Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
360safe.exe

Overview

General Information

Sample name:360safe.exe
Analysis ID:1565272
MD5:da7d87948abd48d5ba7f0449a12baed1
SHA1:ce1a7523a2333d3bfedeb2ff596cd950e2d73c6d
SHA256:0452656d33fcd78f19ad3fbb44594fa6b64852a2882353266377cfe3e65ad02f
Tags:exeSliverFoxWinOsuser-kafan_shengui
Infos:

Detection

Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Benign windows process drops PE files
AI detected suspicious sample
Allocates memory in foreign processes
Changes memory attributes in foreign processes to executable or writable
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Found direct / indirect Syscall (likely to bypass EDR)
Found evasive API chain checking for user administrative privileges
Modifies the context of a thread in another process (thread injection)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to communicate with device drivers
Contains functionality to create new users
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to enumerate network shares
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a process as a different user
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Entry point lies outside standard sections
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Tries to disable installed Antivirus / HIPS / PFW
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 360safe.exe (PID: 6536 cmdline: "C:\Users\user\Desktop\360safe.exe" MD5: DA7D87948ABD48D5BA7F0449A12BAED1)
    • svchost.exe (PID: 932 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 3752 cmdline: C:\Windows\system32\svchost.exe -k netsvcs MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • dllhost.exe (PID: 6392 cmdline: C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233} MD5: 08EB78E5BE019DF044C26B14703BD1FA)
      • HoopCity.exe (PID: 4036 cmdline: "C:\Program Files\Windows Mail\HoopCity.exe" MD5: EF8BDE64E1943C51E2DE2E5CB0182DEB)
      • svchost.exe (PID: 2352 cmdline: C:\Windows\system32\svchost.exe -k netsvcs MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • dllhost.exe (PID: 1196 cmdline: C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233} MD5: 08EB78E5BE019DF044C26B14703BD1FA)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule, CommandLine: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\360safe.exe", ParentImage: C:\Users\user\Desktop\360safe.exe, ParentProcessId: 6536, ParentProcessName: 360safe.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule, ProcessId: 932, ProcessName: svchost.exe
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule, CommandLine: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\360safe.exe", ParentImage: C:\Users\user\Desktop\360safe.exe, ParentProcessId: 6536, ParentProcessName: 360safe.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule, ProcessId: 932, ProcessName: svchost.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.0% probability
Source: C:\Windows\System32\svchost.exeDirectory created: C:\Program Files\Windows Mail\HoopCity.exeJump to behavior
Source: C:\Windows\System32\svchost.exeDirectory created: C:\Program Files\Windows Mail\HoopCityBase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeDirectory created: C:\Program Files\Windows Mail\mimidump.infJump to behavior
Source: Binary string: C:\buildslave\unity\build\artifacts\WindowsPlayer\Win64_VS2019_nondev_i_r\WindowsPlayer_player_Master_il2cpp_x64.pdb source: 360safe.exe, 00000000.00000002.1271635037.0000000004EC0000.00000004.00001000.00020000.00000000.sdmp, 360safe.exe, 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2495015925.000002287B370000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2485887283.0000000180013000.00000002.00000001.00020000.00000000.sdmp, HoopCity.exe, HoopCity.exe, 0000000A.00000002.1279364875.000000014000C000.00000002.00000001.01000000.00000008.sdmp, HoopCity.exe.3.dr
Source: Binary string: C:\Users\Administrator\Desktop\QtWidgetsApplication1\x64\Release\QtWidgetsApplication1.pdb source: 360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: C:\Users\Administrator\Desktop\QtWidgetsApplication1\x64\Release\QtWidgetsApplication1.pdb$ source: 360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: QtWidgetsApplication1.pdb source: 360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmp
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5068A0 NetUserEnum,lstrlenW,NetApiBufferFree,malloc,VirtualFree,VirtualFree,free,VirtualFree,VirtualFree,3_2_000002287B5068A0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC268A0 NetUserEnum,lstrlenW,NetApiBufferFree,malloc,VirtualFree,VirtualFree,free,VirtualFree,VirtualFree,3_2_000002287BC268A0
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800268A0 NetUserEnum,lstrlenW,NetApiBufferFree,malloc,VirtualFree,VirtualFree,free,VirtualFree,VirtualFree,6_2_00000001800268A0
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_00000001800268A0 NetUserEnum,lstrlenW,NetApiBufferFree,malloc,VirtualFree,VirtualFree,free,VirtualFree,VirtualFree,10_2_00000001800268A0
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_00000001800268A0 NetUserEnum,lstrlenW,NetApiBufferFree,malloc,VirtualFree,VirtualFree,free,VirtualFree,VirtualFree,11_2_00000001800268A0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FC9B0 memset,lstrcatW,lstrcatW,memset,FindFirstFileW,FindNextFileW,FindNextFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000002287B4FC9B0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FDF30 malloc,memset,FindFirstFileW,free,3_2_000002287B4FDF30
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FCE50 memset,memset,memset,memset,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,memset,memset,wsprintfW,wsprintfW,FindFirstFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,memset,memset,wsprintfW,FindFirstFileW,FindNextFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,memset,memset,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,FindNextFileW,FindNextFileW,lstrlenW,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000002287B4FCE50
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FE370 __chkstk,memset,memset,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,memset,lstrcatW,lstrcatW,lstrcatW,Sleep,lstrlenW,wcsstr,GetCurrentThread,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,LeaveCriticalSection,WaitForSingleObject,VirtualFree,VirtualFree,3_2_000002287B4FE370
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC1DF30 malloc,memset,FindFirstFileW,free,3_2_000002287BC1DF30
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC1CE50 memset,memset,memset,memset,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,memset,memset,wsprintfW,wsprintfW,FindFirstFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,memset,memset,wsprintfW,FindFirstFileW,FindNextFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,memset,memset,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,FindNextFileW,FindNextFileW,lstrlenW,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000002287BC1CE50
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC1E370 __chkstk,memset,memset,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,memset,lstrcatW,lstrcatW,lstrcatW,Sleep,lstrlenW,wcsstr,GetCurrentThread,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,LeaveCriticalSection,WaitForSingleObject,VirtualFree,VirtualFree,3_2_000002287BC1E370
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC1C9B0 memset,lstrcatW,lstrcatW,memset,FindFirstFileW,FindNextFileW,FindNextFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000002287BC1C9B0
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018001E370 __chkstk,memset,memset,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,memset,lstrcatW,lstrcatW,lstrcatW,Sleep,lstrlenW,wcsstr,GetCurrentThread,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,LeaveCriticalSection,WaitForSingleObject,VirtualFree,VirtualFree,6_2_000000018001E370
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018001C9B0 memset,lstrcatW,lstrcatW,memset,FindFirstFileW,FindNextFileW,FindNextFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,6_2_000000018001C9B0
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018001CE50 memset,memset,memset,memset,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,memset,memset,wsprintfW,wsprintfW,FindFirstFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,memset,memset,wsprintfW,FindFirstFileW,FindNextFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,memset,memset,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,FindNextFileW,FindNextFileW,lstrlenW,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,6_2_000000018001CE50
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018001DF30 malloc,memset,FindFirstFileW,free,6_2_000000018001DF30
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_00007FFB1C2E6418 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,__std_fs_open_handle,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,CloseHandle,CloseHandle,abort,abort,abort,10_2_00007FFB1C2E6418
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_000000018001E370 __chkstk,memset,memset,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,memset,lstrcatW,lstrcatW,lstrcatW,Sleep,lstrlenW,wcsstr,GetCurrentThread,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,LeaveCriticalSection,WaitForSingleObject,VirtualFree,VirtualFree,10_2_000000018001E370
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_000000018001C9B0 memset,lstrcatW,lstrcatW,memset,FindFirstFileW,FindNextFileW,FindNextFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,10_2_000000018001C9B0
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_000000018001CE50 memset,memset,memset,memset,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,memset,memset,wsprintfW,wsprintfW,FindFirstFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,memset,memset,wsprintfW,FindFirstFileW,FindNextFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,memset,memset,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,FindNextFileW,FindNextFileW,lstrlenW,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,10_2_000000018001CE50
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_000000018001DF30 malloc,memset,FindFirstFileW,free,10_2_000000018001DF30
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_000000018001E370 __chkstk,memset,memset,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,memset,lstrcatW,lstrcatW,lstrcatW,Sleep,lstrlenW,wcsstr,GetCurrentThread,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,LeaveCriticalSection,WaitForSingleObject,VirtualFree,VirtualFree,11_2_000000018001E370
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_000000018001C9B0 memset,lstrcatW,lstrcatW,memset,FindFirstFileW,FindNextFileW,FindNextFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,11_2_000000018001C9B0
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_000000018001CE50 memset,memset,memset,memset,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,memset,memset,wsprintfW,wsprintfW,FindFirstFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,memset,memset,wsprintfW,FindFirstFileW,FindNextFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,memset,memset,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,FindNextFileW,FindNextFileW,lstrlenW,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,11_2_000000018001CE50
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_000000018001DF30 malloc,memset,FindFirstFileW,free,11_2_000000018001DF30
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B509B00 memset,memset,VirtualFree,VirtualFree,GetModuleHandleW,GetProcAddress,GetProcAddress,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,OpenProcess,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,TerminateProcess,Sleep,DeleteFileW,lstrcpyW,lstrcatW,TerminateProcess,CloseHandle,Sleep,3_2_000002287B509B00
Source: Joe Sandbox ViewIP Address: 103.235.47.188 103.235.47.188
Source: Joe Sandbox ViewIP Address: 103.235.47.188 103.235.47.188
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownTCP traffic detected without corresponding DNS query: 192.197.113.45
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B512CE0 VirtualAlloc,CreateEventW,WSARecv,WSAGetLastError,WaitForMultipleObjects,WSAGetOverlappedResult,WSAGetLastError,CloseHandle,VirtualFree,3_2_000002287B512CE0
Source: global trafficDNS traffic detected: DNS query: www.baidu.com
Source: 360safe.exeString found in binary or memory: http://.css
Source: 360safe.exeString found in binary or memory: http://.jpg
Source: 360safe.exe, 00000000.00000002.1271635037.0000000004F4E000.00000004.00001000.00020000.00000000.sdmp, 360safe.exe, 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2485887283.00000001800B4000.00000002.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2495015925.000002287B3FE000.00000004.00000001.00020000.00000000.sdmp, HoopCity.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: 360safe.exe, 00000000.00000002.1271635037.0000000004F4E000.00000004.00001000.00020000.00000000.sdmp, 360safe.exe, 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2485887283.00000001800B4000.00000002.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2495015925.000002287B3FE000.00000004.00000001.00020000.00000000.sdmp, HoopCity.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: 360safe.exe, 00000000.00000002.1271635037.0000000004F4E000.00000004.00001000.00020000.00000000.sdmp, 360safe.exe, 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2485887283.00000001800B4000.00000002.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2495015925.000002287B3FE000.00000004.00000001.00020000.00000000.sdmp, HoopCity.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: 360safe.exe, 00000000.00000002.1271635037.0000000004F4E000.00000004.00001000.00020000.00000000.sdmp, 360safe.exe, 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2485887283.00000001800B4000.00000002.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2495015925.000002287B3FE000.00000004.00000001.00020000.00000000.sdmp, HoopCity.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: 360safe.exe, 00000000.00000002.1271635037.0000000004F4E000.00000004.00001000.00020000.00000000.sdmp, 360safe.exe, 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2485887283.00000001800B4000.00000002.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2495015925.000002287B3FE000.00000004.00000001.00020000.00000000.sdmp, HoopCity.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: 360safe.exe, 00000000.00000002.1271635037.0000000004F4E000.00000004.00001000.00020000.00000000.sdmp, 360safe.exe, 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2485887283.00000001800B4000.00000002.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2495015925.000002287B3FE000.00000004.00000001.00020000.00000000.sdmp, HoopCity.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: 360safe.exe, 00000000.00000002.1271635037.0000000004F4E000.00000004.00001000.00020000.00000000.sdmp, 360safe.exe, 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2485887283.00000001800B4000.00000002.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2495015925.000002287B3FE000.00000004.00000001.00020000.00000000.sdmp, HoopCity.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: HoopCity.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: 360safe.exe, 00000000.00000002.1271635037.0000000004F4E000.00000004.00001000.00020000.00000000.sdmp, 360safe.exe, 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2485887283.00000001800B4000.00000002.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2495015925.000002287B3FE000.00000004.00000001.00020000.00000000.sdmp, HoopCity.exe.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: 360safe.exe, 00000000.00000000.1247174904.0000000141933000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://dl.360safe.com/offlinepackv4.exe
Source: 360safe.exeString found in binary or memory: http://html4/loose.dtd
Source: 360safe.exe, 00000000.00000002.1271635037.0000000004F4E000.00000004.00001000.00020000.00000000.sdmp, 360safe.exe, 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2485887283.00000001800B4000.00000002.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2495015925.000002287B3FE000.00000004.00000001.00020000.00000000.sdmp, HoopCity.exe.3.drString found in binary or memory: http://ocsp.digicert.com0
Source: 360safe.exe, 00000000.00000002.1271635037.0000000004F4E000.00000004.00001000.00020000.00000000.sdmp, 360safe.exe, 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2485887283.00000001800B4000.00000002.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2495015925.000002287B3FE000.00000004.00000001.00020000.00000000.sdmp, HoopCity.exe.3.drString found in binary or memory: http://ocsp.digicert.com0A
