225EA9A03FE8CF3DC249CF01

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 584 23af32ea544-23af32ea5ac call 23af32eb414 587 23af32ea5b2-23af32ea5b5 584->587 588 23af32eaa13-23af32eaa1b call 23af32ec748 584->588 587->588 590 23af32ea5bb-23af32ea5c1 587->590 591 23af32ea5c7-23af32ea5cb 590->591 592 23af32ea690-23af32ea6a2 590->592 591->592 596 23af32ea5d1-23af32ea5dc 591->596 594 23af32ea6a8-23af32ea6ac 592->594 595 23af32ea963-23af32ea967 592->595 594->595 597 23af32ea6b2-23af32ea6bd 594->597 599 23af32ea969-23af32ea970 595->599 600 23af32ea9a0-23af32ea9aa call 23af32e9634 595->600 596->592 598 23af32ea5e2-23af32ea5e7 596->598 597->595 601 23af32ea6c3-23af32ea6ca 597->601 598->592 602 23af32ea5ed-23af32ea5f7 call 23af32e9634 598->602 599->588 603 23af32ea976-23af32ea99b call 23af32eaa1c 599->603 600->588 613 23af32ea9ac-23af32ea9cb call 23af32e7940 600->613 605 23af32ea894-23af32ea8a0 601->605 606 23af32ea6d0-23af32ea707 call 23af32e9a10 601->606 602->613 617 23af32ea5fd-23af32ea628 call 23af32e9634 * 2 call 23af32e9d24 602->617 603->600 605->600 610 23af32ea8a6-23af32ea8aa 605->610 606->605 621 23af32ea70d-23af32ea715 606->621 614 23af32ea8ac-23af32ea8b8 call 23af32e9ce4 610->614 615 23af32ea8ba-23af32ea8c2 610->615 614->615 628 23af32ea8db-23af32ea8e3 614->628 615->600 620 23af32ea8c8-23af32ea8d5 call 23af32e98b4 615->620 652 23af32ea648-23af32ea652 call 23af32e9634 617->652 653 23af32ea62a-23af32ea62e 617->653 620->600 620->628 626 23af32ea719-23af32ea74b 621->626 630 23af32ea887-23af32ea88e 626->630 631 23af32ea751-23af32ea75c 626->631 633 23af32ea8e9-23af32ea8ed 628->633 634 23af32ea9f6-23af32eaa12 call 23af32e9634 * 2 call 23af32ec6a8 628->634 630->605 630->626 631->630 635 23af32ea762-23af32ea77b 631->635 637 23af32ea900 633->637 638 23af32ea8ef-23af32ea8fe call 23af32e9ce4 633->638 634->588 639 23af32ea874-23af32ea879 635->639 640 23af32ea781-23af32ea7c6 call 23af32e9cf8 * 2 635->640 648 23af32ea903-23af32ea90d call 23af32eb4ac 637->648 638->648 644 23af32ea884 639->644 668 23af32ea7c8-23af32ea7ee call 23af32e9cf8 call 23af32eac38 640->668 669 23af32ea804-23af32ea80a 640->669 644->630 648->600 660 23af32ea913-23af32ea961 call 23af32e9944 call 23af32e9b50 648->660 652->592 667 23af32ea654-23af32ea674 call 23af32e9634 * 2 call 23af32eb4ac 652->667 653->652 659 23af32ea630-23af32ea63b 653->659 659->652 664 23af32ea63d-23af32ea642 659->664 660->600 664->588 664->652 690 23af32ea676-23af32ea680 call 23af32eb59c 667->690 691 23af32ea68b 667->691 684 23af32ea815-23af32ea872 call 23af32ea470 668->684 685 23af32ea7f0-23af32ea802 668->685 673 23af32ea80c-23af32ea810 669->673 674 23af32ea87b 669->674 673->640 678 23af32ea880 674->678 678->644 684->678 685->668 685->669 694 23af32ea686-23af32ea9ef call 23af32e92ac call 23af32eaff4 call 23af32e94a0 690->694 695 23af32ea9f0-23af32ea9f5 call 23af32ec6a8 690->695 691->592 694->695 695->634
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                              • String ID: csm$csm$csm
                                                              • API String ID: 849930591-393685449
                                                              • Opcode ID: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                              • Instruction ID: b4d8cd867aaeb3ad171d14d2f9034518e5dc5eb0835e7de6886729e79cec17f7
                                                              • Opcode Fuzzy Hash: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                              • Instruction Fuzzy Hash: 76E17D726047808AEB28DF65D48A39DB7A8FB65798F100126EEC957F95CB3DC6C1C702

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 463 23af32b9944-23af32b99ac call 23af32ba814 466 23af32b9e13-23af32b9e1b call 23af32bbb48 463->466 467 23af32b99b2-23af32b99b5 463->467 467->466 468 23af32b99bb-23af32b99c1 467->468 470 23af32b99c7-23af32b99cb 468->470 471 23af32b9a90-23af32b9aa2 468->471 470->471 475 23af32b99d1-23af32b99dc 470->475 473 23af32b9d63-23af32b9d67 471->473 474 23af32b9aa8-23af32b9aac 471->474 478 23af32b9d69-23af32b9d70 473->478 479 23af32b9da0-23af32b9daa call 23af32b8a34 473->479 474->473 476 23af32b9ab2-23af32b9abd 474->476 475->471 477 23af32b99e2-23af32b99e7 475->477 476->473 481 23af32b9ac3-23af32b9aca 476->481 477->471 482 23af32b99ed-23af32b99f7 call 23af32b8a34 477->482 478->466 483 23af32b9d76-23af32b9d9b call 23af32b9e1c 478->483 479->466 489 23af32b9dac-23af32b9dcb call 23af32b6d40 479->489 485 23af32b9c94-23af32b9ca0 481->485 486 23af32b9ad0-23af32b9b07 call 23af32b8e10 481->486 482->489 497 23af32b99fd-23af32b9a28 call 23af32b8a34 * 2 call 23af32b9124 482->497 483->479 485->479 490 23af32b9ca6-23af32b9caa 485->490 486->485 501 23af32b9b0d-23af32b9b15 486->501 494 23af32b9cac-23af32b9cb8 call 23af32b90e4 490->494 495 23af32b9cba-23af32b9cc2 490->495 494->495 507 23af32b9cdb-23af32b9ce3 494->507 495->479 500 23af32b9cc8-23af32b9cd5 call 23af32b8cb4 495->500 531 23af32b9a48-23af32b9a52 call 23af32b8a34 497->531 532 23af32b9a2a-23af32b9a2e 497->532 500->479 500->507 505 23af32b9b19-23af32b9b4b 501->505 509 23af32b9c87-23af32b9c8e 505->509 510 23af32b9b51-23af32b9b5c 505->510 512 23af32b9ce9-23af32b9ced 507->512 513 23af32b9df6-23af32b9e12 call 23af32b8a34 * 2 call 23af32bbaa8 507->513 509->485 509->505 510->509 514 23af32b9b62-23af32b9b7b 510->514 518 23af32b9d00 512->518 519 23af32b9cef-23af32b9cfe call 23af32b90e4 512->519 513->466 520 23af32b9c74-23af32b9c79 514->520 521 23af32b9b81-23af32b9bc6 call 23af32b90f8 * 2 514->521 527 23af32b9d03-23af32b9d0d call 23af32ba8ac 518->527 519->527 523 23af32b9c84 520->523 544 23af32b9c04-23af32b9c0a 521->544 545 23af32b9bc8-23af32b9bee call 23af32b90f8 call 23af32ba038 521->545 523->509 527->479 542 23af32b9d13-23af32b9d61 call 23af32b8d44 call 23af32b8f50 527->542 531->471 548 23af32b9a54-23af32b9a74 call 23af32b8a34 * 2 call 23af32ba8ac 531->548 532->531 536 23af32b9a30-23af32b9a3b 532->536 536->531 541 23af32b9a3d-23af32b9a42 536->541 541->466 541->531 542->479 552 23af32b9c0c-23af32b9c10 544->552 553 23af32b9c7b 544->553 563 23af32b9c15-23af32b9c72 call 23af32b9870 545->563 564 23af32b9bf0-23af32b9c02 545->564 569 23af32b9a76-23af32b9a80 call 23af32ba99c 548->569 570 23af32b9a8b 548->570 552->521 554 23af32b9c80 553->554 554->523 563->554 564->544 564->545 573 23af32b9a86-23af32b9def call 23af32b86ac call 23af32ba3f4 call 23af32b88a0 569->573 574 23af32b9df0-23af32b9df5 call 23af32bbaa8 569->574 570->471 573->574 574->513
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3388365829.0000023AF32B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32B0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                              • String ID: csm$csm$csm
                                                              • API String ID: 849930591-393685449
                                                              • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                              • Instruction ID: 5cd99f4a483f263c615ceea0efd3ddc411abd48ac49001fa3fe7c477d7fb9094
                                                              • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                              • Instruction Fuzzy Hash: 81E19C72604B80CAEB689B25D48839D77A0F769B88F104525EEC957F99CB3EC291C702

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeLibraryProc
                                                              • String ID: api-ms-$ext-ms-
                                                              • API String ID: 3013587201-537541572
                                                              • Opcode ID: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                              • Instruction ID: 7e27abf47b83b17f015314e1dc6a0d4402c721e608e4e3179cb03febb156a4ab
                                                              • Opcode Fuzzy Hash: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                              • Instruction Fuzzy Hash: 5541F823315A0051FB19CB66A809759A399FF65BE0F0A41359E8D87FC4EF3EC7858302

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 735 23af32e104c-23af32e10b9 RegQueryInfoKeyW 736 23af32e11b5-23af32e11d0 735->736 737 23af32e10bf-23af32e10c9 735->737 737->736 738 23af32e10cf-23af32e111f RegEnumValueW 737->738 739 23af32e11a5-23af32e11af 738->739 740 23af32e1125-23af32e112a 738->740 739->736 739->738 740->739 741 23af32e112c-23af32e1135 740->741 742 23af32e1147-23af32e114c 741->742 743 23af32e1137 741->743 745 23af32e1199-23af32e11a3 742->745 746 23af32e114e-23af32e1193 GetProcessHeap call 23af32f6168 GetProcessHeap HeapFree 742->746 744 23af32e113b-23af32e113f 743->744 744->739 747 23af32e1141-23af32e1145 744->747 745->739 746->745 747->742 747->744
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                              • String ID: d
                                                              • API String ID: 3743429067-2564639436
                                                              • Opcode ID: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                              • Instruction ID: c2ce9a83bb39aa8cf87631e872da634b098ba8a270060c436afb6f1334a8ced9
                                                              • Opcode Fuzzy Hash: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                              • Instruction Fuzzy Hash: B9417C76214B84C6E764CF21E44979EB7A5F388B88F048129DA890BB98DF3DD589CB01

                                                              Control-flow Graph

                                                              APIs
                                                              • FlsGetValue.KERNEL32(?,?,?,0000023AF32EC7DE,?,?,?,?,?,?,?,?,0000023AF32ECF9D,?,?,00000001), ref: 0000023AF32ED087
                                                              • FlsSetValue.KERNEL32(?,?,?,0000023AF32EC7DE,?,?,?,?,?,?,?,?,0000023AF32ECF9D,?,?,00000001), ref: 0000023AF32ED0A6
                                                              • FlsSetValue.KERNEL32(?,?,?,0000023AF32EC7DE,?,?,?,?,?,?,?,?,0000023AF32ECF9D,?,?,00000001), ref: 0000023AF32ED0CE
                                                              • FlsSetValue.KERNEL32(?,?,?,0000023AF32EC7DE,?,?,?,?,?,?,?,?,0000023AF32ECF9D,?,?,00000001), ref: 0000023AF32ED0DF
                                                              • FlsSetValue.KERNEL32(?,?,?,0000023AF32EC7DE,?,?,?,?,?,?,?,?,0000023AF32ECF9D,?,?,00000001), ref: 0000023AF32ED0F0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID: 1%$Y%
                                                              • API String ID: 3702945584-1395475152
                                                              • Opcode ID: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                              • Instruction ID: 9b97164e2f521d5ce6a6030bd677edd7b008a30c487866d669dd02ea5029d614
                                                              • Opcode Fuzzy Hash: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                              • Instruction Fuzzy Hash: F211936470024046FB6CA726965F369E2495F647F0F184334A8F90BEDADE2FC7828212
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                              • String ID:
                                                              • API String ID: 190073905-0
                                                              • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction ID: cc4bd47b747a076d3a70656ebe8af1318798e3ef24b2b66c07c979a3a6a4a38b
                                                              • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction Fuzzy Hash: F781D02170020186FB5CAB6DE44B39DA298AF75B84F184435EAC447FD6EB3FCB859702
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Library$Load$AddressErrorFreeLastProc
                                                              • String ID: api-ms-
                                                              • API String ID: 2559590344-2084034818
                                                              • Opcode ID: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                              • Instruction ID: 29a3aad0747f712a65b36c3bf1f5cb4a4b5ca32a0e5e27ed2c0d311cdf3eb7cb
                                                              • Opcode Fuzzy Hash: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                              • Instruction Fuzzy Hash: 7131C721312740D1EF19DB52A409B59A29CFB68BA0F5D09379E9D07BD0DF3EC6C58742
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                              • String ID: CONOUT$
                                                              • API String ID: 3230265001-3130406586
                                                              • Opcode ID: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                              • Instruction ID: 9dc6895154f490a0fa1379aad1beb104b20039b2d52934f260433463d6ad7ce2
                                                              • Opcode Fuzzy Hash: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                              • Instruction Fuzzy Hash: 5E118231710B4086E7549B66E84831D76A4F798FE8F144234EEDA87BD4CF3DC6148B85
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcessProtectVirtual$HandleModule
                                                              • String ID: wr
                                                              • API String ID: 1092925422-2678910430
                                                              • Opcode ID: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                              • Instruction ID: ee159a358a29a47cc67f4c3be2c5703ed440c377ad2b83d771141e801391207f
                                                              • Opcode Fuzzy Hash: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                              • Instruction Fuzzy Hash: 9E113C2670474183EF189B21F449669B2B8FB58B85F540039DFC907B94EF3EC645CB05
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Thread$Current$Context
                                                              • String ID:
                                                              • API String ID: 1666949209-0
                                                              • Opcode ID: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                                                              • Instruction ID: 78766e4399c8dc549f545ec081a1babf1706de50ce668165723e5713332fdb27
                                                              • Opcode Fuzzy Hash: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                                                              • Instruction Fuzzy Hash: E6D1BC76214B8881DB74DB0AE49535AB7B4F7D8B88F140226EACD47BA5CF3DC681CB41
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$AllocFree
                                                              • String ID: dialer
                                                              • API String ID: 756756679-3528709123
                                                              • Opcode ID: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                              • Instruction ID: e058bc9bb3b8aa6a493347436ec1e847b338baec1071684e9e682a020670fa46
                                                              • Opcode Fuzzy Hash: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                              • Instruction Fuzzy Hash: D431C722701B5182E718DF26D54972AA7A4FF64B85F0841349FC947F95EF3EC6E18701
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$Free
                                                              • String ID: C:\Windows\system32\svchost.exe
                                                              • API String ID: 3168794593-4180442734
                                                              • Opcode ID: d27b9b8ca154d9eedff1e610dfbacc8608a6d25d7c3fe3b6d17278c798082fda
                                                              • Instruction ID: 86b26c9247c8104daadc16f0a306905e38207ed0c73cb0503fda9d0042af8dc4
                                                              • Opcode Fuzzy Hash: d27b9b8ca154d9eedff1e610dfbacc8608a6d25d7c3fe3b6d17278c798082fda
                                                              • Instruction Fuzzy Hash: 3821A567608AD08AE358EF359C5929E27A9F765F44F094035DBC543BC3DE2FD6048B02
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorLast
                                                              • String ID:
                                                              • API String ID: 2506987500-0
                                                              • Opcode ID: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                              • Instruction ID: d626b139bf2515b181b52ca9d9c8d6f5990de9874432f050005ae24276e9d5b3
                                                              • Opcode Fuzzy Hash: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                              • Instruction Fuzzy Hash: E111632070024046FB6CA776965F329A24A6F647B4F184735A8F647FDADE2EC7818612
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                              • String ID:
                                                              • API String ID: 517849248-0
                                                              • Opcode ID: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                              • Instruction ID: aa8edf9784ca19634c0ee458ceaeb90963ad875c59a58248a1554905202c4035
                                                              • Opcode Fuzzy Hash: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                              • Instruction Fuzzy Hash: 24012D21700A4082EB68DB62E45C75AA3A9FB98FC4F584035DEC943B95DF3DCA89CB41
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                              • String ID:
                                                              • API String ID: 449555515-0
                                                              • Opcode ID: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                              • Instruction ID: 423760b10cb6e8f78dc04e5dde3cead2652d295327a5c384355b2ac6181d5524
                                                              • Opcode Fuzzy Hash: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                              • Instruction Fuzzy Hash: 18012D6531174082EB289B21E84D71A77A8FB65B86F180538CED907BD5EF3FC648CB02
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 2395640692-629598281
                                                              • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                              • Instruction ID: 9626061da8fd3a460f6d6bcb32d7400cd34d453b169b234c9771e9f97e557f6b
                                                              • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                              • Instruction Fuzzy Hash: 0A51A236701200C6DB1CCB25D44DB58B79AFB64F88F508136DA964BBC8EB7ECA80C702
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 2395640692-629598281
                                                              • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                              • Instruction ID: 63ffd36dcd3943f539e9afe8a9a4ee23790d34f2e488548bf04ad3c00dfbb63a
                                                              • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                              • Instruction Fuzzy Hash: 9B31B135300640C6E718DF21E84D719B7A9FB60B88F458025EE9647BC9DB3ECA80CB06
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: FinalHandleNamePathlstrlen
                                                              • String ID: \\?\
                                                              • API String ID: 2719912262-4282027825
                                                              • Opcode ID: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                              • Instruction ID: 9a0e6a1fe0657e61cc3420f84ac3a8e5e479968615e898656d2d3c1efce8d65c
                                                              • Opcode Fuzzy Hash: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                              • Instruction Fuzzy Hash: 0BF0442230464192EB749F21F88875D6764F768B88F944034DAC946ED4DF3DC78DCB01
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CombinePath
                                                              • String ID: \\.\pipe\
                                                              • API String ID: 3422762182-91387939
                                                              • Opcode ID: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                              • Instruction ID: 8cbddb09e37f53dfba20b492dcc1bf506de27857d4e4897c64d7ae3e1c0e4dbf
                                                              • Opcode Fuzzy Hash: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                              • Instruction Fuzzy Hash: A0F01264714B8482EB188B63F95C11DA669FB68FD1F085130EEC647F98DF3DC6858B01
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                              • String ID: CorExitProcess$mscoree.dll
                                                              • API String ID: 4061214504-1276376045
                                                              • Opcode ID: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                              • Instruction ID: 4552aeee208f1e4eb317f117dcf18f4d43626f128b76397a397e3b68f671a9f9
                                                              • Opcode Fuzzy Hash: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                              • Instruction Fuzzy Hash: 78F0966131570582EB188B39E45D35D6364FBA4BA1F540239CEEA45AE4DF3EC284CB01
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentThread
                                                              • String ID:
                                                              • API String ID: 2882836952-0
                                                              • Opcode ID: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                                                              • Instruction ID: bfe489d3787a43adbdb8949a248df29ba402fffb18460cabcb06d35754e30a04
                                                              • Opcode Fuzzy Hash: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                                                              • Instruction Fuzzy Hash: A502F836219B8086EB64CB59F49535AB7A4F7D5B84F200025EACE87FA8DF7DC584CB01
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentThread
                                                              • String ID:
                                                              • API String ID: 2882836952-0
                                                              • Opcode ID: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                                                              • Instruction ID: fe422fe2fd9d0706cea3f397b35ccc64bf2cadb06e89a3cd03a3bdbea785b399
                                                              • Opcode Fuzzy Hash: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                                                              • Instruction Fuzzy Hash: B2610736528B44C6E764CB15E45931AB7A4F798784F200225EACE47FE8DB7EC690CF02
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: _set_statfp
                                                              • String ID:
                                                              • API String ID: 1156100317-0
                                                              • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction ID: e9de8037cbce042c27c932672d77890c086474da7a56bb84ffd5d32a8a1e3d9f
                                                              • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction Fuzzy Hash: 3611A322B10A5411FB6C357AE85D76F11406B78BB8F080634A9F607FD6CBEECB454A02
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3388365829.0000023AF32B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32B0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: _set_statfp
                                                              • String ID:
                                                              • API String ID: 1156100317-0
                                                              • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction ID: acea8926f7d136cfad38a04c0ef70594d412019f0ee89facdd49f03dfbda46d2
                                                              • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction Fuzzy Hash: 0111A722650A1111FB9D1528E4CEB6911806B7D3F4F494E38ABE606FD7CA2ECB414103
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3388365829.0000023AF32B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32B0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID: Tuesday$Wednesday$or copy constructor iterator'
                                                              • API String ID: 3215553584-4202648911
                                                              • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                              • Instruction ID: 9efe82dca6fcfd4791c48a83946f65ccc29f20e32eafcd21540cc00e88081b6b
                                                              • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                              • Instruction Fuzzy Hash: DE61C73661064066FB6D8B69E54C32E66A0F775780F548835CAC617FE9DB3ECB418303
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CallEncodePointerTranslator
                                                              • String ID: MOC$RCC
                                                              • API String ID: 3544855599-2084237596
                                                              • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction ID: 2e8c72c1664f9f4bebce3a912c6b2e38c4a59c609ae7cbd361f64ae5fe444afe
                                                              • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction Fuzzy Hash: AC615A33600B848AEB18DF65D44539DB7B4FB68B88F045226EF8917B98DB3DC695C701
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                              • String ID: csm$csm
                                                              • API String ID: 3896166516-3733052814
                                                              • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction ID: 2e758ee95c6cf0a9fc398afdb6447f599c145550cfacbb52d9e3712b1ed94f51
                                                              • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction Fuzzy Hash: 9C517E721003808AEB788F26958A359B7A8FF65B85F184136DAD947FD5CB3ED6D0C702
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3388365829.0000023AF32B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32B0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                              • String ID: csm$csm
                                                              • API String ID: 3896166516-3733052814
                                                              • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction ID: e22a72a4e32a4c346d049e31fc576438882dc496dc454bcd5971b3730cb575cf
                                                              • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction Fuzzy Hash: AA516C32104680CAEB788F25955835C77A0F365B94F188226DED987FD6CB3ED6A1CB02
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3388365829.0000023AF32B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32B0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritable__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 3242871069-629598281
                                                              • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                              • Instruction ID: 066f296e7c69333cf7eab93cc9b9949eb87835866d5e2c19bc447ded2b282f1c
                                                              • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                              • Instruction Fuzzy Hash: 2D51BD327016808AEB1DCF15E448B5937A5F364B98F568134DA8A43BC8EB3EDA81C746
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3388365829.0000023AF32B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32B0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritable__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 3242871069-629598281
                                                              • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                              • Instruction ID: fbf4d1ea09ca530c11bc050d45c78e5c1af422512be69d4936dbcf0bfcdabb2a
                                                              • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                              • Instruction Fuzzy Hash: 18316B32201A80D6EB19DF12E848B5977A4F760BD8F558124EEDA07BC8DB3EDA41C746
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: FileWrite$ConsoleErrorLastOutput
                                                              • String ID:
                                                              • API String ID: 2718003287-0
                                                              • Opcode ID: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                              • Instruction ID: e2751f37c9afc06bab20269fd30b95b3ce7bf53436da13fe763090e07bb22a2b
                                                              • Opcode Fuzzy Hash: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                              • Instruction Fuzzy Hash: C3D1ED36B04B8089E715CFB9D44429C3BA5F365B98F108226CE9997FD9DB3DC606CB41
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: ConsoleErrorLastMode
                                                              • String ID:
                                                              • API String ID: 953036326-0
                                                              • Opcode ID: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                              • Instruction ID: 6fd4068f5fde012c4dde791a9f378234b0b4c7c006b5b8258291a18aebbb5ec4
                                                              • Opcode Fuzzy Hash: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                              • Instruction Fuzzy Hash: CD91AC7670075085F768DF75D4883AD2BA4F726B88F144129DE8A67EC4DB3EC682CB02
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                              • String ID:
                                                              • API String ID: 2933794660-0
                                                              • Opcode ID: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                              • Instruction ID: 4d56da54cf78304b59e941c3840ad02a4e27cfa3874fb6ac860baba0de6867c0
                                                              • Opcode Fuzzy Hash: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                              • Instruction Fuzzy Hash: 6B113026710F018AEB40DF75E8593A933A4F729B58F440E35DAAD46BA4DF7DC2988381
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: FileType
                                                              • String ID: \\.\pipe\
                                                              • API String ID: 3081899298-91387939
                                                              • Opcode ID: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                              • Instruction ID: 6f851ab7d2fffd7563023ef623ee8a7de8c3bed235268dd0d459f42558e32ad4
                                                              • Opcode Fuzzy Hash: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                              • Instruction Fuzzy Hash: 3A71A73620078185D72CEF25D8493A9A7A8FBA6B84F540135DE8A53FC9DF3EC7859701
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3388365829.0000023AF32B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32B0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CallTranslator
                                                              • String ID: MOC$RCC
                                                              • API String ID: 3163161869-2084237596
                                                              • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction ID: 9af03a94526e124235052eff05af4d6ef70a64bd906bbf711c34630943867be5
                                                              • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction Fuzzy Hash: 31619A33A00B84CAEB28CF65D04439D77A0F764B88F144626EF8917B98DB3DD295C741
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: FileType
                                                              • String ID: \\.\pipe\
                                                              • API String ID: 3081899298-91387939
                                                              • Opcode ID: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                              • Instruction ID: f057078fdf437363ca3006686a2bf0829581c85bcab3189ee86c3b948c680c9c
                                                              • Opcode Fuzzy Hash: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                              • Instruction Fuzzy Hash: 8551D13220478181E76CEA29A15D3AAE799FBA5B40F440135DEDA03FC9CB3FC6848742
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastWrite
                                                              • String ID: U
                                                              • API String ID: 442123175-4171548499
                                                              • Opcode ID: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                              • Instruction ID: 35ef467bd1b652655df33300a8af76435eb501ed725965b0e419b5e742ae772f
                                                              • Opcode Fuzzy Hash: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                              • Instruction Fuzzy Hash: 74419F76714B8082EB208F25E8483AEB7A4F7A9794F544131EE8D87BD4EB3DC641CB51
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFileHeaderRaise
                                                              • String ID: csm
                                                              • API String ID: 2573137834-1018135373
                                                              • Opcode ID: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                              • Instruction ID: 0e956435bf9f0bef2125082f9e1e6bfa42cb3a6339d934bf258d92915eab66d0
                                                              • Opcode Fuzzy Hash: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                              • Instruction Fuzzy Hash: 06110D36214B8082EB658F25F444359B7E9FB98B94F584225EECD07B99DF3DC691CB00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3388365829.0000023AF32B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32B0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: __std_exception_copy
                                                              • String ID: ierarchy Descriptor'$riptor at (
                                                              • API String ID: 592178966-758928094
                                                              • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                              • Instruction ID: 42c6951a3d5e62022741cb552a0faaa8dc454750388d80c2111df8216ab36858
                                                              • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                              • Instruction Fuzzy Hash: 26E08661640B4491DF058F22E84429873A4DB68B64B989132999C06351FA3CD2E9C301
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3388365829.0000023AF32B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32B0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32b0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: __std_exception_copy
                                                              • String ID: Locator'$riptor at (
                                                              • API String ID: 592178966-4215709766
                                                              • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                              • Instruction ID: 220dd3407894242afa797735461295e715a9582d507b77829c604985c3d977a1
                                                              • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                              • Instruction Fuzzy Hash: E9E08661600B4480DF058F22D8401987364EB68B64F989132C98C06351EA3CD2E5C301
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$AllocFree
                                                              • String ID:
                                                              • API String ID: 756756679-0
                                                              • Opcode ID: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                              • Instruction ID: f1725fcd5410c0a07ce4f1123f09774ab2f82a588070bbaed81ab7e775db846a
                                                              • Opcode Fuzzy Hash: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                              • Instruction Fuzzy Hash: B1118F25701B5481EB08DB66E40A26AB7A5FB99FC0F185034DECD83BA5DE3ED582C701
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000018.00000002.3389377755.0000023AF32E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023AF32E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_24_2_23af32e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Heap$AllocProcess
                                                              • String ID:
                                                              • API String ID: 1617791916-0
                                                              • Opcode ID: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                              • Instruction ID: 1cfd4273923a9902b80302180c9fa92e6bed877094e565062285121f79e1ac25
                                                              • Opcode Fuzzy Hash: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                              • Instruction Fuzzy Hash: 2DE03235B01A0486EB08AB62D80834A36E5FB99F06F0880248989077A1DF7EC699CF91