Source: 360safe.exe, 00000000.00000002.1271635037.0000000004F4E000.00000004.00001000.00020000.00000000.sdmp, 360safe.exe, 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2485887283.00000001800B4000.00000002.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2495015925.000002287B3FE000.00000004.00000001.00020000.00000000.sdmp, HoopCity.exe.3.drString found in binary or memory: http://ocsp.digicert.com0C
Source: 360safe.exe, 00000000.00000002.1271635037.0000000004F4E000.00000004.00001000.00020000.00000000.sdmp, 360safe.exe, 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2485887283.00000001800B4000.00000002.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2495015925.000002287B3FE000.00000004.00000001.00020000.00000000.sdmp, HoopCity.exe.3.drString found in binary or memory: http://ocsp.digicert.com0X
Source: 360safe.exe, 00000000.00000000.1247174904.0000000141933000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://s.360.cn/safe/xxzx.html?stype=msgcenter&type=
Source: 360safe.exe, 00000000.00000000.1247174904.0000000141933000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.360.cn/weishi/cht/index.html#http://dl.360safe.com/setupbeta.exe
Source: 360safe.exe, 00000000.00000002.1271635037.0000000004F4E000.00000004.00001000.00020000.00000000.sdmp, 360safe.exe, 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2485887283.00000001800B4000.00000002.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2495015925.000002287B3FE000.00000004.00000001.00020000.00000000.sdmp, HoopCity.exe.3.drString found in binary or memory: http://www.digicert.com/CPS0
Source: 360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://chrome.google.com/webstore/category/extensions
Source: 360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=zh-CN&category=theme81https://myactivity.google.com/myactivity
Source: 360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=zh-CNCtrl$1
Source: 360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherEnabled
Source: 360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
Source: 360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
Source: 360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherUrlGreylist
Source: 360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherUrlList
Source: 360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherUseIeSitelist
Source: 360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%22
Source: 360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://myactivity.google.com/
Source: 360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://passwords.google.com
Source: 360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://policies.google.com/
Source: 360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://support.google.com/chrome/a/?p=browser_profile_details
Source: 360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://support.google.com/chrome/a/answer/9122284
Source: 360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://support.google.com/chrome/answer/6098869
Source: 360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://support.google.com/chrome/answer/96817
Source: 360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://support.google.com/chromebook?p=app_intent
Source: 360safe.exe, 00000000.00000000.1247174904.0000000141933000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://tools.soft.360.cn/jump?id=41X
Source: 360safe.exe, 00000000.00000000.1247174904.0000000141933000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://update.360safe.com/safe/checkupdate.ini2http://update.360safe.com/safe/checkupdate_cht.ini&
Source: 360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.google.com/chrome/privacy/eula_text.html
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F9B50 lstrlenW,WideCharToMultiByte,VirtualAlloc,lstrlenW,lstrlenW,WideCharToMultiByte,VirtualAlloc,lstrlenW,WideCharToMultiByte,WideCharToMultiByte,lstrlenA,memcpy,OpenClipboard,EmptyClipboard,lstrlenA,GlobalAlloc,GlobalLock,lstrlenA,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,VirtualFree,VirtualFree,3_2_000002287B4F9B50
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F9B50 lstrlenW,WideCharToMultiByte,VirtualAlloc,lstrlenW,lstrlenW,WideCharToMultiByte,VirtualAlloc,lstrlenW,WideCharToMultiByte,WideCharToMultiByte,lstrlenA,memcpy,OpenClipboard,EmptyClipboard,lstrlenA,GlobalAlloc,GlobalLock,lstrlenA,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,VirtualFree,VirtualFree,3_2_000002287B4F9B50
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F9930 EnterCriticalSection,LeaveCriticalSection,EnterCriticalSection,LeaveCriticalSection,lstrlenW,memcmp,lstrlenW,lstrlenW,lstrlenW,memcpy,OpenClipboard,CloseClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,3_2_000002287B4F9930
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B506290 VirtualFree,VirtualFree,OpenClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,VirtualFree,VirtualFree,3_2_000002287B506290
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B50F240 OpenClipboard,Sleep,GetLastError,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,3_2_000002287B50F240
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC19B50 lstrlenW,WideCharToMultiByte,VirtualAlloc,lstrlenW,lstrlenW,WideCharToMultiByte,VirtualAlloc,lstrlenW,WideCharToMultiByte,WideCharToMultiByte,lstrlenA,memcpy,OpenClipboard,EmptyClipboard,lstrlenA,GlobalAlloc,GlobalLock,lstrlenA,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,VirtualFree,VirtualFree,3_2_000002287BC19B50
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC26290 VirtualFree,VirtualFree,OpenClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,VirtualFree,VirtualFree,3_2_000002287BC26290
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC2F240 OpenClipboard,Sleep,GetLastError,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,3_2_000002287BC2F240
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC19930 EnterCriticalSection,LeaveCriticalSection,EnterCriticalSection,LeaveCriticalSection,lstrlenW,memcmp,lstrlenW,lstrlenW,lstrlenW,memcpy,OpenClipboard,CloseClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,3_2_000002287BC19930
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018002F240 OpenClipboard,Sleep,GetLastError,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,6_2_000000018002F240
Source: C:\Windows\System32\svchost.exeCode function: 6_2_0000000180026290 VirtualFree,VirtualFree,OpenClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,VirtualFree,VirtualFree,6_2_0000000180026290
Source: C:\Windows\System32\svchost.exeCode function: 6_2_0000000180019930 EnterCriticalSection,LeaveCriticalSection,EnterCriticalSection,LeaveCriticalSection,lstrlenW,memcmp,lstrlenW,lstrlenW,lstrlenW,memcpy,OpenClipboard,CloseClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,6_2_0000000180019930
Source: C:\Windows\System32\svchost.exeCode function: 6_2_0000000180019B50 lstrlenW,WideCharToMultiByte,VirtualAlloc,lstrlenW,lstrlenW,WideCharToMultiByte,VirtualAlloc,lstrlenW,WideCharToMultiByte,WideCharToMultiByte,lstrlenA,memcpy,OpenClipboard,EmptyClipboard,lstrlenA,GlobalAlloc,GlobalLock,lstrlenA,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,VirtualFree,VirtualFree,6_2_0000000180019B50
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_000000018002F240 OpenClipboard,Sleep,GetLastError,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,10_2_000000018002F240
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_0000000180026290 VirtualFree,VirtualFree,OpenClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,VirtualFree,VirtualFree,10_2_0000000180026290
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_0000000180019930 EnterCriticalSection,LeaveCriticalSection,EnterCriticalSection,LeaveCriticalSection,lstrlenW,memcmp,lstrlenW,lstrlenW,lstrlenW,memcpy,OpenClipboard,CloseClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,10_2_0000000180019930
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_0000000180019B50 lstrlenW,WideCharToMultiByte,VirtualAlloc,lstrlenW,lstrlenW,WideCharToMultiByte,VirtualAlloc,lstrlenW,WideCharToMultiByte,WideCharToMultiByte,lstrlenA,memcpy,OpenClipboard,EmptyClipboard,lstrlenA,GlobalAlloc,GlobalLock,lstrlenA,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,VirtualFree,VirtualFree,10_2_0000000180019B50
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_000000018002F240 OpenClipboard,Sleep,GetLastError,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,11_2_000000018002F240
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_0000000180026290 VirtualFree,VirtualFree,OpenClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,VirtualFree,VirtualFree,11_2_0000000180026290
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_0000000180019930 EnterCriticalSection,LeaveCriticalSection,EnterCriticalSection,LeaveCriticalSection,lstrlenW,memcmp,lstrlenW,lstrlenW,lstrlenW,memcpy,OpenClipboard,CloseClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,11_2_0000000180019930
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_0000000180019B50 lstrlenW,WideCharToMultiByte,VirtualAlloc,lstrlenW,lstrlenW,WideCharToMultiByte,VirtualAlloc,lstrlenW,WideCharToMultiByte,WideCharToMultiByte,lstrlenA,memcpy,OpenClipboard,EmptyClipboard,lstrlenA,GlobalAlloc,GlobalLock,lstrlenA,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,VirtualFree,VirtualFree,11_2_0000000180019B50
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FADC0 DefWindowProcW,SendMessageW,OpenClipboard,GetClipboardData,GlobalLock,lstrlenW,lstrlenW,lstrlenW,GlobalUnlock,CloseClipboard,VirtualFree,VirtualFree,CloseClipboard,SendMessageW,PostQuitMessage,3_2_000002287B4FADC0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FA570 GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,3_2_000002287B4FA570
Source: 360safe.exe, 00000000.00000002.1269853976.00000000024AD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevicesmemstr_2aef89ae-b
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_0000000180005824 realloc,NtQuerySystemInformation,0_2_0000000180005824
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_00000001800080F2 VirtualAllocEx,WriteProcessMemory,memset,RtlCopyMemory,NtAlpcConnectPort,0_2_00000001800080F2
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F1C70 CreateEventW,VirtualAlloc,WaitForSingleObject,NtQuerySystemInformation,VirtualFree,VirtualAlloc,memset,NtQuerySystemInformation,lstrcmpiW,WaitForSingleObject,CloseHandle,3_2_000002287B4F1C70
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F1AE0 CreateEventW,VirtualAlloc,WaitForSingleObject,NtQuerySystemInformation,VirtualFree,VirtualAlloc,memset,NtQuerySystemInformation,lstrcmpiW,WaitForSingleObject,CloseHandle,3_2_000002287B4F1AE0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F2990 NtQuerySystemInformation,GetModuleHandleW,GetModuleHandleW,GetModuleHandleW,VirtualProtect,VirtualProtect,3_2_000002287B4F2990
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC11C70 CreateEventW,VirtualAlloc,WaitForSingleObject,NtQuerySystemInformation,VirtualFree,VirtualAlloc,memset,NtQuerySystemInformation,lstrcmpiW,WaitForSingleObject,CloseHandle,3_2_000002287BC11C70
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC11AE0 CreateEventW,VirtualAlloc,WaitForSingleObject,NtQuerySystemInformation,VirtualFree,VirtualAlloc,memset,NtQuerySystemInformation,lstrcmpiW,WaitForSingleObject,CloseHandle,3_2_000002287BC11AE0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC12990 NtQuerySystemInformation,GetModuleHandleW,GetModuleHandleW,GetModuleHandleW,VirtualProtect,VirtualProtect,3_2_000002287BC12990
Source: C:\Windows\System32\svchost.exeCode function: 6_2_0000000180011AE0 CreateEventW,VirtualAlloc,WaitForSingleObject,NtQuerySystemInformation,VirtualFree,VirtualAlloc,memset,NtQuerySystemInformation,lstrcmpiW,WaitForSingleObject,CloseHandle,6_2_0000000180011AE0
Source: C:\Windows\System32\svchost.exeCode function: 6_2_0000000180011C70 CreateEventW,VirtualAlloc,WaitForSingleObject,NtQuerySystemInformation,VirtualFree,VirtualAlloc,memset,NtQuerySystemInformation,lstrcmpiW,WaitForSingleObject,CloseHandle,6_2_0000000180011C70
Source: C:\Windows\System32\svchost.exeCode function: 6_2_0000000180012990 NtQuerySystemInformation,GetModuleHandleW,GetModuleHandleW,GetModuleHandleW,VirtualProtect,VirtualProtect,6_2_0000000180012990
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_000000018001F870 VirtualAllocEx,GetLastError,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualProtectEx,GetModuleHandleW,GetProcAddress,NtCreateThreadEx,CreateRemoteThread,10_2_000000018001F870
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_0000000180012990 NtQuerySystemInformation,GetModuleHandleW,GetModuleHandleW,GetModuleHandleW,VirtualProtect,VirtualProtect,10_2_0000000180012990
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_0000000180011AE0 CreateEventW,VirtualAlloc,WaitForSingleObject,NtQuerySystemInformation,VirtualFree,VirtualAlloc,memset,NtQuerySystemInformation,lstrcmpiW,WaitForSingleObject,CloseHandle,10_2_0000000180011AE0
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_0000000180011C70 CreateEventW,VirtualAlloc,WaitForSingleObject,NtQuerySystemInformation,VirtualFree,VirtualAlloc,memset,NtQuerySystemInformation,lstrcmpiW,WaitForSingleObject,CloseHandle,10_2_0000000180011C70
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_0000000180012990 NtQuerySystemInformation,GetModuleHandleW,GetModuleHandleW,GetModuleHandleW,VirtualProtect,VirtualProtect,11_2_0000000180012990
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_0000000180011AE0 CreateEventW,VirtualAlloc,WaitForSingleObject,NtQuerySystemInformation,VirtualFree,VirtualAlloc,memset,NtQuerySystemInformation,lstrcmpiW,WaitForSingleObject,CloseHandle,11_2_0000000180011AE0
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_0000000180011C70 CreateEventW,VirtualAlloc,WaitForSingleObject,NtQuerySystemInformation,VirtualFree,VirtualAlloc,memset,NtQuerySystemInformation,lstrcmpiW,WaitForSingleObject,CloseHandle,11_2_0000000180011C70
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B500700: CreateFileW,memset,lstrlenA,DeviceIoControl,CloseHandle,3_2_000002287B500700
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F6110 GetCurrentProcessId,TerminateThread,TerminateProcess,lstrcmpiW,Sleep,ExitThread,memset,lstrcatW,lstrcatW,memset,GetSystemDirectoryW,GetLastError,lstrcatW,lstrcatW,lstrcatW,OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,memset,wsprintfW,memset,wsprintfW,memset,wsprintfW,memset,wsprintfW,memset,wsprintfW,SetFileAttributesW,DeleteFileW,SetFileAttributesW,DeleteFileW,SetFileAttributesW,DeleteFileW,SetFileAttributesW,DeleteFileW,SetFileAttributesW,DeleteFileW,SysAllocString,Sleep,GetCurrentProcess,TerminateProcess,3_2_000002287B4F6110
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5000A0 WTSQueryUserToken,GetLastError,DuplicateTokenEx,ConvertStringSidToSidW,GetLengthSid,SetTokenInformation,CreateEnvironmentBlock,CreateProcessAsUserW,CreateProcessAsUserW,GetLastError,CloseHandle,CloseHandle,DestroyEnvironmentBlock,CloseHandle,CloseHandle,3_2_000002287B5000A0
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\Microsoft\Windows\MicrosoftEdgeUpdateJump to behavior
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_00000001800054D50_2_00000001800054D5
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_00000001800080F20_2_00000001800080F2
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_00000001800015B00_2_00000001800015B0
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_0000000180009BC00_2_0000000180009BC0
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_00000001800010100_2_0000000180001010
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_00000001800038330_2_0000000180003833
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_000000018000284D0_2_000000018000284D
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_00000001800034640_2_0000000180003464
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_000000018000947B0_2_000000018000947B
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_00000001800038800_2_0000000180003880
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_0000000180002C8A0_2_0000000180002C8A
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_000000018000F8900_2_000000018000F890
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_0000000180004CB00_2_0000000180004CB0
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_00000001800044C10_2_00000001800044C1
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_000000018000ECE00_2_000000018000ECE0
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_0000000180003CF20_2_0000000180003CF2
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_000000018000290C0_2_000000018000290C
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_00000001800025260_2_0000000180002526
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_00000001800035300_2_0000000180003530
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_00000001800075500_2_0000000180007550
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_00000001800041530_2_0000000180004153
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_0000000180001D600_2_0000000180001D60
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_00000001800021700_2_0000000180002170
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_00000001800045A90_2_00000001800045A9
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_000000018000B1AC0_2_000000018000B1AC
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_0000000180003DBC0_2_0000000180003DBC
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_00000001800101C00_2_00000001800101C0
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_00000001800069E00_2_00000001800069E0
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_0000000180010E000_2_0000000180010E00
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_0000000180002A060_2_0000000180002A06
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_000000018000360B0_2_000000018000360B
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_0000000180001A100_2_0000000180001A10
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_0000000180002A190_2_0000000180002A19
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_00000001800032200_2_0000000180003220
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_000000018000B6200_2_000000018000B620
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_0000000180002E240_2_0000000180002E24
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_0000000180005E580_2_0000000180005E58
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_000000018000225E0_2_000000018000225E
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_00000001800026660_2_0000000180002666
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_000000018000B2800_2_000000018000B280
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_000000018000E2970_2_000000018000E297
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_000000018000469C0_2_000000018000469C
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_0000000180006AB00_2_0000000180006AB0
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_000000018000BEB00_2_000000018000BEB0
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_000000018000B6C00_2_000000018000B6C0
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_0000000180008EC00_2_0000000180008EC0
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_000000018000C2D00_2_000000018000C2D0
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_0000000180003AE00_2_0000000180003AE0
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_00000001800096E00_2_00000001800096E0
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_000000018000C6F00_2_000000018000C6F0
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_00000001800037170_2_0000000180003717
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_00000001800032200_2_0000000180003220
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_000000018000435B0_2_000000018000435B
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_0000000180006F700_2_0000000180006F70
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_000000018000C3700_2_000000018000C370
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_00000001800027770_2_0000000180002777
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_00000001800033B80_2_00000001800033B8
Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800010103_2_0000000180001010
Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180001D603_2_0000000180001D60
Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180001A103_2_0000000180001A10
Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800038333_2_0000000180003833
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018000284D3_2_000000018000284D
Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800034643_2_0000000180003464
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018000947B3_2_000000018000947B
Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800038803_2_0000000180003880
Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180002C8A3_2_0000000180002C8A
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018000F8903_2_000000018000F890
Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180004CB03_2_0000000180004CB0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800044C13_2_00000001800044C1
Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800054D53_2_00000001800054D5
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018000ECE03_2_000000018000ECE0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180003CF23_2_0000000180003CF2
Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800080F23_2_00000001800080F2
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018000290C3_2_000000018000290C
Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800025263_2_0000000180002526
Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800035303_2_0000000180003530
Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800075503_2_0000000180007550
Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800041533_2_0000000180004153
Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800021703_2_0000000180002170
Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800045A93_2_00000001800045A9
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018000B1AC3_2_000000018000B1AC
Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800015B03_2_00000001800015B0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180003DBC3_2_0000000180003DBC
Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800101C03_2_00000001800101C0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800069E03_2_00000001800069E0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180010E003_2_0000000180010E00
Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180002A063_2_0000000180002A06
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018000360B3_2_000000018000360B
Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180002A193_2_0000000180002A19
Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800032203_2_0000000180003220
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018000B6203_2_000000018000B620
Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180002E243_2_0000000180002E24
Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180005E583_2_0000000180005E58
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018000225E3_2_000000018000225E
Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800026663_2_0000000180002666
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018000B2803_2_000000018000B280
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018000E2973_2_000000018000E297
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018000469C3_2_000000018000469C
Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180006AB03_2_0000000180006AB0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018000BEB03_2_000000018000BEB0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018000B6C03_2_000000018000B6C0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180008EC03_2_0000000180008EC0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018000C2D03_2_000000018000C2D0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180003AE03_2_0000000180003AE0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800096E03_2_00000001800096E0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018000C6F03_2_000000018000C6F0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800037173_2_0000000180003717
Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800032203_2_0000000180003220
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018000435B3_2_000000018000435B
Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180006F703_2_0000000180006F70
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018000C3703_2_000000018000C370
Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800027773_2_0000000180002777
Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800033B83_2_00000001800033B8
Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180009BC03_2_0000000180009BC0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5007E03_2_000002287B5007E0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FFB403_2_000002287B4FFB40
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B50A8803_2_000002287B50A880
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FF8703_2_000002287B4FF870
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5108A03_2_000002287B5108A0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F78403_2_000002287B4F7840
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5168483_2_000002287B516848
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5058503_2_000002287B505850
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5079003_2_000002287B507900
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B50F9203_2_000002287B50F920
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5089103_2_000002287B508910
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F88E03_2_000002287B4F88E0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4EE8DC3_2_000002287B4EE8DC
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E176F3_2_000002287B4E176F
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5287703_2_000002287B528770
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F67903_2_000002287B4F6790
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5047903_2_000002287B504790
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5438003_2_000002287B543800
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5137F03_2_000002287B5137F0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5328203_2_000002287B532820
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4EB8223_2_000002287B4EB822
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4EA6A03_2_000002287B4EA6A0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E769C3_2_000002287B4E769C
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E16303_2_000002287B4E1630
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5367003_2_000002287B536700
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E67043_2_000002287B4E6704
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FB7003_2_000002287B4FB700
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5126F03_2_000002287B5126F0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E271A3_2_000002287B4E271A
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FE6B03_2_000002287B4FE6B0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5166DB3_2_000002287B5166DB
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F45703_2_000002287B4F4570
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FD5803_2_000002287B4FD580
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5135803_2_000002287B513580
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E656A3_2_000002287B4E656A
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5025703_2_000002287B502570
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E95883_2_000002287B4E9588
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F75303_2_000002287B4F7530
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5045403_2_000002287B504540
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4EC5F03_2_000002287B4EC5F0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5056203_2_000002287B505620
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5065C03_2_000002287B5065C0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E75D23_2_000002287B4E75D2
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4EF5E03_2_000002287B4EF5E0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4EAC803_2_000002287B4EAC80
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E3CA63_2_000002287B4E3CA6
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E6C983_2_000002287B4E6C98
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FAC303_2_000002287B4FAC30
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E7C3B3_2_000002287B4E7C3B
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B503C503_2_000002287B503C50
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B50FCED3_2_000002287B50FCED
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B545CF03_2_000002287B545CF0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B505D203_2_000002287B505D20
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B515D203_2_000002287B515D20
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F2CB03_2_000002287B4F2CB0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B50FCC03_2_000002287B50FCC0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B510CB03_2_000002287B510CB0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B50FCB73_2_000002287B50FCB7
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B50FCDB3_2_000002287B50FCDB
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E2CD23_2_000002287B4E2CD2
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B50FCE43_2_000002287B50FCE4
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B50FCC93_2_000002287B50FCC9
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B50FCD23_2_000002287B50FCD2
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FEBA03_2_000002287B4FEBA0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E5B3E3_2_000002287B4E5B3E
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F9B503_2_000002287B4F9B50
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B515B603_2_000002287B515B60
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E8C053_2_000002287B4E8C05
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B504BF03_2_000002287B504BF0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E6B003_2_000002287B4E6B00
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4ECBAB3_2_000002287B4ECBAB
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E2BD63_2_000002287B4E2BD6
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B501AA03_2_000002287B501AA0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B505AA03_2_000002287B505AA0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4EFAA03_2_000002287B4EFAA0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B533A903_2_000002287B533A90
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E4A983_2_000002287B4E4A98
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E3A323_2_000002287B4E3A32
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E7A333_2_000002287B4E7A33
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F3A303_2_000002287B4F3A30
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E5A503_2_000002287B4E5A50
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E6B003_2_000002287B4E6B00
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B50AAC03_2_000002287B50AAC0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E29713_2_000002287B4E2971
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B51A94C3_2_000002287B51A94C
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4EFA003_2_000002287B4EFA00
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4EE9B03_2_000002287B4EE9B0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5049C03_2_000002287B5049C0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FC9B03_2_000002287B4FC9B0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E10703_2_000002287B4E1070
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B50E0A03_2_000002287B50E0A0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5150303_2_000002287B515030
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E60573_2_000002287B4E6057
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5050503_2_000002287B505050
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F81003_2_000002287B4F8100
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E71133_2_000002287B4E7113
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4EA1103_2_000002287B4EA110
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F61103_2_000002287B4F6110
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FF1203_2_000002287B4FF120
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E20C73_2_000002287B4E20C7
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F70C03_2_000002287B4F70C0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F3F703_2_000002287B4F3F70
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E7F7C3_2_000002287B4E7F7C
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E1F883_2_000002287B4E1F88
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FAFA03_2_000002287B4FAFA0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E5F463_2_000002287B4E5F46
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E6FF73_2_000002287B4E6FF7