                                                              Execution Graph

                                                              Execution Coverage:0.7%
                                                              Dynamic/Decrypted Code Coverage:0%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:468
                                                              Total number of Limit Nodes:3
                                                              execution_graph 15169 23c9fd9c0e4 15170 23c9fd9c0fd 15169->15170 15183 23c9fd9c0f9 15169->15183 15184 23c9fd9ec90 15170->15184 15175 23c9fd9c11b 15215 23c9fd9c158 15175->15215 15176 23c9fd9c10f 15210 23c9fd9d744 15176->15210 15180 23c9fd9d744 __free_lconv_num 5 API calls 15181 23c9fd9c142 15180->15181 15182 23c9fd9d744 __free_lconv_num 5 API calls 15181->15182 15182->15183 15185 23c9fd9c102 15184->15185 15186 23c9fd9ec9d 15184->15186 15190 23c9fd9f1ec GetEnvironmentStringsW 15185->15190 15234 23c9fd9cefc 15186->15234 15188 23c9fd9eccc 15251 23c9fd9e968 15188->15251 15191 23c9fd9c107 15190->15191 15192 23c9fd9f21c 15190->15192 15191->15175 15191->15176 15193 23c9fd9f10c WideCharToMultiByte 15192->15193 15194 23c9fd9f26d 15193->15194 15195 23c9fd9f274 FreeEnvironmentStringsW 15194->15195 15196 23c9fd9ca0c 5 API calls 15194->15196 15195->15191 15197 23c9fd9f287 15196->15197 15198 23c9fd9f298 15197->15198 15199 23c9fd9f28f 15197->15199 15201 23c9fd9f10c WideCharToMultiByte 15198->15201 15200 23c9fd9d744 __free_lconv_num 5 API calls 15199->15200 15202 23c9fd9f296 15200->15202 15203 23c9fd9f2bb 15201->15203 15202->15195 15204 23c9fd9f2c9 15203->15204 15205 23c9fd9f2bf 15203->15205 15207 23c9fd9d744 __free_lconv_num 5 API calls 15204->15207 15206 23c9fd9d744 __free_lconv_num 5 API calls 15205->15206 15208 23c9fd9f2c7 FreeEnvironmentStringsW 15206->15208 15207->15208 15208->15191 15211 23c9fd9d749 HeapFree 15210->15211 15212 23c9fd9d77a 15210->15212 15211->15212 15213 23c9fd9d764 __vcrt_FlsSetValue __free_lconv_num 15211->15213 15212->15183 15214 23c9fd9d6ac __std_exception_copy 4 API calls 15213->15214 15214->15212 15216 23c9fd9c17d 15215->15216 15217 23c9fd9d6cc __std_exception_copy 5 API calls 15216->15217 15229 23c9fd9c1b3 15217->15229 15218 23c9fd9c1bb 15219 23c9fd9d744 __free_lconv_num 5 API calls 15218->15219 15220 23c9fd9c123 15219->15220 15220->15180 15221 23c9fd9c22e 15222 23c9fd9d744 __free_lconv_num 5 API calls 15221->15222 15222->15220 15223 23c9fd9d6cc __std_exception_copy 5 API calls 15223->15229 15224 23c9fd9c21d 15697 23c9fd9c268 15224->15697 15228 23c9fd9d744 __free_lconv_num 5 API calls 15228->15218 15229->15218 15229->15221 15229->15223 15229->15224 15230 23c9fd9c253 15229->15230 15231 23c9fd9d744 __free_lconv_num 5 API calls 15229->15231 15688 23c9fd9c6e8 15229->15688 15232 23c9fd9d590 _invalid_parameter_noinfo 6 API calls 15230->15232 15231->15229 15233 23c9fd9c266 15232->15233 15235 23c9fd9cf28 FlsSetValue 15234->15235 15236 23c9fd9cf0d FlsGetValue 15234->15236 15238 23c9fd9cf35 15235->15238 15241 23c9fd9cf1a 15235->15241 15237 23c9fd9cf22 15236->15237 15236->15241 15237->15235 15274 23c9fd9d6cc 15238->15274 15241->15188 15242 23c9fd9cf62 FlsSetValue 15244 23c9fd9cf6e FlsSetValue 15242->15244 15245 23c9fd9cf80 15242->15245 15243 23c9fd9cf52 FlsSetValue 15246 23c9fd9cf5b 15243->15246 15244->15246 15278 23c9fd9cb94 15245->15278 15248 23c9fd9d744 __free_lconv_num 5 API calls 15246->15248 15248->15241 15250 23c9fd9d744 __free_lconv_num 5 API calls 15250->15241 15421 23c9fd9ebd8 15251->15421 15258 23c9fd9e9d3 15259 23c9fd9d744 __free_lconv_num 5 API calls 15258->15259 15273 23c9fd9e9ba 15259->15273 15260 23c9fd9e9e2 15260->15260 15440 23c9fd9ed0c 15260->15440 15263 23c9fd9eade 15264 23c9fd9d6ac __std_exception_copy 5 API calls 15263->15264 15265 23c9fd9eae3 15264->15265 15269 23c9fd9d744 __free_lconv_num 5 API calls 15265->15269 15266 23c9fd9eb39 15268 23c9fd9eba0 15266->15268 15451 23c9fd9e498 15266->15451 15267 23c9fd9eaf8 15267->15266 15270 23c9fd9d744 __free_lconv_num 5 API calls 15267->15270 15272 23c9fd9d744 __free_lconv_num 5 API calls 15268->15272 15269->15273 15270->15266 15272->15273 15273->15185 15277 23c9fd9d6dd __std_exception_copy 15274->15277 15276 23c9fd9cf44 15276->15242 15276->15243 15277->15276 15282 23c9fd9d6ac 15277->15282 15279 23c9fd9cc46 __std_exception_copy 15278->15279 15301 23c9fd9caec 15279->15301 15281 23c9fd9cc5b 15281->15241 15281->15250 15285 23c9fd9cfa0 15282->15285 15284 23c9fd9d6b5 15284->15276 15288 23c9fd9cfb5 __vcrt_FlsSetValue 15285->15288 15286 23c9fd9cfe1 FlsSetValue 15287 23c9fd9cff3 15286->15287 15291 23c9fd9cfd1 _CreateFrameInfo 15286->15291 15289 23c9fd9d6cc __std_exception_copy HeapFree 15287->15289 15288->15286 15288->15291 15290 23c9fd9d002 15289->15290 15292 23c9fd9d020 FlsSetValue 15290->15292 15293 23c9fd9d010 FlsSetValue 15290->15293 15291->15284 15295 23c9fd9d03e 15292->15295 15296 23c9fd9d02c FlsSetValue 15292->15296 15294 23c9fd9d019 15293->15294 15297 23c9fd9d744 __free_lconv_num HeapFree 15294->15297 15298 23c9fd9cb94 __std_exception_copy HeapFree 15295->15298 15296->15294 15297->15291 15299 23c9fd9d046 15298->15299 15300 23c9fd9d744 __free_lconv_num HeapFree 15299->15300 15300->15291 15302 23c9fd9cb08 15301->15302 15305 23c9fd9cd7c 15302->15305 15304 23c9fd9cb1e 15304->15281 15306 23c9fd9cdc4 Concurrency::details::SchedulerProxy::DeleteThis 15305->15306 15307 23c9fd9cd98 Concurrency::details::SchedulerProxy::DeleteThis 15305->15307 15306->15304 15307->15306 15309 23c9fda07b4 15307->15309 15310 23c9fda0850 15309->15310 15313 23c9fda07d7 15309->15313 15311 23c9fda08a3 15310->15311 15314 23c9fd9d744 __free_lconv_num 5 API calls 15310->15314 15375 23c9fda0954 15311->15375 15313->15310 15315 23c9fda0816 15313->15315 15320 23c9fd9d744 __free_lconv_num 5 API calls 15313->15320 15316 23c9fda0874 15314->15316 15317 23c9fda0838 15315->15317 15323 23c9fd9d744 __free_lconv_num 5 API calls 15315->15323 15318 23c9fd9d744 __free_lconv_num 5 API calls 15316->15318 15319 23c9fd9d744 __free_lconv_num 5 API calls 15317->15319 15321 23c9fda0888 15318->15321 15325 23c9fda0844 15319->15325 15326 23c9fda080a 15320->15326 15322 23c9fd9d744 __free_lconv_num 5 API calls 15321->15322 15328 23c9fda0897 15322->15328 15329 23c9fda082c 15323->15329 15324 23c9fda090e 15330 23c9fd9d744 __free_lconv_num 5 API calls 15325->15330 15335 23c9fda2fc8 15326->15335 15327 23c9fda08af 15327->15324 15334 23c9fd9d744 5 API calls __free_lconv_num 15327->15334 15332 23c9fd9d744 __free_lconv_num 5 API calls 15328->15332 15363 23c9fda30d4 15329->15363 15330->15310 15332->15311 15334->15327 15336 23c9fda2fd1 15335->15336 15361 23c9fda30cc 15335->15361 15337 23c9fda2feb 15336->15337 15338 23c9fd9d744 __free_lconv_num 5 API calls 15336->15338 15339 23c9fda2ffd 15337->15339 15340 23c9fd9d744 __free_lconv_num 5 API calls 15337->15340 15338->15337 15341 23c9fda300f 15339->15341 15342 23c9fd9d744 __free_lconv_num 5 API calls 15339->15342 15340->15339 15343 23c9fda3021 15341->15343 15344 23c9fd9d744 __free_lconv_num 5 API calls 15341->15344 15342->15341 15345 23c9fda3033 15343->15345 15347 23c9fd9d744 __free_lconv_num 5 API calls 15343->15347 15344->15343 15346 23c9fda3045 15345->15346 15348 23c9fd9d744 __free_lconv_num 5 API calls 15345->15348 15349 23c9fda3057 15346->15349 15350 23c9fd9d744 __free_lconv_num 5 API calls 15346->15350 15347->15345 15348->15346 15351 23c9fda3069 15349->15351 15352 23c9fd9d744 __free_lconv_num 5 API calls 15349->15352 15350->15349 15353 23c9fd9d744 __free_lconv_num 5 API calls 15351->15353 15354 23c9fda307b 15351->15354 15352->15351 15353->15354 15355 23c9fda308d 15354->15355 15356 23c9fd9d744 __free_lconv_num 5 API calls 15354->15356 15357 23c9fda30a2 15355->15357 15358 23c9fd9d744 __free_lconv_num 5 API calls 15355->15358 15356->15355 15359 23c9fda30b7 15357->15359 15360 23c9fd9d744 __free_lconv_num 5 API calls 15357->15360 15358->15357 15359->15361 15362 23c9fd9d744 __free_lconv_num 5 API calls 15359->15362 15360->15359 15361->15315 15362->15361 15364 23c9fda30d9 15363->15364 15373 23c9fda313a 15363->15373 15365 23c9fd9d744 __free_lconv_num 5 API calls 15364->15365 15367 23c9fda30f2 15364->15367 15365->15367 15366 23c9fda3104 15369 23c9fda3116 15366->15369 15370 23c9fd9d744 __free_lconv_num 5 API calls 15366->15370 15367->15366 15368 23c9fd9d744 __free_lconv_num 5 API calls 15367->15368 15368->15366 15371 23c9fda3128 15369->15371 15372 23c9fd9d744 __free_lconv_num 5 API calls 15369->15372 15370->15369 15371->15373 15374 23c9fd9d744 __free_lconv_num 5 API calls 15371->15374 15372->15371 15373->15317 15374->15373 15376 23c9fda0959 15375->15376 15377 23c9fda0985 15375->15377 15376->15377 15381 23c9fda3174 15376->15381 15377->15327 15380 23c9fd9d744 __free_lconv_num 5 API calls 15380->15377 15382 23c9fda097d 15381->15382 15383 23c9fda317d 15381->15383 15382->15380 15417 23c9fda3140 15383->15417 15386 23c9fda3140 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 15387 23c9fda31a6 15386->15387 15388 23c9fda3140 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 15387->15388 15389 23c9fda31b4 15388->15389 15390 23c9fda3140 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 15389->15390 15391 23c9fda31c2 15390->15391 15392 23c9fda3140 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 15391->15392 15393 23c9fda31d1 15392->15393 15394 23c9fd9d744 __free_lconv_num 5 API calls 15393->15394 15395 23c9fda31dd 15394->15395 15396 23c9fd9d744 __free_lconv_num 5 API calls 15395->15396 15397 23c9fda31e9 15396->15397 15398 23c9fd9d744 __free_lconv_num 5 API calls 15397->15398 15399 23c9fda31f5 15398->15399 15400 23c9fda3140 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 15399->15400 15401 23c9fda3203 15400->15401 15402 23c9fda3140 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 15401->15402 15403 23c9fda3211 15402->15403 15404 23c9fda3140 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 15403->15404 15405 23c9fda321f 15404->15405 15406 23c9fda3140 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 15405->15406 15407 23c9fda322d 15406->15407 15408 23c9fda3140 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 15407->15408 15409 23c9fda323c 15408->15409 15410 23c9fd9d744 __free_lconv_num 5 API calls 15409->15410 15411 23c9fda3248 15410->15411 15412 23c9fd9d744 __free_lconv_num 5 API calls 15411->15412 15413 23c9fda3254 15412->15413 15414 23c9fd9d744 __free_lconv_num 5 API calls 15413->15414 15415 23c9fda3260 15414->15415 15416 23c9fd9d744 __free_lconv_num 5 API calls 15415->15416 15416->15382 15418 23c9fda3156 15417->15418 15419 23c9fda3167 15417->15419 15418->15419 15420 23c9fd9d744 __free_lconv_num 5 API calls 15418->15420 15419->15386 15420->15418 15423 23c9fd9ebfb 15421->15423 15422 23c9fd9ec05 15425 23c9fd9cefc 10 API calls 15422->15425 15428 23c9fd9e99d 15422->15428 15423->15422 15424 23c9fd9d744 __free_lconv_num 5 API calls 15423->15424 15424->15422 15426 23c9fd9eccc 15425->15426 15427 23c9fd9e968 41 API calls 15426->15427 15427->15428 15429 23c9fd9e668 15428->15429 15463 23c9fd9e1b4 15429->15463 15432 23c9fd9e69a 15434 23c9fd9e69f GetACP 15432->15434 15435 23c9fd9e6af 15432->15435 15433 23c9fd9e688 GetOEMCP 15433->15435 15434->15435 15435->15273 15436 23c9fd9ca0c 15435->15436 15439 23c9fd9ca1b __std_exception_copy 15436->15439 15437 23c9fd9d6ac __std_exception_copy 5 API calls 15438 23c9fd9ca55 15437->15438 15438->15258 15438->15260 15439->15437 15439->15438 15441 23c9fd9e668 17 API calls 15440->15441 15442 23c9fd9ed39 15441->15442 15443 23c9fd9ed76 IsValidCodePage 15442->15443 15448 23c9fd9ee8f 15442->15448 15450 23c9fd9ed90 15442->15450 15445 23c9fd9ed87 15443->15445 15443->15448 15447 23c9fd9edb6 GetCPInfo 15445->15447 15445->15450 15446 23c9fd9ead5 15446->15263 15446->15267 15447->15448 15447->15450 15537 23c9fd97940 15448->15537 15526 23c9fd9e780 15450->15526 15453 23c9fd9e4b4 15451->15453 15452 23c9fd9d6ac __std_exception_copy 5 API calls 15454 23c9fd9e550 15452->15454 15453->15452 15456 23c9fd9e4e1 15453->15456 15620 23c9fd9d570 15454->15620 15457 23c9fd9d6ac __std_exception_copy 5 API calls 15456->15457 15461 23c9fd9e593 15456->15461 15458 23c9fd9e5f1 15457->15458 15459 23c9fd9d570 _invalid_parameter_noinfo 24 API calls 15458->15459 15459->15461 15460 23c9fd9e62d 15460->15268 15461->15460 15462 23c9fd9d744 __free_lconv_num 5 API calls 15461->15462 15462->15460 15464 23c9fd9e1d8 15463->15464 15470 23c9fd9e1d3 15463->15470 15464->15470 15471 23c9fd9ce28 15464->15471 15466 23c9fd9e1f3 15506 23c9fda03fc 15466->15506 15470->15432 15470->15433 15472 23c9fd9ce3d __vcrt_FlsSetValue 15471->15472 15473 23c9fd9ce69 FlsSetValue 15472->15473 15474 23c9fd9ce4c FlsGetValue 15472->15474 15476 23c9fd9ce7b 15473->15476 15489 23c9fd9ce59 _CreateFrameInfo 15473->15489 15475 23c9fd9ce63 15474->15475 15474->15489 15475->15473 15477 23c9fd9d6cc __std_exception_copy 5 API calls 15476->15477 15478 23c9fd9ce8a 15477->15478 15479 23c9fd9cea8 FlsSetValue 15478->15479 15480 23c9fd9ce98 FlsSetValue 15478->15480 15481 23c9fd9cec6 15479->15481 15482 23c9fd9ceb4 FlsSetValue 15479->15482 15484 23c9fd9cea1 15480->15484 15485 23c9fd9cb94 __std_exception_copy 5 API calls 15481->15485 15482->15484 15483 23c9fd9cee2 15483->15466 15486 23c9fd9d744 __free_lconv_num 5 API calls 15484->15486 15487 23c9fd9cece 15485->15487 15486->15489 15488 23c9fd9d744 __free_lconv_num 5 API calls 15487->15488 15488->15489 15489->15483 15490 23c9fd9cf28 FlsSetValue 15489->15490 15491 23c9fd9cf0d FlsGetValue 15489->15491 15493 23c9fd9cf35 15490->15493 15496 23c9fd9cf1a 15490->15496 15492 23c9fd9cf22 15491->15492 15491->15496 15492->15490 15494 23c9fd9d6cc __std_exception_copy 5 API calls 15493->15494 15495 23c9fd9cf44 15494->15495 15497 23c9fd9cf62 FlsSetValue 15495->15497 15498 23c9fd9cf52 FlsSetValue 15495->15498 15496->15466 15499 23c9fd9cf6e FlsSetValue 15497->15499 15500 23c9fd9cf80 15497->15500 15501 23c9fd9cf5b 15498->15501 15499->15501 15502 23c9fd9cb94 __std_exception_copy 5 API calls 15500->15502 15503 23c9fd9d744 __free_lconv_num 5 API calls 15501->15503 15504 23c9fd9cf88 15502->15504 15503->15496 15504->15496 15505 23c9fd9d744 __free_lconv_num 5 API calls 15504->15505 15505->15496 15507 23c9fd9e216 15506->15507 15508 23c9fda0411 15506->15508 15510 23c9fda0468 15507->15510 15508->15507 15514 23c9fda0a5c 15508->15514 15511 23c9fda047d 15510->15511 15512 23c9fda0490 15510->15512 15511->15512 15523 23c9fd9ecf0 15511->15523 15512->15470 15515 23c9fd9ce28 _invalid_parameter_noinfo 15 API calls 15514->15515 15516 23c9fda0a6b 15515->15516 15518 23c9fda0aa4 15516->15518 15519 23c9fda0acc 15516->15519 15518->15507 15520 23c9fda0ade Concurrency::details::SchedulerProxy::DeleteThis 15519->15520 15522 23c9fda0aeb 15519->15522 15521 23c9fda07b4 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 15520->15521 15520->15522 15521->15522 15522->15518 15524 23c9fd9ce28 _invalid_parameter_noinfo 15 API calls 15523->15524 15525 23c9fd9ecf9 15524->15525 15527 23c9fd9e7bd GetCPInfo 15526->15527 15529 23c9fd9e8b3 15526->15529 15528 23c9fd9e7d0 15527->15528 15527->15529 15542 23c9fda1544 15528->15542 15530 23c9fd97940 _log10_special RtlVirtualUnwind 15529->15530 15532 23c9fd9e952 15530->15532 15532->15448 15538 23c9fd97949 _log10_special 15537->15538 15539 23c9fd97954 15538->15539 15616 23c9fd98320 15538->15616 15539->15446 15541 23c9fd98157 15541->15446 15543 23c9fd9e1b4 15 API calls 15542->15543 15544 23c9fda1586 15543->15544 15562 23c9fd9f07c 15544->15562 15564 23c9fd9f085 MultiByteToWideChar 15562->15564 15617 23c9fd98331 capture_previous_context 15616->15617 15618 23c9fd98389 15617->15618 15619 23c9fd98350 RtlVirtualUnwind 15617->15619 15618->15541 15619->15617 15619->15618 15623 23c9fd9d408 15620->15623 15624 23c9fd9d433 15623->15624 15631 23c9fd9d4a4 15624->15631 15626 23c9fd9d45a 15627 23c9fd9d47d 15626->15627 15639 23c9fd9c7a0 15626->15639 15629 23c9fd9d492 15627->15629 15630 23c9fd9c7a0 _invalid_parameter_noinfo 18 API calls 15627->15630 15629->15456 15630->15629 15650 23c9fd9d1ec 15631->15650 15633 23c9fd9d4ce _invalid_parameter_noinfo 15634 23c9fd9d4df _invalid_parameter_noinfo 15633->15634 15654 23c9fd9d590 15633->15654 15634->15626 15640 23c9fd9c7f8 15639->15640 15641 23c9fd9c7af __vcrt_FlsSetValue 15639->15641 15640->15627 15642 23c9fd9d068 _invalid_parameter_noinfo 8 API calls 15641->15642 15643 23c9fd9c7de _CreateFrameInfo 15642->15643 15643->15640 15644 23c9fd9c7a0 _invalid_parameter_noinfo 18 API calls 15643->15644 15645 23c9fd9c827 15644->15645 15680 23c9fda0430 15645->15680 15651 23c9fd9d208 __vcrt_FlsSetValue 15650->15651 15653 23c9fd9d233 _CreateFrameInfo 15650->15653 15659 23c9fd9d068 15651->15659 15653->15633 15655 23c9fd9d59f _log10_special 15654->15655 15673 23c9fd9d2a4 15655->15673 15657 23c9fd9d5be _invalid_parameter_noinfo 15658 23c9fd9d5c4 TerminateProcess 15657->15658 15660 23c9fd9d087 FlsGetValue 15659->15660 15662 23c9fd9d09c 15659->15662 15661 23c9fd9d094 15660->15661 15660->15662 15661->15653 15662->15661 15663 23c9fd9d6cc __std_exception_copy 5 API calls 15662->15663 15664 23c9fd9d0be 15663->15664 15665 23c9fd9d0dc FlsSetValue 15664->15665 15668 23c9fd9d0cc 15664->15668 15666 23c9fd9d0fa 15665->15666 15667 23c9fd9d0e8 FlsSetValue 15665->15667 15669 23c9fd9cb94 __std_exception_copy 5 API calls 15666->15669 15667->15668 15670 23c9fd9d744 __free_lconv_num 5 API calls 15668->15670 15671 23c9fd9d102 15669->15671 15670->15661 15672 23c9fd9d744 __free_lconv_num 5 API calls 15671->15672 15672->15661 15674 23c9fd9d2de capture_previous_context _invalid_parameter_noinfo 15673->15674 15675 23c9fd9d376 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 15674->15675 15676 23c9fd9d340 RtlVirtualUnwind 15674->15676 15677 23c9fd9d3c8 _invalid_parameter_noinfo 15675->15677 15676->15675 15678 23c9fd97940 _log10_special RtlVirtualUnwind 15677->15678 15679 23c9fd9d3e7 15678->15679 15679->15657 15681 23c9fda0449 15680->15681 15682 23c9fd9c84f 15680->15682 15681->15682 15683 23c9fda0a5c _invalid_parameter_noinfo 15 API calls 15681->15683 15684 23c9fda049c 15682->15684 15683->15682 15685 23c9fda04b5 15684->15685 15686 23c9fd9c85f 15684->15686 15685->15686 15687 23c9fd9ecf0 _invalid_parameter_noinfo 15 API calls 15685->15687 15686->15627 15687->15686 15689 23c9fd9c6f5 15688->15689 15690 23c9fd9c6ff 15688->15690 15689->15690 15695 23c9fd9c71a 15689->15695 15691 23c9fd9d6ac __std_exception_copy 5 API calls 15690->15691 15692 23c9fd9c706 15691->15692 15693 23c9fd9d570 _invalid_parameter_noinfo 24 API calls 15692->15693 15694 23c9fd9c712 15693->15694 15694->15229 15695->15694 15696 23c9fd9d6ac __std_exception_copy 5 API calls 15695->15696 15696->15692 15698 23c9fd9c225 15697->15698 15699 23c9fd9c26d 15697->15699 15698->15228 15700 23c9fd9c296 15699->15700 15702 23c9fd9d744 __free_lconv_num 5 API calls 15699->15702 15701 23c9fd9d744 __free_lconv_num 5 API calls 15700->15701 15701->15698 15702->15699 15703 23c9fd6273c 15705 23c9fd6276a 15703->15705 15704 23c9fd62858 LoadLibraryA 15704->15705 15705->15704 15706 23c9fd628d4 15705->15706 15707 23c9fd91abc 15712 23c9fd91628 GetProcessHeap 15707->15712 15709 23c9fd91ad2 Sleep SleepEx 15710 23c9fd91acb 15709->15710 15710->15709 15711 23c9fd91598 StrCmpIW StrCmpW 15710->15711 15711->15710 15713 23c9fd91648 __std_exception_copy 15712->15713 15757 23c9fd91268 GetProcessHeap 15713->15757 15715 23c9fd91650 15716 23c9fd91268 2 API calls 15715->15716 15717 23c9fd91661 15716->15717 15718 23c9fd91268 2 API calls 15717->15718 15719 23c9fd9166a 15718->15719 15720 23c9fd91268 2 API calls 15719->15720 15721 23c9fd91673 15720->15721 15722 23c9fd9168e RegOpenKeyExW 15721->15722 15723 23c9fd918a6 15722->15723 15724 23c9fd916c0 RegOpenKeyExW 15722->15724 15723->15710 15725 23c9fd916e9 15724->15725 15726 23c9fd916ff RegOpenKeyExW 15724->15726 15761 23c9fd912bc RegQueryInfoKeyW 15725->15761 15728 23c9fd9173a RegOpenKeyExW 15726->15728 15729 23c9fd91723 15726->15729 15731 23c9fd91775 RegOpenKeyExW 15728->15731 15732 23c9fd9175e 15728->15732 15772 23c9fd9104c RegQueryInfoKeyW 15729->15772 15736 23c9fd91799 15731->15736 15737 23c9fd917b0 RegOpenKeyExW 15731->15737 15735 23c9fd912bc 13 API calls 15732->15735 15738 23c9fd9176b RegCloseKey 15735->15738 15739 23c9fd912bc 13 API calls 15736->15739 15740 23c9fd917d4 15737->15740 15741 23c9fd917eb RegOpenKeyExW 15737->15741 15738->15731 15742 23c9fd917a6 RegCloseKey 15739->15742 15743 23c9fd912bc 13 API calls 15740->15743 15744 23c9fd91826 RegOpenKeyExW 15741->15744 15745 23c9fd9180f 15741->15745 15742->15737 15749 23c9fd917e1 RegCloseKey 15743->15749 15747 23c9fd9184a 15744->15747 15748 23c9fd91861 RegOpenKeyExW 15744->15748 15746 23c9fd9104c 5 API calls 15745->15746 15750 23c9fd9181c RegCloseKey 15746->15750 15751 23c9fd9104c 5 API calls 15747->15751 15752 23c9fd91885 15748->15752 15753 23c9fd9189c RegCloseKey 15748->15753 15749->15741 15750->15744 15754 23c9fd91857 RegCloseKey 15751->15754 15755 23c9fd9104c 5 API calls 15752->15755 15753->15723 15754->15748 15756 23c9fd91892 RegCloseKey 15755->15756 15756->15753 15778 23c9fda6168 15757->15778 15759 23c9fd91283 GetProcessHeap 15760 23c9fd912ae __std_exception_copy 15759->15760 15760->15715 15762 23c9fd91327 GetProcessHeap 15761->15762 15763 23c9fd9148a RegCloseKey 15761->15763 15764 23c9fd9133e __std_exception_copy 15762->15764 15763->15726 15765 23c9fd91476 GetProcessHeap HeapFree 15764->15765 15766 23c9fd91352 RegEnumValueW 15764->15766 15768 23c9fd9141e lstrlenW GetProcessHeap 15764->15768 15769 23c9fd913d3 GetProcessHeap 15764->15769 15770 23c9fd913f3 GetProcessHeap HeapFree 15764->15770 15771 23c9fd91443 StrCpyW 15764->15771 15780 23c9fd9152c 15764->15780 15765->15763 15766->15764 15768->15764 15769->15764 15770->15768 15771->15764 15773 23c9fd911b5 RegCloseKey 15772->15773 15776 23c9fd910bf __std_exception_copy 15772->15776 15773->15728 15774 23c9fd910cf RegEnumValueW 15774->15776 15775 23c9fd9114e GetProcessHeap 15775->15776 15776->15773 15776->15774 15776->15775 15777 23c9fd9116e GetProcessHeap HeapFree 15776->15777 15777->15776 15779 23c9fda6177 15778->15779 15781 23c9fd9157c 15780->15781 15784 23c9fd91546 15780->15784 15781->15764 15782 23c9fd91565 StrCmpW 15782->15784 15783 23c9fd9155d StrCmpIW 15783->15784 15784->15781 15784->15782 15784->15783