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B53D0003_2_000002287B53D000
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B516FEF3_2_000002287B516FEF
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5250203_2_000002287B525020
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FA0203_2_000002287B4FA020
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5020103_2_000002287B502010
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E4FB53_2_000002287B4E4FB5
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B509EA03_2_000002287B509EA0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E7E893_2_000002287B4E7E89
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B51DE903_2_000002287B51DE90
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FCE503_2_000002287B4FCE50
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B50BE503_2_000002287B50BE50
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E6EEB3_2_000002287B4E6EEB
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F8F003_2_000002287B4F8F00
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B539F203_2_000002287B539F20
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E3EC73_2_000002287B4E3EC7
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E1D803_2_000002287B4E1D80
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E2D8A3_2_000002287B4E2D8A
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E7DA13_2_000002287B4E7DA1
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E6D443_2_000002287B4E6D44
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B516D2E3_2_000002287B516D2E
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B541D373_2_000002287B541D37
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4EED503_2_000002287B4EED50
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4EEDF03_2_000002287B4EEDF0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B542E003_2_000002287B542E00
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E5E063_2_000002287B4E5E06
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E6E103_2_000002287B4E6E10
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4ECE103_2_000002287B4ECE10
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F9E103_2_000002287B4F9E10
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B504E203_2_000002287B504E20
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4EFE203_2_000002287B4EFE20
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B50ADC03_2_000002287B50ADC0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B518DB43_2_000002287B518DB4
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E34703_2_000002287B4E3470
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B52C4A03_2_000002287B52C4A0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E54E03_2_000002287B4E54E0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5443703_2_000002287B544370
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F83903_2_000002287B4F8390
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5093903_2_000002287B509390
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B50B3603_2_000002287B50B360
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E13F73_2_000002287B4E13F7
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B53B4103_2_000002287B53B410
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E73C03_2_000002287B4E73C0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5423B73_2_000002287B5423B7
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E83E03_2_000002287B4E83E0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F23E03_2_000002287B4F23E0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5053D03_2_000002287B5053D0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E227C3_2_000002287B4E227C
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E12643_2_000002287B4E1264
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4ED2F03_2_000002287B4ED2F0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F92F03_2_000002287B4F92F0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FA2F03_2_000002287B4FA2F0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5113003_2_000002287B511300
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E33003_2_000002287B4E3300
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E62F93_2_000002287B4E62F9
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5073203_2_000002287B507320
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F52B03_2_000002287B4F52B0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E62E63_2_000002287B4E62E6
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F11803_2_000002287B4F1180
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E517C3_2_000002287B4E517C
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E517A3_2_000002287B4E517A
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E219F3_2_000002287B4E219F
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E612D3_2_000002287B4E612D
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F21403_2_000002287B4F2140
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E71603_2_000002287B4E7160
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4E61EC3_2_000002287B4E61EC
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4EA1E03_2_000002287B4EA1E0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5241D03_2_000002287B5241D0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC207E03_2_000002287BC207E0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC1FB403_2_000002287BC1FB40
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC181003_2_000002287BC18100
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC279003_2_000002287BC27900
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC0A1103_2_000002287BC0A110
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC161103_2_000002287BC16110
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC289103_2_000002287BC28910
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC071133_2_000002287BC07113
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC1F1203_2_000002287BC1F120
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC2F9203_2_000002287BC2F920
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC170C03_2_000002287BC170C0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC020C73_2_000002287BC020C7
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC0E8DC3_2_000002287BC0E8DC
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC188E03_2_000002287BC188E0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC010703_2_000002287BC01070
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC1F8703_2_000002287BC1F870
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC2A8803_2_000002287BC2A880
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC2E0A03_2_000002287BC2E0A0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC308A03_2_000002287BC308A0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC350303_2_000002287BC35030
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC178403_2_000002287BC17840
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC368483_2_000002287BC36848
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC250503_2_000002287BC25050
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC258503_2_000002287BC25850
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC060573_2_000002287BC06057
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC36FEF3_2_000002287BC36FEF
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC337F03_2_000002287BC337F0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC06FF73_2_000002287BC06FF7
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC220103_2_000002287BC22010
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC1A0203_2_000002287BC1A020
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC0B8223_2_000002287BC0B822
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC450203_2_000002287BC45020
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC04FB53_2_000002287BC04FB5
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC0176F3_2_000002287BC0176F
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC13F703_2_000002287BC13F70
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC07F7C3_2_000002287BC07F7C
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC01F883_2_000002287BC01F88
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC167903_2_000002287BC16790
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC247903_2_000002287BC24790
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC1AFA03_2_000002287BC1AFA0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC05F463_2_000002287BC05F46
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC06EEB3_2_000002287BC06EEB
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC326F03_2_000002287BC326F0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC18F003_2_000002287BC18F00
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC1B7003_2_000002287BC1B700
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC067043_2_000002287BC06704
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC567003_2_000002287BC56700
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC0271A3_2_000002287BC0271A
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC59F203_2_000002287BC59F20
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC1E6B03_2_000002287BC1E6B0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC03EC73_2_000002287BC03EC7
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC366DB3_2_000002287BC366DB
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC07E893_2_000002287BC07E89
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC3DE903_2_000002287BC3DE90
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC0769C3_2_000002287BC0769C
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC0A6A03_2_000002287BC0A6A0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC29EA03_2_000002287BC29EA0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC016303_2_000002287BC01630
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC1CE503_2_000002287BC1CE50
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC2BE503_2_000002287BC2BE50
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC0EDF03_2_000002287BC0EDF0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC0C5F03_2_000002287BC0C5F0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC05E063_2_000002287BC05E06
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC06E103_2_000002287BC06E10
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC0CE103_2_000002287BC0CE10
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC19E103_2_000002287BC19E10
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC0FE203_2_000002287BC0FE20
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC24E203_2_000002287BC24E20
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC256203_2_000002287BC25620
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC38DB43_2_000002287BC38DB4
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC265C03_2_000002287BC265C0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC2ADC03_2_000002287BC2ADC0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC075D23_2_000002287BC075D2
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC0F5E03_2_000002287BC0F5E0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC0656A3_2_000002287BC0656A
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC145703_2_000002287BC14570
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC225703_2_000002287BC22570
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC01D803_2_000002287BC01D80
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC1D5803_2_000002287BC1D580
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC335803_2_000002287BC33580
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC095883_2_000002287BC09588
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC02D8A3_2_000002287BC02D8A
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC07DA13_2_000002287BC07DA1
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC36D2E3_2_000002287BC36D2E
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC175303_2_000002287BC17530
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC245403_2_000002287BC24540
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC06D443_2_000002287BC06D44
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC0ED503_2_000002287BC0ED50
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC2FCED3_2_000002287BC2FCED
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC25D203_2_000002287BC25D20
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC35D203_2_000002287BC35D20
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC12CB03_2_000002287BC12CB0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC30CB03_2_000002287BC30CB0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC2FCB73_2_000002287BC2FCB7
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC2FCC03_2_000002287BC2FCC0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC2FCC93_2_000002287BC2FCC9
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC2FCD23_2_000002287BC2FCD2
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC02CD23_2_000002287BC02CD2
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC2FCDB3_2_000002287BC2FCDB
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC054E03_2_000002287BC054E0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC2FCE43_2_000002287BC2FCE4
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC034703_2_000002287BC03470
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC0AC803_2_000002287BC0AC80
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC06C983_2_000002287BC06C98
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC03CA63_2_000002287BC03CA6
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC1AC303_2_000002287BC1AC30
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC07C3B3_2_000002287BC07C3B
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC23C503_2_000002287BC23C50
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC24BF03_2_000002287BC24BF0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC013F73_2_000002287BC013F7
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC08C053_2_000002287BC08C05
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC06B003_2_000002287BC06B00
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC0CBAB3_2_000002287BC0CBAB
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC073C03_2_000002287BC073C0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC253D03_2_000002287BC253D0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC02BD63_2_000002287BC02BD6
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC083E03_2_000002287BC083E0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC123E03_2_000002287BC123E0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC183903_2_000002287BC18390
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC293903_2_000002287BC29390
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC1EBA03_2_000002287BC1EBA0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC05B3E3_2_000002287BC05B3E
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC19B503_2_000002287BC19B50
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC2B3603_2_000002287BC2B360
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC35B603_2_000002287BC35B60
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC0D2F03_2_000002287BC0D2F0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC192F03_2_000002287BC192F0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC1A2F03_2_000002287BC1A2F0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC062F93_2_000002287BC062F9
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC033003_2_000002287BC03300
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC06B003_2_000002287BC06B00
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC313003_2_000002287BC31300
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC273203_2_000002287BC27320
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC152B03_2_000002287BC152B0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC2AAC03_2_000002287BC2AAC0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC062E63_2_000002287BC062E6
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC0227C3_2_000002287BC0227C
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC04A983_2_000002287BC04A98
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC0FAA03_2_000002287BC0FAA0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC21AA03_2_000002287BC21AA0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC25AA03_2_000002287BC25AA0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC13A303_2_000002287BC13A30
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC03A323_2_000002287BC03A32
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC07A333_2_000002287BC07A33