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Heap$AllocProcess
                                                              • String ID:
                                                              • API String ID: 1617791916-0
                                                              • Opcode ID: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                              • Instruction ID: cbded6a7cf5b7805f93012bc6e9f91fd45a45d9c4a0ce9048524cc3669026ffc
                                                              • Opcode Fuzzy Hash: baed807eea30b690d22ace55785552a5eee2cb9bee48e50401e6fb7d80347597
                                                              • Instruction Fuzzy Hash: 41E06D3B601704C6EB058F62D80C36A3AE1FB89F0AF16C024CA0907351DF7DC599C750

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: EnvironmentFreeStrings$Heap$AllocErrorLast
                                                              • String ID:
                                                              • API String ID: 3331406755-0
                                                              • Opcode ID: 987753ff894a599cb567346e89517f1ee9597d4cd7e0ed4d9062b173d8f816d4
                                                              • Instruction ID: f6557c66b56c6872ac1de7e600478dd8ff0236ec382c4d22c79d246fffc99fc4
                                                              • Opcode Fuzzy Hash: 987753ff894a599cb567346e89517f1ee9597d4cd7e0ed4d9062b173d8f816d4
                                                              • Instruction Fuzzy Hash: FC31D933225B50C1EB24DF61644437A7794F784FD5F694225E98AA3BC5DF3CC6918304

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                              • String ID:
                                                              • API String ID: 1683269324-0
                                                              • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                              • Instruction ID: 55455f91b24e61534834da54e7534c5b240e236b9e7244e17661c136f86b0d8f
                                                              • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                              • Instruction Fuzzy Hash: 5211803361274082FB60BFB1F84D3792298AF55747F724129D91AA2591EF7CC3C48354

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 0000023C9FD91628: GetProcessHeap.KERNEL32 ref: 0000023C9FD91633
                                                                • Part of subcall function 0000023C9FD91628: HeapAlloc.KERNEL32 ref: 0000023C9FD91642
                                                                • Part of subcall function 0000023C9FD91628: RegOpenKeyExW.ADVAPI32 ref: 0000023C9FD916B2
                                                                • Part of subcall function 0000023C9FD91628: RegOpenKeyExW.ADVAPI32 ref: 0000023C9FD916DF
                                                                • Part of subcall function 0000023C9FD91628: RegCloseKey.ADVAPI32 ref: 0000023C9FD916F9
                                                                • Part of subcall function 0000023C9FD91628: RegOpenKeyExW.ADVAPI32 ref: 0000023C9FD91719
                                                                • Part of subcall function 0000023C9FD91628: RegCloseKey.ADVAPI32 ref: 0000023C9FD91734
                                                                • Part of subcall function 0000023C9FD91628: RegOpenKeyExW.ADVAPI32 ref: 0000023C9FD91754
                                                                • Part of subcall function 0000023C9FD91628: RegCloseKey.ADVAPI32 ref: 0000023C9FD9176F
                                                                • Part of subcall function 0000023C9FD91628: RegOpenKeyExW.ADVAPI32 ref: 0000023C9FD9178F
                                                                • Part of subcall function 0000023C9FD91628: RegCloseKey.ADVAPI32 ref: 0000023C9FD917AA
                                                                • Part of subcall function 0000023C9FD91628: RegOpenKeyExW.ADVAPI32 ref: 0000023C9FD917CA
                                                              • Sleep.KERNEL32 ref: 0000023C9FD91AD7
                                                              • SleepEx.KERNELBASE ref: 0000023C9FD91ADD
                                                                • Part of subcall function 0000023C9FD91628: RegCloseKey.ADVAPI32 ref: 0000023C9FD917E5
                                                                • Part of subcall function 0000023C9FD91628: RegOpenKeyExW.ADVAPI32 ref: 0000023C9FD91805
                                                                • Part of subcall function 0000023C9FD91628: RegCloseKey.ADVAPI32 ref: 0000023C9FD91820
                                                                • Part of subcall function 0000023C9FD91628: RegOpenKeyExW.ADVAPI32 ref: 0000023C9FD91840
                                                                • Part of subcall function 0000023C9FD91628: RegCloseKey.ADVAPI32 ref: 0000023C9FD9185B
                                                                • Part of subcall function 0000023C9FD91628: RegOpenKeyExW.ADVAPI32 ref: 0000023C9FD9187B
                                                                • Part of subcall function 0000023C9FD91628: RegCloseKey.ADVAPI32 ref: 0000023C9FD91896
                                                                • Part of subcall function 0000023C9FD91628: RegCloseKey.ADVAPI32 ref: 0000023C9FD918A0
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CloseOpen$HeapSleep$AllocProcess
                                                              • String ID:
                                                              • API String ID: 1534210851-0
                                                              • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                              • Instruction ID: e86c9777ab782df55b82f34e4b551db4e7b06d2da40f16e4b0d0133f8a38cfbe
                                                              • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                              • Instruction Fuzzy Hash: A831236320274141FF519F66D6493B913A5AB45BCBF266421CE09A72D5FF1CCAD1C310

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 89 23c9fd93844-23c9fd9384f 90 23c9fd93869-23c9fd93870 89->90 91 23c9fd93851-23c9fd93864 StrCmpNIW 89->91 91->90 92 23c9fd93866 91->92 92->90
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: dialer
                                                              • API String ID: 0-3528709123
                                                              • Opcode ID: 65427932a6511f3c8dca5889eed1792e2f2e2d3e0b30565664b7cb78ea33e46c
                                                              • Instruction ID: b64d195b827d9c602696f12b174718a7dbec88416db533b65e07794dea540fe7
                                                              • Opcode Fuzzy Hash: 65427932a6511f3c8dca5889eed1792e2f2e2d3e0b30565664b7cb78ea33e46c
                                                              • Instruction Fuzzy Hash: E9D05E623127058AFB149FE688CC7742355AB18B4AFD94020C90011150DB5DCADE9710

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 93 23c9fd6273c-23c9fd627a4 call 23c9fd629d4 * 4 102 23c9fd629b2 93->102 103 23c9fd627aa-23c9fd627ad 93->103 104 23c9fd629b4-23c9fd629d0 102->104 103->102 105 23c9fd627b3-23c9fd627b6 103->105 105->102 106 23c9fd627bc-23c9fd627bf 105->106 106->102 107 23c9fd627c5-23c9fd627e6 106->107 107->102 109 23c9fd627ec-23c9fd6280c 107->109 110 23c9fd6280e-23c9fd62836 109->110 111 23c9fd62838-23c9fd6283f 109->111 110->110 110->111 112 23c9fd628df-23c9fd628e6 111->112 113 23c9fd62845-23c9fd62852 111->113 115 23c9fd62992-23c9fd629b0 112->115 116 23c9fd628ec-23c9fd62901 112->116 113->112 114 23c9fd62858-23c9fd6286a LoadLibraryA 113->114 118 23c9fd6286c-23c9fd62878 114->118 119 23c9fd628ca-23c9fd628d2 114->119 115->104 116->115 117 23c9fd62907 116->117 120 23c9fd6290d-23c9fd62921 117->120 121 23c9fd628c5-23c9fd628c8 118->121 119->114 122 23c9fd628d4-23c9fd628d9 119->122 124 23c9fd62982-23c9fd6298c 120->124 125 23c9fd62923-23c9fd62934 120->125 121->119 126 23c9fd6287a-23c9fd6287d 121->126 122->112 124->115 124->120 128 23c9fd6293f-23c9fd62943 125->128 129 23c9fd62936-23c9fd6293d 125->129 130 23c9fd6287f-23c9fd628a5 126->130 131 23c9fd628a7-23c9fd628b7 126->131 133 23c9fd6294d-23c9fd62951 128->133 134 23c9fd62945-23c9fd6294b 128->134 132 23c9fd62970-23c9fd62980 129->132 135 23c9fd628ba-23c9fd628c1 130->135 131->135 132->124 132->125 136 23c9fd62963-23c9fd62967 133->136 137 23c9fd62953-23c9fd62961 133->137 134->132 135->121 136->132 139 23c9fd62969-23c9fd6296c 136->139 137->132 139->132
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3381516680.0000023C9FD60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD60000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd60000_svchost.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID:
                                                              • API String ID: 1029625771-0
                                                              • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                              • Instruction ID: 3a619fa86ca54a05c4de5bba6d8deee738dfcef4faeac7959e32349048c00175
                                                              • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                              • Instruction Fuzzy Hash: 4161F233B0179087DF54CF15980873DB3A2FB95BA6F698126DE5927B88DA3CD952C700

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 399 23c9fd92b2c-23c9fd92ba5 call 23c9fdb2ce0 402 23c9fd92bab-23c9fd92bb1 399->402 403 23c9fd92ee0-23c9fd92f03 399->403 402->403 404 23c9fd92bb7-23c9fd92bba 402->404 404->403 405 23c9fd92bc0-23c9fd92bc3 404->405 405->403 406 23c9fd92bc9-23c9fd92bd9 GetModuleHandleA 405->406 407 23c9fd92bdb-23c9fd92beb call 23c9fda6090 406->407 408 23c9fd92bed 406->408 410 23c9fd92bf0-23c9fd92c0e 407->410 408->410 410->403 413 23c9fd92c14-23c9fd92c33 StrCmpNIW 410->413 413->403 414 23c9fd92c39-23c9fd92c3d 413->414 414->403 415 23c9fd92c43-23c9fd92c4d 414->415 415->403 416 23c9fd92c53-23c9fd92c5a 415->416 416->403 417 23c9fd92c60-23c9fd92c73 416->417 418 23c9fd92c75-23c9fd92c81 417->418 419 23c9fd92c83 417->419 420 23c9fd92c86-23c9fd92c8a 418->420 419->420 421 23c9fd92c9a 420->421 422 23c9fd92c8c-23c9fd92c98 420->422 423 23c9fd92c9d-23c9fd92ca7 421->423 422->423 424 23c9fd92d9d-23c9fd92da1 423->424 425 23c9fd92cad-23c9fd92cb0 423->425 428 23c9fd92da7-23c9fd92daa 424->428 429 23c9fd92ed2-23c9fd92eda 424->429 426 23c9fd92cc2-23c9fd92ccc 425->426 427 23c9fd92cb2-23c9fd92cbf call 23c9fd9199c 425->427 433 23c9fd92cce-23c9fd92cdb 426->433 434 23c9fd92d00-23c9fd92d0a 426->434 427->426 430 23c9fd92dbb-23c9fd92dc5 428->430 431 23c9fd92dac-23c9fd92db8 call 23c9fd9199c 428->431 429->403 429->417 436 23c9fd92df5-23c9fd92df8 430->436 437 23c9fd92dc7-23c9fd92dd4 430->437 431->430 433->434 439 23c9fd92cdd-23c9fd92cea 433->439 440 23c9fd92d3a-23c9fd92d3d 434->440 441 23c9fd92d0c-23c9fd92d19 434->441 446 23c9fd92e05-23c9fd92e12 lstrlenW 436->446 447 23c9fd92dfa-23c9fd92e03 call 23c9fd91bbc 436->447 437->436 445 23c9fd92dd6-23c9fd92de3 437->445 448 23c9fd92ced-23c9fd92cf3 439->448 443 23c9fd92d4b-23c9fd92d58 lstrlenW 440->443 444 23c9fd92d3f-23c9fd92d49 call 23c9fd91bbc 440->444 441->440 449 23c9fd92d1b-23c9fd92d28 441->449 451 23c9fd92d7b-23c9fd92d8d call 23c9fd93844 443->451 452 23c9fd92d5a-23c9fd92d64 443->452 444->443 456 23c9fd92d93-23c9fd92d98 444->456 453 23c9fd92de6-23c9fd92dec 445->453 457 23c9fd92e35-23c9fd92e3f call 23c9fd93844 446->457 458 23c9fd92e14-23c9fd92e1e 446->458 447->446 464 23c9fd92e4a-23c9fd92e55 447->464 455 23c9fd92cf9-23c9fd92cfe 448->455 448->456 459 23c9fd92d2b-23c9fd92d31 449->459 451->456 468 23c9fd92e42-23c9fd92e44 451->468 452->451 463 23c9fd92d66-23c9fd92d79 call 23c9fd9152c 452->463 453->464 465 23c9fd92dee-23c9fd92df3 453->465 455->434 455->448 456->468 457->468 458->457 469 23c9fd92e20-23c9fd92e33 call 23c9fd9152c 458->469 459->456 460 23c9fd92d33-23c9fd92d38 459->460 460->440 460->459 463->451 463->456 471 23c9fd92e57-23c9fd92e5b 464->471 472 23c9fd92ecc-23c9fd92ed0 464->472 465->436 465->453 468->429 468->464 469->457 469->464 477 23c9fd92e5d-23c9fd92e61 471->477 478 23c9fd92e63-23c9fd92e7d call 23c9fd985c0 471->478 472->429 477->478 480 23c9fd92e80-23c9fd92e83 477->480 478->480 483 23c9fd92e85-23c9fd92ea3 call 23c9fd985c0 480->483 484 23c9fd92ea6-23c9fd92ea9 480->484 483->484 484->472 485 23c9fd92eab-23c9fd92ec9 call 23c9fd985c0 484->485 485->472
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                              • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                              • API String ID: 2119608203-3850299575
                                                              • Opcode ID: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                              • Instruction ID: c7ee9107203d44bdf36ae34525c02def78a0d96f8ae86e0cdae0ec7bb850561a
                                                              • Opcode Fuzzy Hash: 9c3d18d3d08cd52b53439cd9635d78b514e0dbb1c6aaf52094b9259375ebc022
                                                              • Instruction Fuzzy Hash: A4B1C323212B5082EB59DFA5D4487B963A4FB46B97F66501AEE0963794DF3DCEC0C340
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 3140674995-0
                                                              • Opcode ID: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                              • Instruction ID: b66be5f753f9a1e6a56771ef2465323605b3be2834fbd8b588db6c5ca349ed3b
                                                              • Opcode Fuzzy Hash: 781d1b9bde8934adc12bfa83d35ad1be64d2520f1bd2f9e02f1b4bb1ea1a0257
                                                              • Instruction Fuzzy Hash: 6A313E73205B80CAEB609F60E8447ED7364F784749F55442ADA5E67B98EF3CC648C714
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 1239891234-0
                                                              • Opcode ID: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                              • Instruction ID: f9ba92a2141ec3dc68b3688644f0a3304593a1e55a1c8035841cfe0f429b0bd5
                                                              • Opcode Fuzzy Hash: 056b8809331e045eb0ff6df28b8a67c6be047fb713c0be5e5acd4a9b147221bc
                                                              • Instruction Fuzzy Hash: 3F317133215F8086DB60DF65E8443AE73A0F789B5AF650225EA9D53B98DF3CC695CB00