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC05A503_2_000002287BC05A50
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC012643_2_000002287BC01264
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC061EC3_2_000002287BC061EC
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC0FA003_2_000002287BC0FA00
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC0E9B03_2_000002287BC0E9B0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC1C9B03_2_000002287BC1C9B0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC249C03_2_000002287BC249C0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC441D03_2_000002287BC441D0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC0A1E03_2_000002287BC0A1E0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC029713_2_000002287BC02971
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC0517A3_2_000002287BC0517A
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC0517C3_2_000002287BC0517C
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC111803_2_000002287BC11180
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC0219F3_2_000002287BC0219F
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC0612D3_2_000002287BC0612D
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC121403_2_000002287BC12140
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC3A94C3_2_000002287BC3A94C
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC071603_2_000002287BC07160
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800152B06_2_00000001800152B0
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800123E06_2_00000001800123E0
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800225706_2_0000000180022570
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800207E06_2_00000001800207E0
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800178406_2_0000000180017840
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018001FB406_2_000000018001FB40
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018001AC306_2_000000018001AC30
Source: C:\Windows\System32\svchost.exeCode function: 6_2_0000000180013F706_2_0000000180013F70
Source: C:\Windows\System32\svchost.exeCode function: 6_2_0000000180036FEF6_2_0000000180036FEF
Source: C:\Windows\System32\svchost.exeCode function: 6_2_0000000180006FF76_2_0000000180006FF7
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018005D0006_2_000000018005D000
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800220106_2_0000000180022010
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800450206_2_0000000180045020
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018001A0206_2_000000018001A020
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800350306_2_0000000180035030
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800250506_2_0000000180025050
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800060576_2_0000000180006057
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800010706_2_0000000180001070
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018002E0A06_2_000000018002E0A0
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800170C06_2_00000001800170C0
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800020C76_2_00000001800020C7
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800181006_2_0000000180018100
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800161106_2_0000000180016110
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018000A1106_2_000000018000A110
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800071136_2_0000000180007113
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018001F1206_2_000000018001F120
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018000612D6_2_000000018000612D
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800121406_2_0000000180012140
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800071606_2_0000000180007160
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018000517A6_2_000000018000517A
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018000517C6_2_000000018000517C
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800111806_2_0000000180011180
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018000219F6_2_000000018000219F
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800441D06_2_00000001800441D0
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018000A1E06_2_000000018000A1E0
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800061EC6_2_00000001800061EC
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800012646_2_0000000180001264
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018000227C6_2_000000018000227C
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800062E66_2_00000001800062E6
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018001A2F06_2_000000018001A2F0
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800192F06_2_00000001800192F0
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018000D2F06_2_000000018000D2F0
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800062F96_2_00000001800062F9
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800313006_2_0000000180031300
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800033006_2_0000000180003300
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800273206_2_0000000180027320
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018002B3606_2_000000018002B360
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800643706_2_0000000180064370
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800293906_2_0000000180029390
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800183906_2_0000000180018390
Source: Joe Sandbox ViewDropped File: C:\Program Files\Windows Mail\HoopCity.exe D312491920F1CF6599998CEDB9F6988F2FA3F81810B9AD1F5BFC265B16E3A234
Source: Joe Sandbox ViewDropped File: C:\Program Files\Windows Mail\HoopCityBase.dll EE71ED13F8E5A47C44AC230C96A13D8C876993763426EF50AE5F4E627C4BB287
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: String function: 0000000180044FD0 appears 61 times
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: String function: 0000000180041890 appears 91 times
Source: C:\Windows\System32\svchost.exeCode function: String function: 0000000180044FD0 appears 61 times
Source: C:\Windows\System32\svchost.exeCode function: String function: 000002287B524FD0 appears 61 times
Source: C:\Windows\System32\svchost.exeCode function: String function: 000002287BC44FD0 appears 31 times
Source: C:\Windows\System32\svchost.exeCode function: String function: 0000000180041890 appears 91 times
Source: C:\Windows\System32\svchost.exeCode function: String function: 000002287B521890 appears 91 times
Source: C:\Windows\System32\dllhost.exeCode function: String function: 0000000180044FD0 appears 61 times
Source: C:\Windows\System32\dllhost.exeCode function: String function: 0000000180041890 appears 91 times
Source: 360safe.exe, 00000000.00000002.1271635037.0000000004EC0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetSign.DLL> vs 360safe.exe
Source: 360safe.exe, 00000000.00000002.1271635037.0000000004EC0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetSign.dll> vs 360safe.exe
Source: 360safe.exe, 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetSign.DLL> vs 360safe.exe
Source: 360safe.exe, 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetSign.dll> vs 360safe.exe
Source: 360safe.exeStatic PE information: Section: .qtmimed ZLIB complexity 0.997458770800317
Source: HoopCity.exe.3.drStatic PE information: Section: .std ZLIB complexity 0.9908854166666666
Source: 360safe.exeBinary or memory string: ndre-land.nonet.slnet.soin-brb.de123website.lutrentino-stirol.it
Source: classification engineClassification label: mal92.evad.winEXE@11/5@1/2
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5007E0 VirtualAlloc,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualAlloc,InitializeCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,3_2_000002287B5007E0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B507900 memset,lstrlenW,lstrlenW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetExtendedUdpTable,VirtualAlloc,GetExtendedUdpTable,VirtualFree,memset,lstrlenW,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,lstrlenA,memset,lstrlenW,VirtualFree,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000002287B507900
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5005E0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualAlloc,GetLastError,memcpy,3_2_000002287B5005E0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B509B00 memset,memset,VirtualFree,VirtualFree,GetModuleHandleW,GetProcAddress,GetProcAddress,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,OpenProcess,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,TerminateProcess,Sleep,DeleteFileW,lstrcpyW,lstrcatW,TerminateProcess,CloseHandle,Sleep,3_2_000002287B509B00
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FFE70 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,OpenProcess,GetLastError,3_2_000002287B4FFE70
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B50CF00 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,memset,OpenProcess,K32EnumProcessModules,K32GetProcessImageFileNameW,lstrcpyW,CloseHandle,3_2_000002287B50CF00
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B509390 __chkstk,memset,memset,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CreateToolhelp32Snapshot,Process32FirstW,OpenProcess,memset,lstrcpyW,GetPriorityClass,memset,memset,OpenProcessToken,GetTokenInformation,GlobalAlloc,GetTokenInformation,LookupAccountSidW,LookupAccountSidW,lstrcpyW,GlobalFree,CloseHandle,ProcessIdToSessionId,K32GetProcessMemoryInfo,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,CreateFileW,GetFileSize,CloseHandle,lstrcpyW,lstrcatW,CloseHandle,Process32NextW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000002287B509390
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B507320 memset,lstrlenW,lstrlenW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetExtendedTcpTable,VirtualAlloc,GetExtendedTcpTable,VirtualFree,memset,lstrlenW,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,memset,lstrlenW,VirtualFree,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000002287B507320
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC207E0 VirtualAlloc,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualAlloc,InitializeCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,3_2_000002287BC207E0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC27900 memset,lstrlenW,lstrlenW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetExtendedUdpTable,VirtualAlloc,GetExtendedUdpTable,VirtualFree,memset,lstrlenW,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,lstrlenA,memset,lstrlenW,VirtualFree,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000002287BC27900
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC2CF00 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,memset,OpenProcess,K32EnumProcessModules,K32GetProcessImageFileNameW,lstrcpyW,CloseHandle,3_2_000002287BC2CF00
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC1FE70 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,OpenProcess,GetLastError,3_2_000002287BC1FE70
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC205E0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualAlloc,GetLastError,memcpy,3_2_000002287BC205E0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC29390 __chkstk,memset,memset,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CreateToolhelp32Snapshot,Process32FirstW,OpenProcess,memset,lstrcpyW,GetPriorityClass,memset,memset,OpenProcessToken,GetTokenInformation,GlobalAlloc,GetTokenInformation,LookupAccountSidW,LookupAccountSidW,lstrcpyW,GlobalFree,CloseHandle,ProcessIdToSessionId,K32GetProcessMemoryInfo,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,CreateFileW,GetFileSize,CloseHandle,lstrcpyW,lstrcatW,CloseHandle,Process32NextW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000002287BC29390
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC29B00 memset,memset,VirtualFree,VirtualFree,GetModuleHandleW,GetProcAddress,GetProcAddress,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,OpenProcess,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,TerminateProcess,Sleep,DeleteFileW,lstrcpyW,lstrcatW,TerminateProcess,CloseHandle,Sleep,3_2_000002287BC29B00
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC27320 memset,lstrlenW,lstrlenW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetExtendedTcpTable,VirtualAlloc,GetExtendedTcpTable,VirtualFree,memset,lstrlenW,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,memset,lstrlenW,VirtualFree,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000002287BC27320
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800207E0 VirtualAlloc,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualAlloc,InitializeCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,6_2_00000001800207E0
Source: C:\Windows\System32\svchost.exeCode function: 6_2_0000000180027320 memset,lstrlenW,lstrlenW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetExtendedTcpTable,VirtualAlloc,GetExtendedTcpTable,VirtualFree,memset,lstrlenW,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,memset,lstrlenW,VirtualFree,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,6_2_0000000180027320
Source: C:\Windows\System32\svchost.exeCode function: 6_2_0000000180029390 __chkstk,memset,memset,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CreateToolhelp32Snapshot,Process32FirstW,OpenProcess,memset,lstrcpyW,GetPriorityClass,memset,memset,OpenProcessToken,GetTokenInformation,GlobalAlloc,GetTokenInformation,LookupAccountSidW,LookupAccountSidW,lstrcpyW,GlobalFree,CloseHandle,ProcessIdToSessionId,K32GetProcessMemoryInfo,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,CreateFileW,GetFileSize,CloseHandle,lstrcpyW,lstrcatW,CloseHandle,Process32NextW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,6_2_0000000180029390
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800205E0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualAlloc,GetLastError,memcpy,6_2_00000001800205E0
Source: C:\Windows\System32\svchost.exeCode function: 6_2_0000000180027900 memset,lstrlenW,lstrlenW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetExtendedUdpTable,VirtualAlloc,GetExtendedUdpTable,VirtualFree,memset,lstrlenW,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,lstrlenA,memset,lstrlenW,VirtualFree,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,6_2_0000000180027900
Source: C:\Windows\System32\svchost.exeCode function: 6_2_0000000180029B00 memset,memset,VirtualFree,VirtualFree,GetModuleHandleW,GetProcAddress,GetProcAddress,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,OpenProcess,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,TerminateProcess,Sleep,DeleteFileW,lstrcpyW,lstrcatW,TerminateProcess,CloseHandle,Sleep,6_2_0000000180029B00
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018001FE70 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,OpenProcess,GetLastError,6_2_000000018001FE70
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018002CF00 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,memset,OpenProcess,K32EnumProcessModules,K32GetProcessImageFileNameW,lstrcpyW,CloseHandle,6_2_000000018002CF00
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_00000001800207E0 VirtualAlloc,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualAlloc,InitializeCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,10_2_00000001800207E0
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_000000018001FE70 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,OpenProcess,GetLastError,10_2_000000018001FE70
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_0000000180027320 memset,lstrlenW,lstrlenW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetExtendedTcpTable,VirtualAlloc,GetExtendedTcpTable,VirtualFree,memset,lstrlenW,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,memset,lstrlenW,VirtualFree,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,10_2_0000000180027320
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_0000000180029390 __chkstk,memset,memset,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CreateToolhelp32Snapshot,Process32FirstW,OpenProcess,memset,lstrcpyW,GetPriorityClass,memset,memset,OpenProcessToken,GetTokenInformation,GlobalAlloc,GetTokenInformation,LookupAccountSidW,LookupAccountSidW,lstrcpyW,GlobalFree,CloseHandle,ProcessIdToSessionId,K32GetProcessMemoryInfo,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,CreateFileW,GetFileSize,CloseHandle,lstrcpyW,lstrcatW,CloseHandle,Process32NextW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,10_2_0000000180029390