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                              • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                              • API String ID: 106492572-2879589442
                                                              • Opcode ID: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                              • Instruction ID: 00ff3e7dc70780f66e364e3fffae47cb081e8ce491ffe87b295e596850d53c96
                                                              • Opcode Fuzzy Hash: 29d8c56dd48d9a3b38e8b79419d4f3e68f34e96909367841420a970a2341c6d0
                                                              • Instruction Fuzzy Hash: F0711827311B11C6EB109F65E8987A923A4FB84F8EF121111DE4E67B69EF3CC694D348

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                              • String ID: d
                                                              • API String ID: 2005889112-2564639436
                                                              • Opcode ID: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                              • Instruction ID: f8b257494904f019d3604dcecc85034657a5c10260cac0c89fcb9b1474f2a89f
                                                              • Opcode Fuzzy Hash: 8b653d2a3574a9b9f54f76d34c9bbade1314fe17b6e977058bb62b7e32ce9810
                                                              • Instruction Fuzzy Hash: 89515A37201B84C6EB51CF62E54836AB7A1F788FCAF254124DA4A17768DF3CC249CB04

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentThread$AddressHandleModuleProc
                                                              • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                              • API String ID: 4175298099-1975688563
                                                              • Opcode ID: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                              • Instruction ID: 32e0c514c15e67092b4d8cf3e36448ca5e605fb48b53fd217be05a92b649f763
                                                              • Opcode Fuzzy Hash: 848021bf4701eae64bbfc749c93af06548ec6c37c79a2989ab503d46e0816dd6
                                                              • Instruction Fuzzy Hash: 6931816B202B4AA0EB06EFA5E85D7F86320B745747FE25623D419325759F3CC38AC394

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 241 23c9fd66910-23c9fd66916 242 23c9fd66951-23c9fd6695b 241->242 243 23c9fd66918-23c9fd6691b 241->243 244 23c9fd66a78-23c9fd66a8d 242->244 245 23c9fd6691d-23c9fd66920 243->245 246 23c9fd66945-23c9fd66984 call 23c9fd66fc0 243->246 247 23c9fd66a8f 244->247 248 23c9fd66a9c-23c9fd66ab6 call 23c9fd66e54 244->248 250 23c9fd66922-23c9fd66925 245->250 251 23c9fd66938 __scrt_dllmain_crt_thread_attach 245->251 264 23c9fd66a52 246->264 265 23c9fd6698a-23c9fd6699f call 23c9fd66e54 246->265 254 23c9fd66a91-23c9fd66a9b 247->254 262 23c9fd66aef-23c9fd66b20 call 23c9fd67190 248->262 263 23c9fd66ab8-23c9fd66aed call 23c9fd66f7c call 23c9fd66e1c call 23c9fd67318 call 23c9fd67130 call 23c9fd67154 call 23c9fd66fac 248->263 252 23c9fd66931-23c9fd66936 call 23c9fd66f04 250->252 253 23c9fd66927-23c9fd66930 250->253 256 23c9fd6693d-23c9fd66944 251->256 252->256 273 23c9fd66b22-23c9fd66b28 262->273 274 23c9fd66b31-23c9fd66b37 262->274 263->254 268 23c9fd66a54-23c9fd66a69 264->268 276 23c9fd66a6a-23c9fd66a77 call 23c9fd67190 265->276 277 23c9fd669a5-23c9fd669b6 call 23c9fd66ec4 265->277 273->274 278 23c9fd66b2a-23c9fd66b2c 273->278 279 23c9fd66b7e-23c9fd66b94 call 23c9fd6268c 274->279 280 23c9fd66b39-23c9fd66b43 274->280 276->244 291 23c9fd669b8-23c9fd669dc call 23c9fd672dc call 23c9fd66e0c call 23c9fd66e38 call 23c9fd6ac0c 277->291 292 23c9fd66a07-23c9fd66a11 call 23c9fd67130 277->292 286 23c9fd66c1f-23c9fd66c2c 278->286 298 23c9fd66bcc-23c9fd66bce 279->298 299 23c9fd66b96-23c9fd66b98 279->299 287 23c9fd66b4f-23c9fd66b5d call 23c9fd75780 280->287 288 23c9fd66b45-23c9fd66b4d 280->288 294 23c9fd66b63-23c9fd66b78 call 23c9fd66910 287->294 309 23c9fd66c15-23c9fd66c1d 287->309 288->294 291->292 344 23c9fd669de-23c9fd669e5 __scrt_dllmain_after_initialize_c 291->344 292->264 312 23c9fd66a13-23c9fd66a1f call 23c9fd67180 292->312 294->279 294->309 307 23c9fd66bd0-23c9fd66bd3 298->307 308 23c9fd66bd5-23c9fd66bea call 23c9fd66910 298->308 299->298 306 23c9fd66b9a-23c9fd66bbc call 23c9fd6268c call 23c9fd66a78 299->306 306->298 338 23c9fd66bbe-23c9fd66bc6 call 23c9fd75780 306->338 307->308 307->309 308->309 323 23c9fd66bec-23c9fd66bf6 308->323 309->286 331 23c9fd66a21-23c9fd66a2b call 23c9fd67098 312->331 332 23c9fd66a45-23c9fd66a50 312->332 328 23c9fd66c01-23c9fd66c11 call 23c9fd75780 323->328 329 23c9fd66bf8-23c9fd66bff 323->329 328->309 329->309 331->332 343 23c9fd66a2d-23c9fd66a3b 331->343 332->268 338->298 343->332 344->292 345 23c9fd669e7-23c9fd66a04 call 23c9fd6abc8 344->345 345->292
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3381516680.0000023C9FD60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD60000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd60000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                              • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                                                              • API String ID: 190073905-1786718095
                                                              • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction ID: 7aafad37e4582c41821c69376d83aac845966f6b7e31f34f751b40f63f222fa9
                                                              • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction Fuzzy Hash: 7981FF6370070586FB50AF25944D3BD6690EB89B8AF778125EA09BB396DF3DCB458300

                                                              Control-flow Graph

                                                              APIs
                                                              • GetLastError.KERNEL32 ref: 0000023C9FD9CE37
                                                              • FlsGetValue.KERNEL32(?,?,?,0000023C9FDA0A6B,?,?,?,0000023C9FDA045C,?,?,?,0000023C9FD9C84F), ref: 0000023C9FD9CE4C
                                                              • FlsSetValue.KERNEL32(?,?,?,0000023C9FDA0A6B,?,?,?,0000023C9FDA045C,?,?,?,0000023C9FD9C84F), ref: 0000023C9FD9CE6D
                                                              • FlsSetValue.KERNEL32(?,?,?,0000023C9FDA0A6B,?,?,?,0000023C9FDA045C,?,?,?,0000023C9FD9C84F), ref: 0000023C9FD9CE9A
                                                              • FlsSetValue.KERNEL32(?,?,?,0000023C9FDA0A6B,?,?,?,0000023C9FDA045C,?,?,?,0000023C9FD9C84F), ref: 0000023C9FD9CEAB
                                                              • FlsSetValue.KERNEL32(?,?,?,0000023C9FDA0A6B,?,?,?,0000023C9FDA045C,?,?,?,0000023C9FD9C84F), ref: 0000023C9FD9CEBC
                                                              • SetLastError.KERNEL32 ref: 0000023C9FD9CED7
                                                              • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,0000023C9FDA0A6B,?,?,?,0000023C9FDA045C,?,?,?,0000023C9FD9C84F), ref: 0000023C9FD9CF0D
                                                              • FlsSetValue.KERNEL32(?,?,00000001,0000023C9FD9ECCC,?,?,?,?,0000023C9FD9BF9F,?,?,?,?,?,0000023C9FD97AB0), ref: 0000023C9FD9CF2C
                                                                • Part of subcall function 0000023C9FD9D6CC: HeapAlloc.KERNEL32 ref: 0000023C9FD9D721
                                                              • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,0000023C9FDA0A6B,?,?,?,0000023C9FDA045C,?,?,?,0000023C9FD9C84F), ref: 0000023C9FD9CF54
                                                                • Part of subcall function 0000023C9FD9D744: HeapFree.KERNEL32 ref: 0000023C9FD9D75A
                                                                • Part of subcall function 0000023C9FD9D744: GetLastError.KERNEL32 ref: 0000023C9FD9D764
                                                              • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,0000023C9FDA0A6B,?,?,?,0000023C9FDA045C,?,?,?,0000023C9FD9C84F), ref: 0000023C9FD9CF65
                                                              • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,0000023C9FDA0A6B,?,?,?,0000023C9FDA045C,?,?,?,0000023C9FD9C84F), ref: 0000023C9FD9CF76
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorLast$Heap$AllocFree
                                                              • String ID:
                                                              • API String ID: 570795689-0
                                                              • Opcode ID: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                              • Instruction ID: 72943e90d7e32eff41b8364ecc90685daeceec26b5f1b16d2aadd79b0beb58a0
                                                              • Opcode Fuzzy Hash: 3a29360f60df60adecaf4649f79764fa540e3f9fdfe76bc69ae0b48c7fce8efe
                                                              • Instruction Fuzzy Hash: E3418F2330374542FA69AFB1955E37922829B857B7F3A0724E937376E6DE2C87C19300

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                              • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                              • API String ID: 2171963597-1373409510
                                                              • Opcode ID: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                              • Instruction ID: 3c1ec7224b6520f0259cbb9759a1b88848df04e4d64bf2f9d1463577e4702a20
                                                              • Opcode Fuzzy Hash: d76f145db3bc14c8b60d6abb5b011cd5988a1ad04fc2d4b7169b2a78ec3c4c79
                                                              • Instruction Fuzzy Hash: 75212C37614B40C2FB149F25F44C36A77A1F789BAAF614215EA5913BA8DF7CC289CB04

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 620 23c9fd9a544-23c9fd9a5ac call 23c9fd9b414 623 23c9fd9aa13-23c9fd9aa1b call 23c9fd9c748 620->623 624 23c9fd9a5b2-23c9fd9a5b5 620->624 624->623 625 23c9fd9a5bb-23c9fd9a5c1 624->625 628 23c9fd9a5c7-23c9fd9a5cb 625->628 629 23c9fd9a690-23c9fd9a6a2 625->629 628->629 632 23c9fd9a5d1-23c9fd9a5dc 628->632 630 23c9fd9a6a8-23c9fd9a6ac 629->630 631 23c9fd9a963-23c9fd9a967 629->631 630->631 635 23c9fd9a6b2-23c9fd9a6bd 630->635 633 23c9fd9a969-23c9fd9a970 631->633 634 23c9fd9a9a0-23c9fd9a9aa call 23c9fd99634 631->634 632->629 636 23c9fd9a5e2-23c9fd9a5e7 632->636 633->623 638 23c9fd9a976-23c9fd9a99b call 23c9fd9aa1c 633->638 634->623 648 23c9fd9a9ac-23c9fd9a9cb call 23c9fd97940 634->648 635->631 640 23c9fd9a6c3-23c9fd9a6ca 635->640 636->629 637 23c9fd9a5ed-23c9fd9a5f7 call 23c9fd99634 636->637 637->648 651 23c9fd9a5fd-23c9fd9a628 call 23c9fd99634 * 2 call 23c9fd99d24 637->651 638->634 641 23c9fd9a894-23c9fd9a8a0 640->641 642 23c9fd9a6d0-23c9fd9a707 call 23c9fd99a10 640->642 641->634 649 23c9fd9a8a6-23c9fd9a8aa 641->649 642->641 656 23c9fd9a70d-23c9fd9a715 642->656 653 23c9fd9a8ba-23c9fd9a8c2 649->653 654 23c9fd9a8ac-23c9fd9a8b8 call 23c9fd99ce4 649->654 688 23c9fd9a648-23c9fd9a652 call 23c9fd99634 651->688 689 23c9fd9a62a-23c9fd9a62e 651->689 653->634 655 23c9fd9a8c8-23c9fd9a8d5 call 23c9fd998b4 653->655 654->653 664 23c9fd9a8db-23c9fd9a8e3 654->664 655->634 655->664 662 23c9fd9a719-23c9fd9a74b 656->662 666 23c9fd9a887-23c9fd9a88e 662->666 667 23c9fd9a751-23c9fd9a75c 662->667 669 23c9fd9a9f6-23c9fd9aa12 call 23c9fd99634 * 2 call 23c9fd9c6a8 664->669 670 23c9fd9a8e9-23c9fd9a8ed 664->670 666->641 666->662 667->666 671 23c9fd9a762-23c9fd9a77b 667->671 669->623 673 23c9fd9a8ef-23c9fd9a8fe call 23c9fd99ce4 670->673 674 23c9fd9a900 670->674 675 23c9fd9a874-23c9fd9a879 671->675 676 23c9fd9a781-23c9fd9a7c6 call 23c9fd99cf8 * 2 671->676 684 23c9fd9a903-23c9fd9a90d call 23c9fd9b4ac 673->684 674->684 680 23c9fd9a884 675->680 702 23c9fd9a804-23c9fd9a80a 676->702 703 23c9fd9a7c8-23c9fd9a7ee call 23c9fd99cf8 call 23c9fd9ac38 676->703 680->666 684->634 699 23c9fd9a913-23c9fd9a961 call 23c9fd99944 call 23c9fd99b50 684->699 688->629 701 23c9fd9a654-23c9fd9a674 call 23c9fd99634 * 2 call 23c9fd9b4ac 688->701 689->688 693 23c9fd9a630-23c9fd9a63b 689->693 693->688 698 23c9fd9a63d-23c9fd9a642 693->698 698->623 698->688 699->634 726 23c9fd9a676-23c9fd9a680 call 23c9fd9b59c 701->726 727 23c9fd9a68b 701->727 708 23c9fd9a87b 702->708 709 23c9fd9a80c-23c9fd9a810 702->709 720 23c9fd9a815-23c9fd9a872 call 23c9fd9a470 703->720 721 23c9fd9a7f0-23c9fd9a802 703->721 713 23c9fd9a880 708->713 709->676 713->680 720->713 721->702 721->703 730 23c9fd9a686-23c9fd9a9ef call 23c9fd992ac call 23c9fd9aff4 call 23c9fd994a0 726->730 731 23c9fd9a9f0-23c9fd9a9f5 call 23c9fd9c6a8 726->731 727->629 730->731 731->669
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                              • String ID: csm$csm$csm
                                                              • API String ID: 849930591-393685449
                                                              • Opcode ID: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                              • Instruction ID: 0e1c3c77f64e8f4aa83c67f0269d300be4ae649b87345167c74bed53c09d7bb8
                                                              • Opcode Fuzzy Hash: 186f03c70d0fb8979f980bfcf85fe288d7737d97a0f3839797273e271350e365
                                                              • Instruction Fuzzy Hash: 3CE1B277602B408AFB20DFA5D4883AD77A0F745BA9F620115EE8967B99CB3CC6C1C701