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_00000001800205E0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualAlloc,GetLastError,memcpy,10_2_00000001800205E0
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_0000000180027900 memset,lstrlenW,lstrlenW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetExtendedUdpTable,VirtualAlloc,GetExtendedUdpTable,VirtualFree,memset,lstrlenW,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,lstrlenA,memset,lstrlenW,VirtualFree,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,10_2_0000000180027900
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_0000000180029B00 memset,memset,VirtualFree,VirtualFree,GetModuleHandleW,GetProcAddress,GetProcAddress,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,OpenProcess,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,TerminateProcess,Sleep,DeleteFileW,lstrcpyW,lstrcatW,TerminateProcess,CloseHandle,Sleep,10_2_0000000180029B00
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_000000018002CF00 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,memset,OpenProcess,K32EnumProcessModules,K32GetProcessImageFileNameW,lstrcpyW,CloseHandle,10_2_000000018002CF00
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_0000000180027320 memset,lstrlenW,lstrlenW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetExtendedTcpTable,VirtualAlloc,GetExtendedTcpTable,VirtualFree,memset,lstrlenW,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,memset,lstrlenW,VirtualFree,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,11_2_0000000180027320
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_0000000180029390 __chkstk,memset,memset,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CreateToolhelp32Snapshot,Process32FirstW,OpenProcess,memset,lstrcpyW,GetPriorityClass,memset,memset,OpenProcessToken,GetTokenInformation,GlobalAlloc,GetTokenInformation,LookupAccountSidW,LookupAccountSidW,lstrcpyW,GlobalFree,CloseHandle,ProcessIdToSessionId,K32GetProcessMemoryInfo,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,CreateFileW,GetFileSize,CloseHandle,lstrcpyW,lstrcatW,CloseHandle,Process32NextW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,11_2_0000000180029390
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_00000001800205E0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualAlloc,GetLastError,memcpy,11_2_00000001800205E0
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_00000001800207E0 VirtualAlloc,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualAlloc,InitializeCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,11_2_00000001800207E0
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_0000000180027900 memset,lstrlenW,lstrlenW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetExtendedUdpTable,VirtualAlloc,GetExtendedUdpTable,VirtualFree,memset,lstrlenW,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,lstrlenA,memset,lstrlenW,VirtualFree,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,11_2_0000000180027900
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_0000000180029B00 memset,memset,VirtualFree,VirtualFree,GetModuleHandleW,GetProcAddress,GetProcAddress,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,OpenProcess,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,TerminateProcess,Sleep,DeleteFileW,lstrcpyW,lstrcatW,TerminateProcess,CloseHandle,Sleep,11_2_0000000180029B00
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_000000018001FE70 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,OpenProcess,GetLastError,11_2_000000018001FE70
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_000000018002CF00 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,memset,OpenProcess,K32EnumProcessModules,K32GetProcessImageFileNameW,lstrcpyW,CloseHandle,11_2_000000018002CF00
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FC640 memset,memset,memset,QueryDosDeviceW,GetDriveTypeW,lstrlenW,GetVolumeInformationW,lstrlenW,GetDiskFreeSpaceExW,3_2_000002287B4FC640
Source: C:\Windows\System32\svchost.exeCode function: memset,lstrcatW,memset,GetWindowsDirectoryW,GetLastError,lstrcatW,OpenSCManagerW,GetLastError,CreateServiceW,GetLastError,CloseServiceHandle,GetLastError,StartServiceW,CloseServiceHandle,CloseServiceHandle,3_2_000002287B506450
Source: C:\Windows\System32\svchost.exeCode function: memset,lstrcatW,memset,GetWindowsDirectoryW,GetLastError,lstrcatW,OpenSCManagerW,GetLastError,CreateServiceW,GetLastError,CloseServiceHandle,GetLastError,StartServiceW,CloseServiceHandle,CloseServiceHandle,3_2_000002287BC26450
Source: C:\Windows\System32\svchost.exeCode function: memset,lstrcatW,memset,GetWindowsDirectoryW,GetLastError,lstrcatW,OpenSCManagerW,GetLastError,CreateServiceW,GetLastError,CloseServiceHandle,GetLastError,StartServiceW,CloseServiceHandle,CloseServiceHandle,6_2_0000000180026450
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: memset,lstrcatW,memset,GetWindowsDirectoryW,GetLastError,lstrcatW,OpenSCManagerW,GetLastError,CreateServiceW,GetLastError,CloseServiceHandle,GetLastError,StartServiceW,CloseServiceHandle,CloseServiceHandle,10_2_0000000180026450
Source: C:\Windows\System32\dllhost.exeCode function: memset,lstrcatW,memset,GetWindowsDirectoryW,GetLastError,lstrcatW,OpenSCManagerW,GetLastError,CreateServiceW,GetLastError,CloseServiceHandle,GetLastError,StartServiceW,CloseServiceHandle,CloseServiceHandle,11_2_0000000180026450
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B50CAF0 CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,CloseHandle,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,3_2_000002287B50CAF0
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_0000000180001A10 CoInitialize,CLSIDFromString,IIDFromString,CoCreateInstance,0_2_0000000180001A10
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B50D0F0 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,StartServiceW,GetLastError,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,3_2_000002287B50D0F0
Source: C:\Windows\System32\svchost.exeFile created: C:\Program Files\Windows Mail\HoopCity.exeJump to behavior
Source: 360safe.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\360safe.exeSystem information queried: HandleInformationJump to behavior
Source: C:\Users\user\Desktop\360safe.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: svchost.exeString found in binary or memory: \\.\{F8284233-48F4-4680-ADDD-F8284233}
Source: svchost.exeString found in binary or memory: /Processid:{F8284233-48F4-4680-ADDD-F8284233}
Source: svchost.exeString found in binary or memory: /Processid:{F8284233-48F4-4680-ADDD-F8284233}
Source: svchost.exeString found in binary or memory: \\.\{F8284233-48F4-4680-ADDD-F8284233}
Source: HoopCity.exeString found in binary or memory: /Processid:{F8284233-48F4-4680-ADDD-F8284233}
Source: HoopCity.exeString found in binary or memory: \\.\{F8284233-48F4-4680-ADDD-F8284233}
Source: dllhost.exeString found in binary or memory: /Processid:{F8284233-48F4-4680-ADDD-F8284233}
Source: dllhost.exeString found in binary or memory: \\.\{F8284233-48F4-4680-ADDD-F8284233}
Source: 360safe.exeString found in binary or memory: LDD/ADDIEDDDDDDDDDDDDDDDDDDlmmD
Source: 360safe.exeString found in binary or memory: <!--StartFragment-->
Source: 360safe.exeString found in binary or memory: <!--StartFragment--><!--EndFragment-->
Source: 360safe.exeString found in binary or memory: process-stop
Source: 360safe.exeString found in binary or memory: media-playback-start
Source: 360safe.exeString found in binary or memory: media-playback-stop
Source: 360safe.exeString found in binary or memory: :/qt-project.org/styles/commonstyle/images/standardbutton-help-16.png
Source: 360safe.exeString found in binary or memory: :/qt-project.org/styles/commonstyle/images/stop-24.png
Source: 360safe.exeString found in binary or memory: :/qt-project.org/styles/commonstyle/images/stop-24.png
Source: 360safe.exeString found in binary or memory: :/qt-project.org/styles/commonstyle/images/media-stop-32.png
Source: 360safe.exeString found in binary or memory: :/qt-project.org/styles/commonstyle/images/standardbutton-help-32.png
Source: 360safe.exeString found in binary or memory: :/qt-project.org/styles/commonstyle/images/standardbutton-help-128.png
Source: 360safe.exeString found in binary or memory: :/qt-project.org/styles/commonstyle/images/stop-32.png
Source: 360safe.exeString found in binary or memory: :/qt-project.org/styles/commonstyle/images/stop-32.png
Source: 360safe.exeString found in binary or memory: :/qt-project.org/styles/commonstyle/images/media-stop-16.png
Source: 360safe.exeString found in binary or memory: dialog-help-icon
Source: 360safe.exeString found in binary or memory: filedialog-start-icon
Source: 360safe.exeString found in binary or memory: sys-menuitemicontextindicatorcornerclose-buttonactivate-on-singleclickalignmentarrow-keys-navigate-into-childrenbackward-iconbutton-layoutcd-iconcombobox-list-mousetrackingcombobox-popupcomputer-icondesktop-icondialog-apply-icondialog-cancel-icondialog-close-icondialog-discard-icondialog-help-icondialog-no-icondialog-ok-icondialog-open-icondialog-reset-icondialog-save-icondialog-yes-icondialogbuttonbox-buttons-have-iconsdirectory-closed-icondirectory-icondirectory-link-icondirectory-open-icondither-disable-textdockwidget-close-icondownarrow-icondvd-iconetch-disabled-textfile-iconfile-link-iconfiledialog-backward-iconfiledialog-contentsview-iconfiledialog-detailedview-iconfiledialog-end-iconfiledialog-infoview-iconfiledialog-listview-iconfiledialog-new-directory-iconfiledialog-parent-directory-iconfiledialog-start-iconfloppy-iconforward-icongridline-colorharddisk-iconhome-iconicon-sizeleftarrow-iconlineedit-password-characterlineedit-password-mask-delaymdi-fill-space-on-maximizemenu-scrollablemenubar-altkey-navigationmenubar-separatormessagebox-critical-iconmessagebox-information-iconmessagebox-question-iconmessagebox-text-interaction-flagsmessagebox-warning-iconmouse-trackingnetwork-iconopacitypaint-alternating-row-colors-for-empty-arearightarrow-iconscrollbar-contextmenuscrollbar-leftclick-absolute-positionscrollbar-middleclick-absolute-positionscrollbar-roll-between-buttonsscrollbar-scroll-when-pointer-leaves-controlscrollview-frame-around-contentsshow-decoration-selectedspinbox-click-autorepeat-ratespincontrol-disable-on-boundstabbar-elide-modetabbar-prefer-no-arrowstitlebar-close-icontitlebar-contexthelp-icontitlebar-maximize-icontitlebar-menu-icontitlebar-minimize-icontitlebar-normal-icontitlebar-shade-icontitlebar-show-tooltips-on-buttonstitlebar-unshade-icontoolbutton-popup-delaytrash-iconuparrow-iconwidget-animation-duration
Source: 360safe.exeString found in binary or memory: sys-menuitemicontextindicatorcornerclose-buttonactivate-on-singleclickalignmentarrow-keys-navigate-into-childrenbackward-iconbutton-layoutcd-iconcombobox-list-mousetrackingcombobox-popupcomputer-icondesktop-icondialog-apply-icondialog-cancel-icondialog-close-icondialog-discard-icondialog-help-icondialog-no-icondialog-ok-icondialog-open-icondialog-reset-icondialog-save-icondialog-yes-icondialogbuttonbox-buttons-have-iconsdirectory-closed-icondirectory-icondirectory-link-icondirectory-open-icondither-disable-textdockwidget-close-icondownarrow-icondvd-iconetch-disabled-textfile-iconfile-link-iconfiledialog-backward-iconfiledialog-contentsview-iconfiledialog-detailedview-iconfiledialog-end-iconfiledialog-infoview-iconfiledialog-listview-iconfiledialog-new-directory-iconfiledialog-parent-directory-iconfiledialog-start-iconfloppy-iconforward-icongridline-colorharddisk-iconhome-iconicon-sizeleftarrow-iconlineedit-password-characterlineedit-password-mask-delaymdi-fill-space-on-maximizemenu-scrollablemenubar-altkey-navigationmenubar-separatormessagebox-critical-iconmessagebox-information-iconmessagebox-question-iconmessagebox-text-interaction-flagsmessagebox-warning-iconmouse-trackingnetwork-iconopacitypaint-alternating-row-colors-for-empty-arearightarrow-iconscrollbar-contextmenuscrollbar-leftclick-absolute-positionscrollbar-middleclick-absolute-positionscrollbar-roll-between-buttonsscrollbar-scroll-when-pointer-leaves-controlscrollview-frame-around-contentsshow-decoration-selectedspinbox-click-autorepeat-ratespincontrol-disable-on-boundstabbar-elide-modetabbar-prefer-no-arrowstitlebar-close-icontitlebar-contexthelp-icontitlebar-maximize-icontitlebar-menu-icontitlebar-minimize-icontitlebar-normal-icontitlebar-shade-icontitlebar-show-tooltips-on-buttonstitlebar-unshade-icontoolbutton-popup-delaytrash-iconuparrow-iconwidget-animation-duration
Source: 360safe.exeString found in binary or memory: QToolTipclassstyle1styleDestroyed(QObject*)Could not parse application stylesheetstyleSheet* {Could not parse stylesheet of object_q_stylesheet_minw_q_stylesheet_minh_q_stylesheet_maxw_q_stylesheet_maxh does not have a property named cannot design property named _q_styleSheetWidgetFont1objectDestroyed(QObject*)mNX_q_styleSheetRealCloseButtonicon-sizetitlebar-menu-icontitlebar-minimize-icontitlebar-maximize-icontitlebar-close-icontitlebar-normal-icontitlebar-shade-icontitlebar-unshade-icontitlebar-contexthelp-icondockwidget-close-iconmessagebox-information-iconmessagebox-warning-iconmessagebox-critical-iconmessagebox-question-icondesktop-icontrash-iconcomputer-iconfloppy-iconharddisk-iconcd-icondvd-iconnetwork-icondirectory-open-icondirectory-closed-icondirectory-link-iconfile-iconfile-link-iconfiledialog-start-iconfiledialog-end-iconfiledialog-parent-directory-iconfiledialog-new-directory-iconfiledialog-detailedview-iconfiledialog-infoview-iconfiledialog-contentsview-iconfiledialog-listview-iconfiledialog-backward-icondirectory-icondialog-ok-icondialog-cancel-icondialog-help-icondialog-open-icondialog-save-icondialog-close-icondialog-apply-icondialog-reset-icondialog-discard-icondialog-yes-icondialog-no-iconuparrow-icondownarrow-iconleftarrow-iconrightarrow-iconbackward-iconforward-iconhome-iconlineedit-password-characterlineedit-password-mask-delaydither-disabled-textetch-disabled-textactivate-on-singleclickshow-decoration-selectedgridline-coloropacitycombobox-popupcombobox-list-mousetrackingmenubar-altkey-navigationmenu-scrollablemenubar-separatormouse-trackingspinbox-click-autorepeat-ratespincontrol-disable-on-boundsmessagebox-text-interaction-flagstoolbutton-popup-delayscrollview-frame-around-contentsscrollbar-contextmenuscrollbar-leftclick-absolute-positionscrollbar-middleclick-absolute-positionscrollbar-roll-between-buttonsscrollbar-scroll-when-pointer-leaves-controltabbar-elide-modetabbar-prefer-no-arrowsdialogbuttonbox-buttons-have-iconsmdi-fill-space-on-maximizearrow-keys-navigate-into-childrenpaint-alternating-row-colors-for-empty-areatitlebar-show-tooltips-on-buttonswidget-animation-durationqt_fontDialog_sampleEditqt_
Source: 360safe.exeString found in binary or memory: QToolTipclassstyle1styleDestroyed(QObject*)Could not parse application stylesheetstyleSheet* {Could not parse stylesheet of object_q_stylesheet_minw_q_stylesheet_minh_q_stylesheet_maxw_q_stylesheet_maxh does not have a property named cannot design property named _q_styleSheetWidgetFont1objectDestroyed(QObject*)mNX_q_styleSheetRealCloseButtonicon-sizetitlebar-menu-icontitlebar-minimize-icontitlebar-maximize-icontitlebar-close-icontitlebar-normal-icontitlebar-shade-icontitlebar-unshade-icontitlebar-contexthelp-icondockwidget-close-iconmessagebox-information-iconmessagebox-warning-iconmessagebox-critical-iconmessagebox-question-icondesktop-icontrash-iconcomputer-iconfloppy-iconharddisk-iconcd-icondvd-iconnetwork-icondirectory-open-icondirectory-closed-icondirectory-link-iconfile-iconfile-link-iconfiledialog-start-iconfiledialog-end-iconfiledialog-parent-directory-iconfiledialog-new-directory-iconfiledialog-detailedview-iconfiledialog-infoview-iconfiledialog-contentsview-iconfiledialog-listview-iconfiledialog-backward-icondirectory-icondialog-ok-icondialog-cancel-icondialog-help-icondialog-open-icondialog-save-icondialog-close-icondialog-apply-icondialog-reset-icondialog-discard-icondialog-yes-icondialog-no-iconuparrow-icondownarrow-iconleftarrow-iconrightarrow-iconbackward-iconforward-iconhome-iconlineedit-password-characterlineedit-password-mask-delaydither-disabled-textetch-disabled-textactivate-on-singleclickshow-decoration-selectedgridline-coloropacitycombobox-popupcombobox-list-mousetrackingmenubar-altkey-navigationmenu-scrollablemenubar-separatormouse-trackingspinbox-click-autorepeat-ratespincontrol-disable-on-boundsmessagebox-text-interaction-flagstoolbutton-popup-delayscrollview-frame-around-contentsscrollbar-contextmenuscrollbar-leftclick-absolute-positionscrollbar-middleclick-absolute-positionscrollbar-roll-between-buttonsscrollbar-scroll-when-pointer-leaves-controltabbar-elide-modetabbar-prefer-no-arrowsdialogbuttonbox-buttons-have-iconsmdi-fill-space-on-maximizearrow-keys-navigate-into-childrenpaint-alternating-row-colors-for-empty-areatitlebar-show-tooltips-on-buttonswidget-animation-durationqt_fontDialog_sampleEditqt_
Source: 360safe.exeString found in binary or memory: media-stop-16.png
Source: 360safe.exeString found in binary or memory: media-stop-32.png
Source: 360safe.exeString found in binary or memory: standardbutton-help-128.png
Source: 360safe.exeString found in binary or memory: Gstandardbutton-help-16.png
Source: 360safe.exeString found in binary or memory: Gstandardbutton-help-32.png
Source: 360safe.exeString found in binary or memory: tab-stops
Source: 360safe.exeString found in binary or memory: tab-stop
Source: 360safe.exeString found in binary or memory: mimetypeurn:oasis:names:tc:opendocument:xmlns:manifest:1.0manifest1.2/text/xmlcontent.xmlMETA-INF/manifest.xmlfile-entrymedia-typefull-pathTable%1style-nametable-columnTable%1.%2number-columns-repeatedtable-rowtable-cellnumber-columns-spannednumber-rows-spannedTB%1.%2T%1list-itemlistL%1pp%1spanc%1tabline-breakautomatic-stylesparagraphfamilyparagraph-propertiesline-heightline-height-at-leastline-spacingQTextOdfWriter: unsupported paragraph alignment; margin-topmargin-bottommargin-leftmargin-righttext-indentbreak-beforebreak-afterkeep-togethertab-stopstab-stoptext-propertiesSanstext-transformuppercaselowercasecapitalizesmall-capsfont-variantletter-spacingword-spacingsingletext-line-through-typetext-underline-colordashdash-dotwave0%-100%text-outlinelist-level-style-numbernum-formatnum-suffixnum-prefixlist-level-style-bulletbullet-charlevellist-level-properties%1mmspace-befores%1section-propertiestable-propertiescollapsingborder-modeltable-column-propertiescolumn-widthQTextOdfWriter::writeTableCellFormat: ERROR writing table border formattable-cell-propertiespaddingpadding-toppadding-bottompadding-leftpadding-rightautomaticurn:oasis:names:tc:opendocument:xmlns:office:1.0urn:oasis:names:tc:opendocument:xmlns:text:1.0urn:oasis:names:tc:opendocument:xmlns:style:1.0urn:oasis:names:tc:opendocument:xmlns:xsl-fo-compatible:1.0urn:oasis:names:tc:opendocument:xmlns:table:1.0urn:oasis:names:tc:opendocument:xmlns:drawing:1.0http://www.w3.org/1999/xlinkurn:oasis:names:tc:opendocument:xmlns:svg-compatible:1.0QTextOdfWriter::writeAll: the device cannot be opened for writingofficefodrawxlinkdocument-contentbody
Source: 360safe.exeString found in binary or memory: Africa/Addis_Ababa
Source: 360safe.exeString found in binary or memory: in-addr.arpa
Source: 360safe.exeString found in binary or memory: y.noin-addr.arpacc.ct.usyamato.fukushima.jpdp.uaslg.brullensvang.noweb.nfclerk.appweb.niwww.robarsy.pubassn.lkradoy.noauthgearapps.comleitungsen.defukaya.saitama.jphk.comhole.nofrom-sd.comtsuno.kochi.jpcantho.vnnamaste.jptrafficplex.cloudilovecollege.infotrader.aerofetsund.noinatsuki.fukuoka.jpms.leg.brhadano.kanagawa.jphikawa.shimane.jpac.gov.brwatari.miyagi.jpdrud.iofvg.itambulance.aerotrentino-aadige.itnoto.ishikawa.jp*.spectrum.myjino.rune.jpweb.pkus-west-2.elasticbeanstalk.comsevenlaw.zane.keisesaki.gunma.jpholy.jpjeonnam.krchirurgiens-dentistes-en-france.frk12.in.usbozen-s
Source: 360safe.exeString found in binary or memory: overflow:hidden;img src="http://addEventListenerresponsible for s.js"></script>
Source: 360safe.exeString found in binary or memory: id-cmc-addExtensions
Source: 360safe.exeString found in binary or memory: set-addPolicy
Source: unknownProcess created: C:\Users\user\Desktop\360safe.exe "C:\Users\user\Desktop\360safe.exe"
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs
Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Mail\HoopCity.exe "C:\Program Files\Windows Mail\HoopCity.exe"
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcsJump to behavior
Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Mail\HoopCity.exe "C:\Program Files\Windows Mail\HoopCity.exe"Jump to behavior
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcsJump to behavior
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}Jump to behavior
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}Jump to behavior
Source: C:\Users\user\Desktop\360safe.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\360safe.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\360safe.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\360safe.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\360safe.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\360safe.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\360safe.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\360safe.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\360safe.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\Desktop\360safe.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Desktop\360safe.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\360safe.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\360safe.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\360safe.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\360safe.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\360safe.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\360safe.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\360safe.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\360safe.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\360safe.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\Desktop\360safe.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\360safe.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\360safe.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\360safe.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\360safe.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwpolicyiomgr.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwpolicyiomgr.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: devenum.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msdmo.dllJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeSection loaded: hoopcitybase.dllJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeSection loaded: winmm.dllJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeSection loaded: samcli.dllJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeSection loaded: netutils.dllJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeSection loaded: userenv.dllJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: fwpolicyiomgr.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwpolicyiomgr.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: devenum.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msdmo.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: fwpolicyiomgr.dllJump to behavior
Source: C:\Windows\System32\svchost.exeDirectory created: C:\Program Files\Windows Mail\HoopCity.exeJump to behavior
Source: C:\Windows\System32\svchost.exeDirectory created: C:\Program Files\Windows Mail\HoopCityBase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeDirectory created: C:\Program Files\Windows Mail\mimidump.infJump to behavior
Source: 360safe.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: 360safe.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: 360safe.exeStatic file information: File size 26331648 > 1048576
Source: 360safe.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0xe9d400
Source: 360safe.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x919400
Source: 360safe.exeStatic PE information: More than 200 imports for KERNEL32.dll
Source: 360safe.exeStatic PE information: More than 200 imports for USER32.dll
Source: 360safe.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\buildslave\unity\build\artifacts\WindowsPlayer\Win64_VS2019_nondev_i_r\WindowsPlayer_player_Master_il2cpp_x64.pdb source: 360safe.exe, 00000000.00000002.1271635037.0000000004EC0000.00000004.00001000.00020000.00000000.sdmp, 360safe.exe, 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2495015925.000002287B370000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2485887283.0000000180013000.00000002.00000001.00020000.00000000.sdmp, HoopCity.exe, HoopCity.exe, 0000000A.00000002.1279364875.000000014000C000.00000002.00000001.01000000.00000008.sdmp, HoopCity.exe.3.dr
Source: Binary string: C:\Users\Administrator\Desktop\QtWidgetsApplication1\x64\Release\QtWidgetsApplication1.pdb source: 360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: C:\Users\Administrator\Desktop\QtWidgetsApplication1\x64\Release\QtWidgetsApplication1.pdb$ source: 360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmp
Source: Binary string: QtWidgetsApplication1.pdb source: 360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmp
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B504110 VirtualAlloc,LoadLibraryW,GetProcAddress,FreeLibrary,3_2_000002287B504110
Source: initial sampleStatic PE information: section where entry point is pointing to: .std
Source: 360safe.exeStatic PE information: section name: .qtmetad
Source: 360safe.exeStatic PE information: section name: .qtmimed
Source: 360safe.exeStatic PE information: section name: _RDATA
Source: HoopCity.exe.3.drStatic PE information: section name: .std
Source: HoopCity.exe.3.drStatic PE information: section name: .std
Source: HoopCity.exe.3.drStatic PE information: section name: .std
Source: HoopCity.exe.3.drStatic PE information: section name: .std
Source: HoopCity.exe.3.drStatic PE information: section name: .std
Source: HoopCity.exe.3.drStatic PE information: section name: .std
Source: HoopCity.exe.3.drStatic PE information: section name: .std
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_0000000180166538 push rsp; retf 0_2_0000000180166539
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B541A87 push FF491775h; ret 3_2_000002287B541A8C
Source: C:\Windows\System32\svchost.exeCode function: 6_2_0000000180061A87 push FF491775h; ret 6_2_0000000180061A8C
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_000000014001221D push rcx; retf 003Fh10_2_000000014001221E
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_000000014000C5C0 push rax; retf 10_2_000000014000C5C1
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_000000014000C5C8 push rsp; retf 10_2_000000014000C5D1
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_0000000180061A87 push FF491775h; ret 10_2_0000000180061A8C
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_0000000180061A87 push FF491775h; ret 11_2_0000000180061A8C
Source: HoopCity.exe.3.drStatic PE information: section name: .std entropy: 7.975145846946156
Source: HoopCity.exe.3.drStatic PE information: section name: .std entropy: 7.88585773635149
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B50318E VirtualFree,VirtualFree,malloc,malloc,VirtualFree,VirtualFree,NetUserAdd,Sleep,NetLocalGroupAddMembers,free,free,3_2_000002287B50318E
Source: C:\Windows\System32\svchost.exeFile created: C:\Program Files\Windows Mail\HoopCity.exeJump to dropped file
Source: C:\Windows\System32\svchost.exeFile created: C:\Program Files\Windows Mail\HoopCityBase.dllJump to dropped file
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\Microsoft\Windows\MicrosoftEdgeUpdateJump to behavior
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B50D0F0 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,StartServiceW,GetLastError,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,3_2_000002287B50D0F0

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\System32\svchost.exeFile deleted: c:\users\user\desktop\360safe.exeJump to behavior
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FC120 OpenEventLogW,ClearEventLogW,CloseEventLog,OpenEventLogW,ClearEventLogW,CloseEventLog,OpenEventLogW,ClearEventLogW,CloseEventLog,OpenEventLogW,ClearEventLogW,CloseEventLog,3_2_000002287B4FC120
Source: C:\Users\user\Desktop\360safe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\360safe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\360safe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\360safe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\360safe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\360safe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\svchost.exeCheck user administrative privileges: IsUserAndAdmin, DecisionNodegraph_3-51713
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F70C0 GetCurrentProcessId,ProcessIdToSessionId,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,CloseHandle,WTSGetActiveConsoleSessionId,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,CreateThread,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000002287B4F70C0
Source: C:\Users\user\Desktop\360safe.exeCode function: malloc,RtlCopyMemory,malloc,memset,RtlCopyMemory,memset,GetModuleFileNameW,malloc,memset,RtlCopyMemory,OpenSCManagerW,EnumServicesStatusExW,malloc,memset,EnumServicesStatusExW,CloseServiceHandle,free,CloseServiceHandle,lstrcmpiW,free,0_2_00000001800015B0
Source: C:\Windows\System32\svchost.exeCode function: malloc,memcpy,malloc,memset,memcpy,memset,GetModuleFileNameW,malloc,memset,memcpy,OpenSCManagerW,EnumServicesStatusExW,malloc,memset,EnumServicesStatusExW,CloseServiceHandle,free,CloseServiceHandle,lstrcmpiW,free,3_2_00000001800015B0
Source: C:\Windows\System32\svchost.exeCode function: OpenSCManagerW,EnumServicesStatusExW,malloc,memset,EnumServicesStatusExW,CloseServiceHandle,free,CloseServiceHandle,lstrcmpiW,free,3_2_000002287B50D1D0
Source: C:\Windows\System32\svchost.exeCode function: OpenSCManagerW,EnumServicesStatusW,LocalAlloc,EnumServicesStatusW,memset,OpenServiceW,lstrlenW,memcpy,lstrlenW,memcpy,VirtualAlloc,QueryServiceConfig2W,lstrlenW,memcpy,lstrcpyW,VirtualAlloc,QueryServiceConfigW,lstrcpyW,lstrlenW,memcpy,lstrlenW,memcpy,lstrlenW,memcpy,CloseServiceHandle,VirtualFree,VirtualFree,CloseServiceHandle,LocalFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000002287B50F920
Source: C:\Windows\System32\svchost.exeCode function: OpenSCManagerW,EnumServicesStatusExW,malloc,memset,EnumServicesStatusExW,CloseServiceHandle,free,CloseServiceHandle,lstrcmpiW,free,3_2_000002287BC2D1D0
Source: C:\Windows\System32\svchost.exeCode function: OpenSCManagerW,EnumServicesStatusW,LocalAlloc,EnumServicesStatusW,memset,OpenServiceW,lstrlenW,memcpy,lstrlenW,memcpy,VirtualAlloc,QueryServiceConfig2W,lstrlenW,memcpy,lstrcpyW,VirtualAlloc,QueryServiceConfigW,lstrcpyW,lstrlenW,memcpy,lstrlenW,memcpy,lstrlenW,memcpy,CloseServiceHandle,VirtualFree,VirtualFree,CloseServiceHandle,LocalFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000002287BC2F920
Source: C:\Windows\System32\svchost.exeCode function: OpenSCManagerW,EnumServicesStatusExW,malloc,memset,EnumServicesStatusExW,CloseServiceHandle,free,CloseServiceHandle,lstrcmpiW,free,6_2_000000018002D1D0
Source: C:\Windows\System32\svchost.exeCode function: OpenSCManagerW,EnumServicesStatusW,LocalAlloc,EnumServicesStatusW,memset,OpenServiceW,lstrlenW,memcpy,lstrlenW,memcpy,VirtualAlloc,QueryServiceConfig2W,lstrlenW,memcpy,lstrcpyW,VirtualAlloc,QueryServiceConfigW,lstrcpyW,lstrlenW,memcpy,lstrlenW,memcpy,lstrlenW,memcpy,CloseServiceHandle,VirtualFree,VirtualFree,CloseServiceHandle,LocalFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,6_2_000000018002F920
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: OpenSCManagerW,EnumServicesStatusExW,malloc,memset,EnumServicesStatusExW,CloseServiceHandle,free,CloseServiceHandle,lstrcmpiW,free,10_2_000000018002D1D0
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: OpenSCManagerW,EnumServicesStatusW,LocalAlloc,EnumServicesStatusW,memset,OpenServiceW,lstrlenW,memcpy,lstrlenW,memcpy,VirtualAlloc,QueryServiceConfig2W,lstrlenW,memcpy,lstrcpyW,VirtualAlloc,QueryServiceConfigW,lstrcpyW,lstrlenW,memcpy,lstrlenW,memcpy,lstrlenW,memcpy,CloseServiceHandle,VirtualFree,VirtualFree,CloseServiceHandle,LocalFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,10_2_000000018002F920
Source: C:\Windows\System32\dllhost.exeCode function: OpenSCManagerW,EnumServicesStatusExW,malloc,memset,EnumServicesStatusExW,CloseServiceHandle,free,CloseServiceHandle,lstrcmpiW,free,11_2_000000018002D1D0
Source: C:\Windows\System32\dllhost.exeCode function: OpenSCManagerW,EnumServicesStatusW,LocalAlloc,EnumServicesStatusW,memset,OpenServiceW,lstrlenW,memcpy,lstrlenW,memcpy,VirtualAlloc,QueryServiceConfig2W,lstrlenW,memcpy,lstrcpyW,VirtualAlloc,QueryServiceConfigW,lstrcpyW,lstrlenW,memcpy,lstrlenW,memcpy,lstrlenW,memcpy,CloseServiceHandle,VirtualFree,VirtualFree,CloseServiceHandle,LocalFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,11_2_000000018002F920
Source: C:\Windows\System32\svchost.exeAPI coverage: 2.8 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 7.5 %
Source: C:\Program Files\Windows Mail\HoopCity.exeAPI coverage: 3.4 %
Source: C:\Windows\System32\dllhost.exeAPI coverage: 3.2 %