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 499 23c9fd69944-23c9fd699ac call 23c9fd6a814 502 23c9fd699b2-23c9fd699b5 499->502 503 23c9fd69e13-23c9fd69e1b call 23c9fd6bb48 499->503 502->503 504 23c9fd699bb-23c9fd699c1 502->504 506 23c9fd69a90-23c9fd69aa2 504->506 507 23c9fd699c7-23c9fd699cb 504->507 509 23c9fd69d63-23c9fd69d67 506->509 510 23c9fd69aa8-23c9fd69aac 506->510 507->506 511 23c9fd699d1-23c9fd699dc 507->511 514 23c9fd69da0-23c9fd69daa call 23c9fd68a34 509->514 515 23c9fd69d69-23c9fd69d70 509->515 510->509 512 23c9fd69ab2-23c9fd69abd 510->512 511->506 513 23c9fd699e2-23c9fd699e7 511->513 512->509 518 23c9fd69ac3-23c9fd69aca 512->518 513->506 519 23c9fd699ed-23c9fd699f7 call 23c9fd68a34 513->519 514->503 525 23c9fd69dac-23c9fd69dcb call 23c9fd66d40 514->525 515->503 516 23c9fd69d76-23c9fd69d9b call 23c9fd69e1c 515->516 516->514 522 23c9fd69ad0-23c9fd69b07 call 23c9fd68e10 518->522 523 23c9fd69c94-23c9fd69ca0 518->523 519->525 533 23c9fd699fd-23c9fd69a28 call 23c9fd68a34 * 2 call 23c9fd69124 519->533 522->523 537 23c9fd69b0d-23c9fd69b15 522->537 523->514 526 23c9fd69ca6-23c9fd69caa 523->526 530 23c9fd69cac-23c9fd69cb8 call 23c9fd690e4 526->530 531 23c9fd69cba-23c9fd69cc2 526->531 530->531 546 23c9fd69cdb-23c9fd69ce3 530->546 531->514 536 23c9fd69cc8-23c9fd69cd5 call 23c9fd68cb4 531->536 567 23c9fd69a2a-23c9fd69a2e 533->567 568 23c9fd69a48-23c9fd69a52 call 23c9fd68a34 533->568 536->514 536->546 542 23c9fd69b19-23c9fd69b4b 537->542 543 23c9fd69b51-23c9fd69b5c 542->543 544 23c9fd69c87-23c9fd69c8e 542->544 543->544 548 23c9fd69b62-23c9fd69b7b 543->548 544->523 544->542 549 23c9fd69ce9-23c9fd69ced 546->549 550 23c9fd69df6-23c9fd69e12 call 23c9fd68a34 * 2 call 23c9fd6baa8 546->550 552 23c9fd69b81-23c9fd69bc6 call 23c9fd690f8 * 2 548->552 553 23c9fd69c74-23c9fd69c79 548->553 554 23c9fd69d00 549->554 555 23c9fd69cef-23c9fd69cfe call 23c9fd690e4 549->555 550->503 580 23c9fd69bc8-23c9fd69bee call 23c9fd690f8 call 23c9fd6a038 552->580 581 23c9fd69c04-23c9fd69c0a 552->581 559 23c9fd69c84 553->559 563 23c9fd69d03-23c9fd69d0d call 23c9fd6a8ac 554->563 555->563 559->544 563->514 578 23c9fd69d13-23c9fd69d61 call 23c9fd68d44 call 23c9fd68f50 563->578 567->568 572 23c9fd69a30-23c9fd69a3b 567->572 568->506 584 23c9fd69a54-23c9fd69a74 call 23c9fd68a34 * 2 call 23c9fd6a8ac 568->584 572->568 577 23c9fd69a3d-23c9fd69a42 572->577 577->503 577->568 578->514 600 23c9fd69bf0-23c9fd69c02 580->600 601 23c9fd69c15-23c9fd69c72 call 23c9fd69870 580->601 588 23c9fd69c0c-23c9fd69c10 581->588 589 23c9fd69c7b 581->589 605 23c9fd69a8b 584->605 606 23c9fd69a76-23c9fd69a80 call 23c9fd6a99c 584->606 588->552 590 23c9fd69c80 589->590 590->559 600->580 600->581 601->590 605->506 609 23c9fd69df0-23c9fd69df5 call 23c9fd6baa8 606->609 610 23c9fd69a86-23c9fd69def call 23c9fd686ac call 23c9fd6a3f4 call 23c9fd688a0 606->610 609->550 610->609
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3381516680.0000023C9FD60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD60000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd60000_svchost.jbxd
                                                              Similarity
                                                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                              • String ID: csm$csm$csm
                                                              • API String ID: 849930591-393685449
                                                              • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                              • Instruction ID: 509737f3685c2d1a6d071fba31afd0590e104cea89739642c8b0d4ddad272356
                                                              • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                              • Instruction Fuzzy Hash: 8CE1C073604B808AEB60DF65D4883AD77B0F755B99F220115EE8967B9ACB3CC291CB01
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeLibraryProc
                                                              • String ID: api-ms-$ext-ms-
                                                              • API String ID: 3013587201-537541572
                                                              • Opcode ID: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                              • Instruction ID: dc8ad38878208d8ca577ebbaeebc6c7377358e1fa9398032812038abc6e92bc4
                                                              • Opcode Fuzzy Hash: 978905767b5078ec9de210cf927baa423a0e9cdb829b06631a7440d3a6c0e710
                                                              • Instruction Fuzzy Hash: C741C423322F0091FB16CFA6A80C7752391F745BE6F2A4125DD1DAB784EE3CC6859344
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                              • String ID: d
                                                              • API String ID: 3743429067-2564639436
                                                              • Opcode ID: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                              • Instruction ID: bf4d5e9b72a927c354924b6789bf90666660a3f57e477406bce86737f63aeb7b
                                                              • Opcode Fuzzy Hash: 4e806da6bf888755fbf7915dbe23be07e0600cef0dd9ac19d63751155720d402
                                                              • Instruction Fuzzy Hash: 4D417133214B84D6E760CF61E4487AE77A1F388B99F558129DB8927B58DF3CC589CB40
                                                              APIs
                                                              • FlsGetValue.KERNEL32(?,?,?,0000023C9FD9C7DE,?,?,?,?,?,?,?,?,0000023C9FD9CF9D,?,?,00000001), ref: 0000023C9FD9D087
                                                              • FlsSetValue.KERNEL32(?,?,?,0000023C9FD9C7DE,?,?,?,?,?,?,?,?,0000023C9FD9CF9D,?,?,00000001), ref: 0000023C9FD9D0A6
                                                              • FlsSetValue.KERNEL32(?,?,?,0000023C9FD9C7DE,?,?,?,?,?,?,?,?,0000023C9FD9CF9D,?,?,00000001), ref: 0000023C9FD9D0CE
                                                              • FlsSetValue.KERNEL32(?,?,?,0000023C9FD9C7DE,?,?,?,?,?,?,?,?,0000023C9FD9CF9D,?,?,00000001), ref: 0000023C9FD9D0DF
                                                              • FlsSetValue.KERNEL32(?,?,?,0000023C9FD9C7DE,?,?,?,?,?,?,?,?,0000023C9FD9CF9D,?,?,00000001), ref: 0000023C9FD9D0F0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID: 1%$Y%
                                                              • API String ID: 3702945584-1395475152
                                                              • Opcode ID: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                              • Instruction ID: e8c26fe5fe4feb14e3ba4e03a1f9060b6ef82e331d8c99b7b9407e267a680212
                                                              • Opcode Fuzzy Hash: eaed261e9eff258ccad1ac5f7a99306e4284ed666e6615725d2dc279c7a103a4
                                                              • Instruction Fuzzy Hash: 7011862370674441FA686FB6955E37962459B447F2F3A4324E879377DADF2CC6829300
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                              • String ID:
                                                              • API String ID: 190073905-0
                                                              • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction ID: c81ae31f02d2e224a68d0c04c6ddf062c43f5ec167f886d717914fbe70619f4a
                                                              • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction Fuzzy Hash: 9081E32370270186FB90AFE5944D3B96690AB85B87F3B4525D92877796DB3CCBC58700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Library$Load$AddressErrorFreeLastProc
                                                              • String ID: api-ms-
                                                              • API String ID: 2559590344-2084034818
                                                              • Opcode ID: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                              • Instruction ID: bcdf0de65a7d2d3d11683321deb0e480384ed9bad8611b56bf596f421dc6149d
                                                              • Opcode Fuzzy Hash: 57a387126f3cdca2e6377dd9e1e04e2dfecb224b041c0cba2ac35bf939624b8e
                                                              • Instruction Fuzzy Hash: B631C323313B40E1EE22DF92A4887752394B748BA2F6B0525DD2D2B394EF3EC6D58305
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                              • String ID: CONOUT$
                                                              • API String ID: 3230265001-3130406586
                                                              • Opcode ID: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                              • Instruction ID: fc3ee547b90a58897c853057f39df720ccbe3a45c8b939da15aca02b7eb807e6
                                                              • Opcode Fuzzy Hash: ea8503a65e9befc0d33d9332805196394b6329e0df61646a9863ad39bb9ae76f
                                                              • Instruction Fuzzy Hash: 9C118F33310B8086E7508F52E84832976A0F788FEAF254225EA6A97794CF7DCA548748
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcessProtectVirtual$HandleModule
                                                              • String ID: wr
                                                              • API String ID: 1092925422-2678910430
                                                              • Opcode ID: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                              • Instruction ID: f581b2753d3311771d2ef88649b5c3dbc002ea74c6a5500dacb6231ddfec3b34
                                                              • Opcode Fuzzy Hash: d5ed198cecc284837a9554765ab7ffb778fa62629811cf0fe5ebc999f83bf42b
                                                              • Instruction Fuzzy Hash: E9115B2B705B41C2EF149F61E40837A76A4FB88F8AF660429DE9917794EF3DC685C708
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Thread$Current$Context
                                                              • String ID:
                                                              • API String ID: 1666949209-0
                                                              • Opcode ID: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                                                              • Instruction ID: c7858c9595cf304ad0778e2fc3f229bfab6e13f368fba6bf50820e945dd4b50a
                                                              • Opcode Fuzzy Hash: 542e600666cb1ac52823d1f72aa5ca11f47e3ee1f4dc73a6c07a176fbafbfe1c
                                                              • Instruction Fuzzy Hash: C2D19A37205B8882DB709F46E49836A77A0F3C8B85F214216EACD57BA5DF3DC691CB00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$AllocFree
                                                              • String ID: dialer
                                                              • API String ID: 756756679-3528709123
                                                              • Opcode ID: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                              • Instruction ID: 9359298e96b3c04a7ea4b820f75502f3f97a85a75e9c2082bfe538fa6ca21202
                                                              • Opcode Fuzzy Hash: 2e24de9146afbba5105044d4fd5602f1f9f0ed558a5ed62472976580c3eaf0ad
                                                              • Instruction Fuzzy Hash: A131B023702B5582EA15DF97E94877A67A0FB45B86F1A4120DF4867B55EF3CC6E1C300
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$Free
                                                              • String ID: C:\Windows\System32\svchost.exe
                                                              • API String ID: 3168794593-3822071397
                                                              • Opcode ID: 335002606d0c58216c4b7b8c214cf2e956f7ef49abbb5e195d674a66fc258290
                                                              • Instruction ID: ef2c8a893de3dfc8a32d16b7cd1fc9c1132167686339b654e377d72c87c66156
                                                              • Opcode Fuzzy Hash: 335002606d0c58216c4b7b8c214cf2e956f7ef49abbb5e195d674a66fc258290
                                                              • Instruction Fuzzy Hash: 6B21A06B909BD0CAE352DF259C593AD2BE0F759F4AF2A4016DB45A3247DE2DC6048704
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorLast
                                                              • String ID:
                                                              • API String ID: 2506987500-0
                                                              • Opcode ID: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                              • Instruction ID: 56e012b5d1dc7e002c7adf90bc31e60c974fd27b6bfcadef6d938c98811c32d9
                                                              • Opcode Fuzzy Hash: 4f148fb448054b99fdb5313590ff83f86fc6d8762bc770a772f95ba4b575ef67
                                                              • Instruction Fuzzy Hash: C511812330374081FA64AFB2954D33D6242AB857F6F360724E876677DADE2CC6819300
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                              • String ID:
                                                              • API String ID: 517849248-0
                                                              • Opcode ID: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                              • Instruction ID: 13d99b4807abd619a55dff71f34bee12b8a4746c9564a352daa39f4ca56a7e68
                                                              • Opcode Fuzzy Hash: 01214db588610ff501214a343c1506f8e4016efad0e64bbd234dc336c45f59d3
                                                              • Instruction Fuzzy Hash: 5F016922300B4082EB10DF52A84C36A63A1F788FCAFAA4035DE5963754DF3CCA8AC704
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                              • String ID:
                                                              • API String ID: 449555515-0
                                                              • Opcode ID: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                              • Instruction ID: 14583a40f98bfed3850a83447e8838843ceab951dfca40f2a9e477f603da09be
                                                              • Opcode Fuzzy Hash: 4c9ec6165d8c5af47ee19c29b3e549fd6cc17b885c385019f049dc0dac4977bc
                                                              • Instruction Fuzzy Hash: 72012967212B40C6EB259F61F80D33A73A4BB49F8BF260424CD5927764EF3DC2988708
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 2395640692-629598281
                                                              • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                              • Instruction ID: 1f90d7c7ad59199f97c1a7438c6a9a4619e7d053edb22fbc608bcc98bd4b9d08
                                                              • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                              • Instruction Fuzzy Hash: 4451BE337027008AEB54DF65E44CB7937A6F344B8AF628124DA1673788EB79DAC1C705
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 2395640692-629598281
                                                              • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                              • Instruction ID: 07a3565f698964cbb3a4654292ca8ae5c348360f6e4fe9823536838693a240fb
                                                              • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                              • Instruction Fuzzy Hash: 9731D133202740C6EB54DF62E84C7293BA5F344B8AF268014EE5A23789DB3DCA80C706
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: FinalHandleNamePathlstrlen
                                                              • String ID: \\?\
                                                              • API String ID: 2719912262-4282027825
                                                              • Opcode ID: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                              • Instruction ID: 23ca7c8f60db608dac3268c4892bef963bbdddfd80e7d2892e867c6f1acef7e4
                                                              • Opcode Fuzzy Hash: c1daab9146f2a1614ef605d22fd4f721266e20aa8a0235322e79b2424596649d
                                                              • Instruction Fuzzy Hash: A2F06223304B41D2EB609F61F8C87696761F758F8AFA58021DA4956958DF7CCB8ECB04
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                              • String ID: CorExitProcess$mscoree.dll
                                                              • API String ID: 4061214504-1276376045
                                                              • Opcode ID: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                              • Instruction ID: f120134d89cc3ff4ac82abde9f44cd907dde6f2fa0f09169b0ae68eb03632b04
                                                              • Opcode Fuzzy Hash: 0f45d19500fbd6816ab24c8a126c5dacde8056cea587c59ff890217df17fdf5d
                                                              • Instruction Fuzzy Hash: 65F09663311B04C1EF148F64E44C3796320EB85F66F661219DA7A561E4CF3CC785C304
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CombinePath
                                                              • String ID: \\.\pipe\
                                                              • API String ID: 3422762182-91387939
                                                              • Opcode ID: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                              • Instruction ID: 63bf0631c2ce08038e8afd47d845ce43b19718df71123393761432e8610f9e68
                                                              • Opcode Fuzzy Hash: 8c685e1f0b85bfe06f91eeefbd03c12bff8419d51c8b157116edbf6ca1c9c829
                                                              • Instruction Fuzzy Hash: 4FF08222304B80C2EA009F53B90C2396264AB48FC6F298030EE5A27B18DF3CC6868704
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentThread
                                                              • String ID:
                                                              • API String ID: 2882836952-0
                                                              • Opcode ID: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                                                              • Instruction ID: 27460493759cfd513e95e9acbc061ad8e741853e6674a0c4eb1be6d369746711
                                                              • Opcode Fuzzy Hash: e13ad259af2044a9722e5c88be2fea28068701e2040856c8b7ebe2328a6e9181
                                                              • Instruction Fuzzy Hash: 5F02ED33219B8486E7A0CF95F49436AB7A0F3C4785F210125EA8E97BA9DF7CC594CB00
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentThread
                                                              • String ID:
                                                              • API String ID: 2882836952-0
                                                              • Opcode ID: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                                                              • Instruction ID: 13d60bb38955cae3189d8a2bb61af228ad7e90773a2fa293d18278bd4efa4042
                                                              • Opcode Fuzzy Hash: b02f694671304b5a077fe24bce3094f0c3b02718cee177a37b7a7da192a85efa
                                                              • Instruction Fuzzy Hash: 6761CC3751AB44C6E760CF55E44832AB7E0F388786F210126EA8E57BA8DB7CC695CF00
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: _set_statfp
                                                              • String ID:
                                                              • API String ID: 1156100317-0
                                                              • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction ID: a6d18e22d9c748128799939e0654a87f56c25303a8cede26c8329d518403cd37
                                                              • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction Fuzzy Hash: 2C11E323A10F4051F6A61F68E45D37511806B7BBBAF3B4A34E976276F6CB2CCB405308
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3381516680.0000023C9FD60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD60000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd60000_svchost.jbxd
                                                              Similarity
                                                              • API ID: _set_statfp
                                                              • String ID:
                                                              • API String ID: 1156100317-0
                                                              • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction ID: fa3e9c6ef34ac44beecf1d4a20471fad6334f75cbed2dd7473b6ff3efb3b142c
                                                              • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction Fuzzy Hash: 3211A7A3610B5112FB551D28E44E37911816F58B76FBB4628E9662E2D6CA2CCB414300
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast
                                                              • String ID:
                                                              • API String ID: 1452528299-0
                                                              • Opcode ID: 46c896f13dff0714c7ccebb8ca9383bb675cc38bcf091c92c481f4a556b8b138
                                                              • Instruction ID: 7cd8ba41c2925395cb7c9359367532a4a56c2306d61c1e992674a85071185b21
                                                              • Opcode Fuzzy Hash: 46c896f13dff0714c7ccebb8ca9383bb675cc38bcf091c92c481f4a556b8b138
                                                              • Instruction Fuzzy Hash: A211632330239082FE549FA6984C37962956B48BE3F364724D936377D9DA2CCA81C701
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3381516680.0000023C9FD60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD60000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd60000_svchost.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID: Tuesday$Wednesday$or copy constructor iterator'
                                                              • API String ID: 3215553584-4202648911
                                                              • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                              • Instruction ID: 7a8a2c0e20e62a8c4cb2861eaf2d624801dc3252f6813319446057c431b085cc
                                                              • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                              • Instruction Fuzzy Hash: A2619D63620B4082FA69DF68E54C33E6BA1E785787F734425CA0A777A4EB3CCB418700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CallEncodePointerTranslator
                                                              • String ID: MOC$RCC
                                                              • API String ID: 3544855599-2084237596
                                                              • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction ID: 0bebfacf85e04dc8df566765b1bb9a45dc94805908403f3c6b4d7d15f2017294
                                                              • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction Fuzzy Hash: C461583B602B848AEB20DFA5D4843AD77B0F348B99F254215EF4927B98DB38D695C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                              • String ID: csm$csm
                                                              • API String ID: 3896166516-3733052814
                                                              • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction ID: b5b3cd2e7d2b3ba65c0c38fc053bdc294db5e1aadc0f0551ef11afe4c2e778d2
                                                              • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction Fuzzy Hash: 9451B07B2013808AFB748F95948837977A0F355BA6F265216EB9967BD5CB3CC6D0C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3381516680.0000023C9FD60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD60000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd60000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                              • String ID: csm$csm
                                                              • API String ID: 3896166516-3733052814
                                                              • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction ID: b168591e56fa7dec459e3dd0a2ff4fc174a44e46958cfe6ea52c0a5410adab20
                                                              • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction Fuzzy Hash: C4518C33100380CAFB749FA5944837C77A0F755BAAF2A5216DA99A7BD5CB3CD690CB01
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3381516680.0000023C9FD60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD60000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd60000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritable__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 3242871069-629598281
                                                              • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                              • Instruction ID: 4e56314c3d2453347bf65fb276cd521628cde032df79e7e53ff8890b8b23fc81
                                                              • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                              • Instruction Fuzzy Hash: 4651DD337023008AEB16CF25E448B3C37A5FB54B9EF668125DA0667788EB38DF518704
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3381516680.0000023C9FD60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD60000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd60000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritable__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 3242871069-629598281
                                                              • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                              • Instruction ID: 1ac0af79340df761112eaa8314d83ad2fc85700253a99754cc2bce0b1d559ae3
                                                              • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                              • Instruction Fuzzy Hash: 0031897320178096EB15DF22E848B2D77A5FB44B9EF268014EE5A27788DB3CDB61C704
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: FileWrite$ConsoleErrorLastOutput
                                                              • String ID:
                                                              • API String ID: 2718003287-0
                                                              • Opcode ID: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                              • Instruction ID: d2a503851be96b6516d99fb73f83dfb610c96ca901761488bc4f8c611d374a52
                                                              • Opcode Fuzzy Hash: 3a35214534a53fd0655822596b90f4932f5655332a96a267e8fac8abb8670521
                                                              • Instruction Fuzzy Hash: A7D10333714B8089E711CFBAD5483AC3BB1F355B9AF214216CE5DA7B99DA38C646C344
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: ConsoleErrorLastMode
                                                              • String ID:
                                                              • API String ID: 953036326-0
                                                              • Opcode ID: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                              • Instruction ID: dfac7770a03030c8138235460075494dc8b96b5442b412831c4990e57e6e5698
                                                              • Opcode Fuzzy Hash: fa691138abb93940963a85324df6708f2ee223ec670a65e1a7af20f8b77031a4
                                                              • Instruction Fuzzy Hash: 8C91BF7370075086F7619F6695883BD3BA0B706F8BF264109DE0A77A88DB3CC682C708
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                              • String ID:
                                                              • API String ID: 2933794660-0
                                                              • Opcode ID: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                              • Instruction ID: 4ed76368ea000a64330ec930436fe3a4810d52bf42b8390d9f0f35c83193dfce
                                                              • Opcode Fuzzy Hash: 561ac6f4885ef0f33bff27beb4ddb95e6a253367b5c72fac45fcb4617ca9122b
                                                              • Instruction Fuzzy Hash: A9113023711F0189EB00CF70E8593B833A4F759B59F550E21EA6D567A8DF7CC2A88380
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: FileType
                                                              • String ID: \\.\pipe\
                                                              • API String ID: 3081899298-91387939
                                                              • Opcode ID: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                              • Instruction ID: 0c33aa86fb6af781ab4bd2801129ac058fc1aff8e06ccd9e83e02b0cf9a38ee3
                                                              • Opcode Fuzzy Hash: 54f1dfa0457f4d2b58266312e3bc9b9bd619b52cd53b64f893b189ad2eed13fb
                                                              • Instruction Fuzzy Hash: 1871B23720178185E7299EA5984C3BA77A4F78BB87F660116DD0A73F89DE39C785C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3381516680.0000023C9FD60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD60000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd60000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CallTranslator
                                                              • String ID: MOC$RCC
                                                              • API String ID: 3163161869-2084237596
                                                              • Opcode ID: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction ID: 5190f0ac30fff565778e5031f2d5a440088a6580906e12c691fded75e2fd0fce
                                                              • Opcode Fuzzy Hash: c123fbbb8780cd52d1c7b069b1b1cc678e7e4f5673d54000f6e5fbfac7098139
                                                              • Instruction Fuzzy Hash: 8A61A933A01B84CAEB20CF65D0843AD77A0F748B8DF264215EF8927B99DB39D695C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: FileType
                                                              • String ID: \\.\pipe\
                                                              • API String ID: 3081899298-91387939
                                                              • Opcode ID: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                              • Instruction ID: 952c2bbf2d9725709fdd0ee35ed40a443fa4884fddd7f1e576d89f22e70156ec
                                                              • Opcode Fuzzy Hash: 713d5f66120afee1318357aa22047e1871f046a8e1f6ca4f8182a23e28854f89
                                                              • Instruction Fuzzy Hash: 6D51283320638181E679DFA9A05C3BE6791F396743FA70125DD5923B4ADA3DCB84C780
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastWrite
                                                              • String ID: U
                                                              • API String ID: 442123175-4171548499
                                                              • Opcode ID: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                              • Instruction ID: f8e9af451c7e187f0b3c134bc8ce29196dafec2d7c4623f8744763774a61f3a2
                                                              • Opcode Fuzzy Hash: 769e155e8e03be1ef4aeb5f55e8b8ada6faf705201daec98c5fb8cb61498ce5a
                                                              • Instruction Fuzzy Hash: 4741D533315B8082DB20CF26E9483BA77A0F799B96F624021EE4D97798EB3CC641C744
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFileHeaderRaise
                                                              • String ID: csm
                                                              • API String ID: 2573137834-1018135373
                                                              • Opcode ID: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                              • Instruction ID: da9330c3968a2f4648570f24bcb8dedcce468af78ba686aeb91ff33026581370
                                                              • Opcode Fuzzy Hash: 596d8aa0106168f831d5a6617a756b303fb26e5894bac8705379b132699e985d
                                                              • Instruction Fuzzy Hash: BD113D37215B8082EB618F15F44436A77E5F788B99F694220EE8C17758DF3CC691CB04
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3381516680.0000023C9FD60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD60000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd60000_svchost.jbxd
                                                              Similarity
                                                              • API ID: __std_exception_copy
                                                              • String ID: ierarchy Descriptor'$riptor at (
                                                              • API String ID: 592178966-758928094
                                                              • Opcode ID: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                              • Instruction ID: 4cda0189ba7ad33cdc60815da3b34e9d2c4a24c0ec22eb9d9b8f22f249be8676
                                                              • Opcode Fuzzy Hash: 13d46e236c22f038e3183f277bc937bc0c01c293d14bd07e4c5c2ea041926035
                                                              • Instruction Fuzzy Hash: 05E086A2640B4490EF018F21E8443A873A0DB58B64B599122D95C5A351FB3CD3F9C301
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3381516680.0000023C9FD60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD60000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd60000_svchost.jbxd
                                                              Similarity
                                                              • API ID: __std_exception_copy
                                                              • String ID: Locator'$riptor at (
                                                              • API String ID: 592178966-4215709766
                                                              • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                              • Instruction ID: 6f2cc3152310eb36d7cc8336d39e743a0d278e23f43703834979fe4af312773f
                                                              • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                              • Instruction Fuzzy Hash: 9EE086A2640B4480DF018F21D4443A873A0EB58B54B999122C94C5A311EB3CD2E5C300
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000019.00000002.3382187239.0000023C9FD90000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000023C9FD90000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_25_2_23c9fd90000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Heap$Process$AllocFree
                                                              • String ID:
                                                              • API String ID: 756756679-0
                                                              • Opcode ID: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                              • Instruction ID: fb274fbcc73c847d3c6e09d570d25983daaf9cd5edc6c7e414eda49a85b8252f
                                                              • Opcode Fuzzy Hash: e6b128499454e36a5cfdb4ce6de946333e896a2fc86765bea62df52d9c8f7d1a
                                                              • Instruction Fuzzy Hash: 9B113D26602B4481EA55DFA6A40833967A1FB89FC6F2A4124DE4D67765DE3CC5828300

                                                              Execution Graph

                                                              Execution Coverage:0.7%
                                                              Dynamic/Decrypted Code Coverage:0%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:74
                                                              Total number of Limit Nodes:2
                                                              execution_graph 15117 1a1ca6e273c 15120 1a1ca6e276a 15117->15120 15118 1a1ca6e28d4 15119 1a1ca6e2858 LoadLibraryA 15119->15120 15120->15118 15120->15119 15121 1a1ca711abc 15126 1a1ca711628 GetProcessHeap 15121->15126 15123 1a1ca711ad2 Sleep SleepEx 15124 1a1ca711acb 15123->15124 15124->15123 15125 1a1ca711598 StrCmpIW StrCmpW 15124->15125 15125->15124 15127 1a1ca711648 _invalid_parameter_noinfo 15126->15127 15171 1a1ca711268 GetProcessHeap 15127->15171 15129 1a1ca711650 15130 1a1ca711268 2 API calls 15129->15130 15131 1a1ca711661 15130->15131 15132 1a1ca711268 2 API calls 15131->15132 15133 1a1ca71166a 15132->15133 15134 1a1ca711268 2 API calls 15133->15134 15135 1a1ca711673 15134->15135 15136 1a1ca71168e RegOpenKeyExW 15135->15136 15137 1a1ca7118a6 15136->15137 15138 1a1ca7116c0 RegOpenKeyExW 15136->15138 15137->15124 15139 1a1ca7116e9 15138->15139 15140 1a1ca7116ff RegOpenKeyExW 15138->15140 15175 1a1ca7112bc RegQueryInfoKeyW 15139->15175 15142 1a1ca711723 15140->15142 15143 1a1ca71173a RegOpenKeyExW 15140->15143 15186 1a1ca71104c RegQueryInfoKeyW 15142->15186 15146 1a1ca711775 RegOpenKeyExW 15143->15146 15147 1a1ca71175e 15143->15147 15148 1a1ca711799 15146->15148 15149 1a1ca7117b0 RegOpenKeyExW 15146->15149 15151 1a1ca7112bc 13 API calls 15147->15151 15152 1a1ca7112bc 13 API calls 15148->15152 15153 1a1ca7117d4 15149->15153 15154 1a1ca7117eb RegOpenKeyExW 15149->15154 15155 1a1ca71176b RegCloseKey 15151->15155 15156 1a1ca7117a6 RegCloseKey 15152->15156 15157 1a1ca7112bc 13 API calls 15153->15157 15158 1a1ca711826 RegOpenKeyExW 15154->15158 15159 1a1ca71180f 15154->15159 15155->15146 15156->15149 15160 1a1ca7117e1 RegCloseKey 15157->15160 15162 1a1ca711861 RegOpenKeyExW 15158->15162 15163 1a1ca71184a 15158->15163 15161 1a1ca71104c 5 API calls 15159->15161 15160->15154 15166 1a1ca71181c RegCloseKey 15161->15166 15164 1a1ca711885 15162->15164 15165 1a1ca71189c RegCloseKey 15162->15165 15167 1a1ca71104c 5 API calls 15163->15167 15168 1a1ca71104c 5 API calls 15164->15168 15165->15137 15166->15158 15169 1a1ca711857 RegCloseKey 15167->15169 15170 1a1ca711892 RegCloseKey 15168->15170 15169->15162 15170->15165 15192 1a1ca726168 15171->15192 15173 1a1ca711283 GetProcessHeap 15174 1a1ca7112ae _invalid_parameter_noinfo 15173->15174 15174->15129 15176 1a1ca711327 GetProcessHeap 15175->15176 15177 1a1ca71148a RegCloseKey 15175->15177 15180 1a1ca71133e _invalid_parameter_noinfo 15176->15180 15177->15140 15178 1a1ca711352 RegEnumValueW 15178->15180 15179 1a1ca711476 GetProcessHeap HeapFree 15179->15177 15180->15178 15180->15179 15182 1a1ca7113d3 GetProcessHeap 15180->15182 15183 1a1ca71141e lstrlenW GetProcessHeap 15180->15183 15184 1a1ca7113f3 GetProcessHeap HeapFree 15180->15184 15185 1a1ca711443 StrCpyW 15180->15185 15194 1a1ca71152c 15180->15194 15182->15180 15183->15180 15184->15183 15185->15180 15187 1a1ca7111b5 RegCloseKey 15186->15187 15190 1a1ca7110bf _invalid_parameter_noinfo 15186->15190 15187->15143 15188 1a1ca7110cf RegEnumValueW 15188->15190 15189 1a1ca71114e GetProcessHeap 15189->15190 15190->15187 15190->15188 15190->15189 15191 1a1ca71116e GetProcessHeap HeapFree 15190->15191 15191->15190 15193 1a1ca726177 15192->15193 15195 1a1ca711546 15194->15195 15198 1a1ca71157c 15194->15198 15196 1a1ca711565 StrCmpW 15195->15196 15197 1a1ca71155d StrCmpIW 15195->15197 15195->15198 15196->15195 15197->15195 15198->15180

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000001A.00000002.3389691458.000001A1CA710000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001A1CA710000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_26_2_1a1ca710000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                              • String ID:
                                                              • API String ID: 1683269324-0
                                                              • Opcode ID: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                              • Instruction ID: 01a97fa1f14185cb65b09edfe152e9b73a0a9025bf2d4a57ba3f89ac3fec9d12
                                                              • Opcode Fuzzy Hash: c94412c55dcd243bcd3fbe265bea19663896af10ab27123b85acb7154d5eea14
                                                              • Instruction Fuzzy Hash: B411E533793360A1FBA297A1F4057D912DBB766734F40512597CE4199DEF3BE0488207

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 000001A1CA711628: GetProcessHeap.KERNEL32 ref: 000001A1CA711633
                                                                • Part of subcall function 000001A1CA711628: HeapAlloc.KERNEL32 ref: 000001A1CA711642
                                                                • Part of subcall function 000001A1CA711628: RegOpenKeyExW.ADVAPI32 ref: 000001A1CA7116B2
                                                                • Part of subcall function 000001A1CA711628: RegOpenKeyExW.ADVAPI32 ref: 000001A1CA7116DF
                                                                • Part of subcall function 000001A1CA711628: RegCloseKey.ADVAPI32 ref: 000001A1CA7116F9
                                                                • Part of subcall function 000001A1CA711628: RegOpenKeyExW.ADVAPI32 ref: 000001A1CA711719
                                                                • Part of subcall function 000001A1CA711628: RegCloseKey.ADVAPI32 ref: 000001A1CA711734
                                                                • Part of subcall function 000001A1CA711628: RegOpenKeyExW.ADVAPI32 ref: 000001A1CA711754
                                                                • Part of subcall function 000001A1CA711628: RegCloseKey.ADVAPI32 ref: 000001A1CA71176F
                                                                • Part of subcall function 000001A1CA711628: RegOpenKeyExW.ADVAPI32 ref: 000001A1CA71178F
                                                                • Part of subcall function 000001A1CA711628: RegCloseKey.ADVAPI32 ref: 000001A1CA7117AA
                                                                • Part of subcall function 000001A1CA711628: RegOpenKeyExW.ADVAPI32 ref: 000001A1CA7117CA
                                                              • Sleep.KERNEL32 ref: 000001A1CA711AD7
                                                              • SleepEx.KERNELBASE ref: 000001A1CA711ADD
                                                                • Part of subcall function 000001A1CA711628: RegCloseKey.ADVAPI32 ref: 000001A1CA7117E5
                                                                • Part of subcall function 000001A1CA711628: RegOpenKeyExW.ADVAPI32 ref: 000001A1CA711805
                                                                • Part of subcall function 000001A1CA711628: RegCloseKey.ADVAPI32 ref: 000001A1CA711820
                                                                • Part of subcall function 000001A1CA711628: RegOpenKeyExW.ADVAPI32 ref: 000001A1CA711840
                                                                • Part of subcall function 000001A1CA711628: RegCloseKey.ADVAPI32 ref: 000001A1CA71185B
                                                                • Part of subcall function 000001A1CA711628: RegOpenKeyExW.ADVAPI32 ref: 000001A1CA71187B
                                                                • Part of subcall function 000001A1CA711628: RegCloseKey.ADVAPI32 ref: 000001A1CA711896
                                                                • Part of subcall function 000001A1CA711628: RegCloseKey.ADVAPI32 ref: 000001A1CA7118A0
                                                              Memory Dump Source
                                                              • Source File: 0000001A.00000002.3389691458.000001A1CA710000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001A1CA710000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_26_2_1a1ca710000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CloseOpen$HeapSleep$AllocProcess
                                                              • String ID:
                                                              • API String ID: 1534210851-0
                                                              • Opcode ID: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                              • Instruction ID: f150d557e6744ddef69d6657b32e82edc97fae00e09d38a4107afbb374f367cd
                                                              • Opcode Fuzzy Hash: ad614115fa5d2181ccf7742c52f053f5bbac07b16a2f1961ccdf1ed8f9939afa
                                                              • Instruction Fuzzy Hash: DF314473382724A1EB629762D6813E913D7B746BE0F0444294F8D8B29DEE16E451C312

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 57 1a1ca713844-1a1ca71384f 58 1a1ca713851-1a1ca713864 StrCmpNIW 57->58 59 1a1ca713869-1a1ca713870 57->59 58->59 60 1a1ca713866 58->60 60->59
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000001A.00000002.3389691458.000001A1CA710000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001A1CA710000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_26_2_1a1ca710000_svchost.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: dialer
                                                              • API String ID: 0-3528709123
                                                              • Opcode ID: 65427932a6511f3c8dca5889eed1792e2f2e2d3e0b30565664b7cb78ea33e46c
                                                              • Instruction ID: fb475bca5c5a6d412fbda8410bbabf47ec9d7b489fddd15ee2bbd074882d5245
                                                              • Opcode Fuzzy Hash: 65427932a6511f3c8dca5889eed1792e2f2e2d3e0b30565664b7cb78ea33e46c
                                                              • Instruction Fuzzy Hash: C9D05EB6392355EAFB669FE688C46E02393FB09764F8841208A4401558DB1A998D9621

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000001A.00000002.3388721328.000001A1CA6E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001A1CA6E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_26_2_1a1ca6e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID:
                                                              • API String ID: 1029625771-0
                                                              • Opcode ID: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                              • Instruction ID: a47786bb87ca2bd87961d5bbacfabd6ee9655fa78d7282d5136b735cdc61d28c
                                                              • Opcode Fuzzy Hash: 8c1c9448f3dd1088c887dafc1273d9eb4da1e6d2ce59199f574756fa2a1f07a1
                                                              • Instruction Fuzzy Hash: 73610F73B426A09BEF568F2690407ADB3A3FB55BA4F189121DF590778CDA38DC62C701

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 209 1a1ca6e6910-1a1ca6e6916 210 1a1ca6e6918-1a1ca6e691b 209->210 211 1a1ca6e6951-1a1ca6e695b 209->211 212 1a1ca6e691d-1a1ca6e6920 210->212 213 1a1ca6e6945-1a1ca6e6984 call 1a1ca6e6fc0 210->213 214 1a1ca6e6a78-1a1ca6e6a8d 211->214 215 1a1ca6e6938 __scrt_dllmain_crt_thread_attach 212->215 216 1a1ca6e6922-1a1ca6e6925 212->216 229 1a1ca6e698a-1a1ca6e699f call 1a1ca6e6e54 213->229 230 1a1ca6e6a52 213->230 217 1a1ca6e6a8f 214->217 218 1a1ca6e6a9c-1a1ca6e6ab6 call 1a1ca6e6e54 214->218 224 1a1ca6e693d-1a1ca6e6944 215->224 220 1a1ca6e6927-1a1ca6e6930 216->220 221 1a1ca6e6931-1a1ca6e6936 call 1a1ca6e6f04 216->221 222 1a1ca6e6a91-1a1ca6e6a9b 217->222 232 1a1ca6e6aef-1a1ca6e6b20 call 1a1ca6e7190 218->232 233 1a1ca6e6ab8-1a1ca6e6aed call 1a1ca6e6f7c call 1a1ca6e6e1c call 1a1ca6e7318 call 1a1ca6e7130 call 1a1ca6e7154 call 1a1ca6e6fac 218->233 221->224 241 1a1ca6e6a6a-1a1ca6e6a77 call 1a1ca6e7190 229->241 242 1a1ca6e69a5-1a1ca6e69b6 call 1a1ca6e6ec4 229->242 234 1a1ca6e6a54-1a1ca6e6a69 230->234 243 1a1ca6e6b31-1a1ca6e6b37 232->243 244 1a1ca6e6b22-1a1ca6e6b28 232->244 233->222 241->214 261 1a1ca6e6a07-1a1ca6e6a11 call 1a1ca6e7130 242->261 262 1a1ca6e69b8-1a1ca6e69dc call 1a1ca6e72dc call 1a1ca6e6e0c call 1a1ca6e6e38 call 1a1ca6eac0c 242->262 249 1a1ca6e6b7e-1a1ca6e6b94 call 1a1ca6e268c 243->249 250 1a1ca6e6b39-1a1ca6e6b43 243->250 244->243 248 1a1ca6e6b2a-1a1ca6e6b2c 244->248 255 1a1ca6e6c1f-1a1ca6e6c2c 248->255 270 1a1ca6e6bcc-1a1ca6e6bce 249->270 271 1a1ca6e6b96-1a1ca6e6b98 249->271 256 1a1ca6e6b4f-1a1ca6e6b5d call 1a1ca6f5780 250->256 257 1a1ca6e6b45-1a1ca6e6b4d 250->257 264 1a1ca6e6b63-1a1ca6e6b78 call 1a1ca6e6910 256->264 274 1a1ca6e6c15-1a1ca6e6c1d 256->274 257->264 261->230 282 1a1ca6e6a13-1a1ca6e6a1f call 1a1ca6e7180 261->282 262->261 312 1a1ca6e69de-1a1ca6e69e5 __scrt_dllmain_after_initialize_c 262->312 264->249 264->274 272 1a1ca6e6bd0-1a1ca6e6bd3 270->272 273 1a1ca6e6bd5-1a1ca6e6bea call 1a1ca6e6910 270->273 271->270 279 1a1ca6e6b9a-1a1ca6e6bbc call 1a1ca6e268c call 1a1ca6e6a78 271->279 272->273 272->274 273->274 291 1a1ca6e6bec-1a1ca6e6bf6 273->291 274->255 279->270 306 1a1ca6e6bbe-1a1ca6e6bc6 call 1a1ca6f5780 279->306 299 1a1ca6e6a45-1a1ca6e6a50 282->299 300 1a1ca6e6a21-1a1ca6e6a2b call 1a1ca6e7098 282->300 296 1a1ca6e6bf8-1a1ca6e6bff 291->296 297 1a1ca6e6c01-1a1ca6e6c11 call 1a1ca6f5780 291->297 296->274 297->274 299->234 300->299 311 1a1ca6e6a2d-1a1ca6e6a3b 300->311 306->270 311->299 312->261 313 1a1ca6e69e7-1a1ca6e6a04 call 1a1ca6eabc8 312->313 313->261
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000001A.00000002.3388721328.000001A1CA6E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001A1CA6E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_26_2_1a1ca6e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                              • String ID: `dynamic initializer for '$`eh vector copy constructor iterator'$`eh vector vbase copy constructor iterator'$scriptor'
                                                              • API String ID: 190073905-1786718095
                                                              • Opcode ID: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction ID: 039e8d9811416d387a6c32b42b75de2d4594fd3f57fa495e321c2590bd5045e3
                                                              • Opcode Fuzzy Hash: 0257f947f8d22f27d89668d16c5c48cc6f3519c7a2ac610662f1932688afbc32
                                                              • Instruction Fuzzy Hash: 2481F17B7C2221A6FA53AB2598413D96293E787BB0F548025AB454739EEF38CC46C702

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 467 1a1ca6e9944-1a1ca6e99ac call 1a1ca6ea814 470 1a1ca6e9e13-1a1ca6e9e1b call 1a1ca6ebb48 467->470 471 1a1ca6e99b2-1a1ca6e99b5 467->471 471->470 472 1a1ca6e99bb-1a1ca6e99c1 471->472 474 1a1ca6e9a90-1a1ca6e9aa2 472->474 475 1a1ca6e99c7-1a1ca6e99cb 472->475 477 1a1ca6e9aa8-1a1ca6e9aac 474->477 478 1a1ca6e9d63-1a1ca6e9d67 474->478 475->474 479 1a1ca6e99d1-1a1ca6e99dc 475->479 477->478 480 1a1ca6e9ab2-1a1ca6e9abd 477->480 482 1a1ca6e9da0-1a1ca6e9daa call 1a1ca6e8a34 478->482 483 1a1ca6e9d69-1a1ca6e9d70 478->483 479->474 481 1a1ca6e99e2-1a1ca6e99e7 479->481 480->478 484 1a1ca6e9ac3-1a1ca6e9aca 480->484 481->474 485 1a1ca6e99ed-1a1ca6e99f7 call 1a1ca6e8a34 481->485 482->470 496 1a1ca6e9dac-1a1ca6e9dcb call 1a1ca6e6d40 482->496 483->470 486 1a1ca6e9d76-1a1ca6e9d9b call 1a1ca6e9e1c 483->486 488 1a1ca6e9ad0-1a1ca6e9b07 call 1a1ca6e8e10 484->488 489 1a1ca6e9c94-1a1ca6e9ca0 484->489 485->496 500 1a1ca6e99fd-1a1ca6e9a28 call 1a1ca6e8a34 * 2 call 1a1ca6e9124 485->500 486->482 488->489 505 1a1ca6e9b0d-1a1ca6e9b15 488->505 489->482 493 1a1ca6e9ca6-1a1ca6e9caa 489->493 497 1a1ca6e9cac-1a1ca6e9cb8 call 1a1ca6e90e4 493->497 498 1a1ca6e9cba-1a1ca6e9cc2 493->498 497->498 511 1a1ca6e9cdb-1a1ca6e9ce3 497->511 498->482 504 1a1ca6e9cc8-1a1ca6e9cd5 call 1a1ca6e8cb4 498->504 536 1a1ca6e9a2a-1a1ca6e9a2e 500->536 537 1a1ca6e9a48-1a1ca6e9a52 call 1a1ca6e8a34 500->537 504->482 504->511 509 1a1ca6e9b19-1a1ca6e9b4b 505->509 513 1a1ca6e9c87-1a1ca6e9c8e 509->513 514 1a1ca6e9b51-1a1ca6e9b5c 509->514 516 1a1ca6e9ce9-1a1ca6e9ced 511->516 517 1a1ca6e9df6-1a1ca6e9e12 call 1a1ca6e8a34 * 2 call 1a1ca6ebaa8 511->517 513->489 513->509 514->513 518 1a1ca6e9b62-1a1ca6e9b7b 514->518 520 1a1ca6e9cef-1a1ca6e9cfe call 1a1ca6e90e4 516->520 521 1a1ca6e9d00 516->521 517->470 522 1a1ca6e9c74-1a1ca6e9c79 518->522 523 1a1ca6e9b81-1a1ca6e9bc6 call 1a1ca6e90f8 * 2 518->523 531 1a1ca6e9d03-1a1ca6e9d0d call 1a1ca6ea8ac 520->531 521->531 527 1a1ca6e9c84 522->527 548 1a1ca6e9bc8-1a1ca6e9bee call 1a1ca6e90f8 call 1a1ca6ea038 523->548 549 1a1ca6e9c04-1a1ca6e9c0a 523->549 527->513 531->482 545 1a1ca6e9d13-1a1ca6e9d61 call 1a1ca6e8d44 call 1a1ca6e8f50 531->545 536->537 542 1a1ca6e9a30-1a1ca6e9a3b 536->542 537->474 552 1a1ca6e9a54-1a1ca6e9a74 call 1a1ca6e8a34 * 2 call 1a1ca6ea8ac 537->552 542->537 544 1a1ca6e9a3d-1a1ca6e9a42 542->544 544->470 544->537 545->482 567 1a1ca6e9bf0-1a1ca6e9c02 548->567 568 1a1ca6e9c15-1a1ca6e9c72 call 1a1ca6e9870 548->568 556 1a1ca6e9c7b 549->556 557 1a1ca6e9c0c-1a1ca6e9c10 549->557 573 1a1ca6e9a8b 552->573 574 1a1ca6e9a76-1a1ca6e9a80 call 1a1ca6ea99c 552->574 561 1a1ca6e9c80 556->561 557->523 561->527 567->548 567->549 568->561 573->474 577 1a1ca6e9df0-1a1ca6e9df5 call 1a1ca6ebaa8 574->577 578 1a1ca6e9a86-1a1ca6e9def call 1a1ca6e86ac call 1a1ca6ea3f4 call 1a1ca6e88a0 574->578 577->517 578->577
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000001A.00000002.3388721328.000001A1CA6E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001A1CA6E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_26_2_1a1ca6e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                              • String ID: csm$csm$csm
                                                              • API String ID: 849930591-393685449
                                                              • Opcode ID: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                              • Instruction ID: a33b61f7252c48a8ff5deff85b341fb991715874bd0d5d4cd81d52545042a901
                                                              • Opcode Fuzzy Hash: 65b39982983e806640910362ba4e105e6dc551b6220b15538d356c191c28ac3a
                                                              • Instruction Fuzzy Hash: 19E1AF73742B6096EB62DBA5D4403DDBBA2FB46BA8F100115EF4A47B99CB34C491C702
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000001A.00000002.3388721328.000001A1CA6E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001A1CA6E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_26_2_1a1ca6e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: _set_statfp
                                                              • String ID:
                                                              • API String ID: 1156100317-0
                                                              • Opcode ID: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction ID: 8c7b11ddc80ccfc1c98d7406fca644481f95fcd76dba989a6670564aaad9392c
                                                              • Opcode Fuzzy Hash: 9af7c444609857cffc651de9bcb8f693be62289a5d0e310862a2fbcb97617874
                                                              • Instruction Fuzzy Hash: 8211A7337E6A3131FB961528EC4A3ED118B6BDB374FC84638AB76072DECA34C8455212
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000001A.00000002.3388721328.000001A1CA6E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001A1CA6E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_26_2_1a1ca6e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID: Tuesday$Wednesday$or copy constructor iterator'
                                                              • API String ID: 3215553584-4202648911
                                                              • Opcode ID: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                              • Instruction ID: 4c0cbab14a7f6e7d52f8b7fb1f5b1ad98ec1a7fdcff429646b330f84139264da
                                                              • Opcode Fuzzy Hash: 9e57f18f61c22f0406784eb273be7b0d6046b42052b72e443b30de0c50228f55
                                                              • Instruction Fuzzy Hash: 5061C03778366467FA6B8B68E5543EA6AA3E7837B4F914415DB0A077ACDB34C841C303
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000001A.00000002.3388721328.000001A1CA6E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001A1CA6E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_26_2_1a1ca6e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                              • String ID: csm$csm
                                                              • API String ID: 3896166516-3733052814
                                                              • Opcode ID: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction ID: 18d07b32e9db3f301f191715a40212ea1b42970719aec1d811589bdbfb8c7d3a
                                                              • Opcode Fuzzy Hash: b607b9418e38c48ebb6f53552568b8ff7a3aff5a85fd43f0b6d07fa9fad214e5
                                                              • Instruction Fuzzy Hash: 5651C1333413A4DAEB768F1595443D877A2F767BA6F184215DB9987BC9CB38C450CB02
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000001A.00000002.3388721328.000001A1CA6E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001A1CA6E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_26_2_1a1ca6e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritable__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 3242871069-629598281
                                                              • Opcode ID: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                              • Instruction ID: 6f5331e060d5103dc2375ec47878150fe940775a08f328f03ff687d6810533a2
                                                              • Opcode Fuzzy Hash: 114af5d7cf0438a1297bb8b9b6869ba79c6078414514cf9bb502ab9f42d0baed
                                                              • Instruction Fuzzy Hash: 2251DD33753620AAEB96CF25E408B9C3796F356BA8F518124DB164378CEB34CC41CB06
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000001A.00000002.3388721328.000001A1CA6E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001A1CA6E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_26_2_1a1ca6e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritable__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 3242871069-629598281
                                                              • Opcode ID: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                              • Instruction ID: b88cda04af8e2256953701f3fb8467a64d7e1f1677ebc28f90424d96db1c36b4
                                                              • Opcode Fuzzy Hash: 0036035fc280b7a5a111a049c7edfc77b7be6b9ab52e14187ebc45e366edaa55
                                                              • Instruction Fuzzy Hash: DD317A33342660EAE756DF25E848B9977AAF342BA8F558414EF5A0778CDB38C940C706
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000001A.00000002.3388721328.000001A1CA6E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001A1CA6E0000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_26_2_1a1ca6e0000_svchost.jbxd
                                                              Similarity
                                                              • API ID: __std_exception_copy
                                                              • String ID: Locator'$riptor at (
                                                              • API String ID: 592178966-4215709766
                                                              • Opcode ID: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                              • Instruction ID: 38a32f0ec5988e23dc970de0174968705f9a9aefe4ef577489d3ef5a2710b884
                                                              • Opcode Fuzzy Hash: af0f0512ca75cd806a30771dd11e2a0f17b9e6725b3a9df23089972a8cb9d3f7
                                                              • Instruction Fuzzy Hash: 55E08672741B4490DF078F21D8402DC7365E759B64FC89122CA4C07355EA38D5E5C301