Source: C:\Windows\System32\svchost.exe TID: 6904Thread sleep count: 34 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FC9B0 memset,lstrcatW,lstrcatW,memset,FindFirstFileW,FindNextFileW,FindNextFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000002287B4FC9B0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FDF30 malloc,memset,FindFirstFileW,free,3_2_000002287B4FDF30
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FCE50 memset,memset,memset,memset,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,memset,memset,wsprintfW,wsprintfW,FindFirstFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,memset,memset,wsprintfW,FindFirstFileW,FindNextFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,memset,memset,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,FindNextFileW,FindNextFileW,lstrlenW,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000002287B4FCE50
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FE370 __chkstk,memset,memset,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,memset,lstrcatW,lstrcatW,lstrcatW,Sleep,lstrlenW,wcsstr,GetCurrentThread,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,LeaveCriticalSection,WaitForSingleObject,VirtualFree,VirtualFree,3_2_000002287B4FE370
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC1DF30 malloc,memset,FindFirstFileW,free,3_2_000002287BC1DF30
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC1CE50 memset,memset,memset,memset,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,memset,memset,wsprintfW,wsprintfW,FindFirstFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,memset,memset,wsprintfW,FindFirstFileW,FindNextFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,memset,memset,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,FindNextFileW,FindNextFileW,lstrlenW,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000002287BC1CE50
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC1E370 __chkstk,memset,memset,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,memset,lstrcatW,lstrcatW,lstrcatW,Sleep,lstrlenW,wcsstr,GetCurrentThread,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,LeaveCriticalSection,WaitForSingleObject,VirtualFree,VirtualFree,3_2_000002287BC1E370
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC1C9B0 memset,lstrcatW,lstrcatW,memset,FindFirstFileW,FindNextFileW,FindNextFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000002287BC1C9B0
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018001E370 __chkstk,memset,memset,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,memset,lstrcatW,lstrcatW,lstrcatW,Sleep,lstrlenW,wcsstr,GetCurrentThread,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,LeaveCriticalSection,WaitForSingleObject,VirtualFree,VirtualFree,6_2_000000018001E370
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018001C9B0 memset,lstrcatW,lstrcatW,memset,FindFirstFileW,FindNextFileW,FindNextFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,6_2_000000018001C9B0
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018001CE50 memset,memset,memset,memset,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,memset,memset,wsprintfW,wsprintfW,FindFirstFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,memset,memset,wsprintfW,FindFirstFileW,FindNextFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,memset,memset,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,FindNextFileW,FindNextFileW,lstrlenW,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,6_2_000000018001CE50
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018001DF30 malloc,memset,FindFirstFileW,free,6_2_000000018001DF30
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_00007FFB1C2E6418 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,__std_fs_open_handle,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,CloseHandle,CloseHandle,abort,abort,abort,10_2_00007FFB1C2E6418
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_000000018001E370 __chkstk,memset,memset,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,memset,lstrcatW,lstrcatW,lstrcatW,Sleep,lstrlenW,wcsstr,GetCurrentThread,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,LeaveCriticalSection,WaitForSingleObject,VirtualFree,VirtualFree,10_2_000000018001E370
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_000000018001C9B0 memset,lstrcatW,lstrcatW,memset,FindFirstFileW,FindNextFileW,FindNextFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,10_2_000000018001C9B0
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_000000018001CE50 memset,memset,memset,memset,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,memset,memset,wsprintfW,wsprintfW,FindFirstFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,memset,memset,wsprintfW,FindFirstFileW,FindNextFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,memset,memset,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,FindNextFileW,FindNextFileW,lstrlenW,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,10_2_000000018001CE50
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_000000018001DF30 malloc,memset,FindFirstFileW,free,10_2_000000018001DF30
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_000000018001E370 __chkstk,memset,memset,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,memset,lstrcatW,lstrcatW,lstrcatW,Sleep,lstrlenW,wcsstr,GetCurrentThread,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,LeaveCriticalSection,WaitForSingleObject,VirtualFree,VirtualFree,11_2_000000018001E370
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_000000018001C9B0 memset,lstrcatW,lstrcatW,memset,FindFirstFileW,FindNextFileW,FindNextFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,11_2_000000018001C9B0
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_000000018001CE50 memset,memset,memset,memset,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,memset,memset,wsprintfW,wsprintfW,FindFirstFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,memset,memset,wsprintfW,FindFirstFileW,FindNextFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,memset,memset,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,FindNextFileW,FindNextFileW,lstrlenW,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,11_2_000000018001CE50
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_000000018001DF30 malloc,memset,FindFirstFileW,free,11_2_000000018001DF30
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B509B00 memset,memset,VirtualFree,VirtualFree,GetModuleHandleW,GetProcAddress,GetProcAddress,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,OpenProcess,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,TerminateProcess,Sleep,DeleteFileW,lstrcpyW,lstrcatW,TerminateProcess,CloseHandle,Sleep,3_2_000002287B509B00
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B502570 memset,memset,memset,memset,gethostname,gethostbyname,inet_ntoa,wsprintfW,lstrcatW,GetForegroundWindow,GetWindowTextW,VirtualAlloc,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,VirtualFree,GetComputerNameW,GetCurrentProcess,IsWow64Process,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,RegCloseKey,GetSystemInfo,wsprintfW,GlobalMemoryStatusEx,wsprintfW,VirtualAlloc,VirtualAlloc,GetUserNameW,GetCurrentProcessId,wsprintfW,VirtualFree,VirtualFree,memset,GetWindowsDirectoryW,GetLastError,GetVolumeInformationW,wsprintfA,wsprintfA,wsprintfW,CoInitialize,CoCreateInstance,SysFreeString,CoUninitialize,GetCurrentProcess,IsWow64Process,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000002287B502570
Source: svchost.exe, 00000003.00000000.1254583176.000002287A02B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: zSCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000_0r
Source: 360safe.exe, 00000000.00000002.1277101796.0000000141813000.00000008.00000001.01000000.00000003.sdmp, 360safe.exe, 00000000.00000000.1247122724.00000001417B9000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: .?AVQEmulationPaintEngine@@
Source: 360safe.exe, 00000000.00000002.1269315814.000000000055D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.1254609692.000002287A040000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2490738992.000002287A040000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.2488798335.0000013D1BC13000.00000004.00000020.00020000.00000000.sdmp, dllhost.exe, 0000000B.00000002.2487917246.000002EA8211C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.2488965795.0000019A4E213000.00000004.00000020.00020000.00000000.sdmp, dllhost.exe, 0000000D.00000002.2487737856.000001B4F023C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: HoopCity.exe, 0000000A.00000002.1277943290.0000000000440000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllCC
Source: C:\Users\user\Desktop\360safe.exeAPI call chain: ExitProcess graph end nodegraph_0-4040
Source: C:\Windows\System32\svchost.exeAPI call chain: ExitProcess graph end nodegraph_3-51720
Source: C:\Windows\System32\svchost.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B50E9E0 BlockInput,3_2_000002287B50E9E0
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_000000018000D484 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000000018000D484
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4F70C0 GetCurrentProcessId,ProcessIdToSessionId,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,CloseHandle,WTSGetActiveConsoleSessionId,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,CreateThread,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000002287B4F70C0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B504110 VirtualAlloc,LoadLibraryW,GetProcAddress,FreeLibrary,3_2_000002287B504110
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B50CAF0 CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,CloseHandle,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,3_2_000002287B50CAF0
Source: C:\Users\user\Desktop\360safe.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\svchost.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\svchost.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\svchost.exeProcess token adjusted: DebugJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeProcess token adjusted: DebugJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\svchost.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_000000018000D484 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000000018000D484
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_000000018000F6D0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_000000018000F6D0
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_000000018000CEE0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_000000018000CEE0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018000D484 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_000000018000D484
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018000F6D0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_000000018000F6D0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018000CEE0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_000000018000CEE0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B540800 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_000002287B540800
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5400C0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_000002287B5400C0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5441C0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_000002287B5441C0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC600C0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_000002287BC600C0
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800600C0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_00000001800600C0
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800641C0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_00000001800641C0
Source: C:\Windows\System32\svchost.exeCode function: 6_2_0000000180060800 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_0000000180060800
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_00007FFB1C2E8618 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_00007FFB1C2E8618
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_00007FFB1C2EBE40 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_00007FFB1C2EBE40
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_00007FFB1C2E8458 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_00007FFB1C2E8458
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_00000001800600C0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_00000001800600C0
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_00000001800641C0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_00000001800641C0
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_0000000180060800 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_0000000180060800
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_00000001800600C0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_00000001800600C0
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_00000001800641C0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_00000001800641C0
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_0000000180060800 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_0000000180060800

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\svchost.exeFile created: HoopCity.exe.3.drJump to dropped file
Source: C:\Users\user\Desktop\360safe.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2287A7D0000 protect: page execute and read and writeJump to behavior
Source: C:\Users\user\Desktop\360safe.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2287B200000 protect: page read and writeJump to behavior
Source: C:\Users\user\Desktop\360safe.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2287A7E0000 protect: page execute and read and writeJump to behavior
Source: C:\Users\user\Desktop\360safe.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2287A7F0000 protect: page read and writeJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2287B860000 protect: page execute and read and writeJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2287B870000 protect: page read and writeJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2287B900000 protect: page execute and read and writeJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeMemory protected: C:\Windows\System32\svchost.exe base: 2287B900000 protect: page execute readJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeMemory protected: C:\Windows\System32\svchost.exe base: 2287B860000 protect: page execute readJump to behavior
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FFB40 VirtualAllocEx,GetLastError,VirtualAllocEx,WriteProcessMemory,GetLastError,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualProtectEx,VirtualProtectEx,memset,GetThreadContext,SetThreadContext,memset,Wow64GetThreadContext,Wow64SetThreadContext,ResumeThread,GetLastError,3_2_000002287B4FFB40
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B4FF870 VirtualAllocEx,GetLastError,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualProtectEx,GetModuleHandleW,GetProcAddress,CreateRemoteThread,3_2_000002287B4FF870
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B50E560 CreateToolhelp32Snapshot,Process32FirstW,lstrcmpiW,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,Process32NextW,lstrcmpiW,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,Process32NextW,3_2_000002287B50E560
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B509EA0 VirtualAlloc,GetLastError,VirtualFree,VirtualFree,GetLastError,memset,lstrcatW,lstrcatW,lstrcatW,memset,memset,memcpy,VirtualFree,VirtualFree,VirtualFree,VirtualFree,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,VirtualFree,VirtualFree,VirtualFree,GetLastError,VirtualFree,VirtualFree,VirtualFree,GetLastError,VirtualFree,VirtualFree,3_2_000002287B509EA0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC1F870 VirtualAllocEx,GetLastError,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualProtectEx,GetModuleHandleW,GetProcAddress,CreateRemoteThread,3_2_000002287BC1F870
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC29EA0 VirtualAlloc,GetLastError,VirtualFree,VirtualFree,GetLastError,memset,lstrcatW,lstrcatW,lstrcatW,memset,memset,memcpy,VirtualFree,VirtualFree,VirtualFree,VirtualFree,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,VirtualFree,VirtualFree,VirtualFree,GetLastError,VirtualFree,VirtualFree,VirtualFree,GetLastError,VirtualFree,VirtualFree,3_2_000002287BC29EA0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC2E560 CreateToolhelp32Snapshot,Process32FirstW,lstrcmpiW,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,Process32NextW,lstrcmpiW,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,Process32NextW,3_2_000002287BC2E560
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018002E560 CreateToolhelp32Snapshot,Process32FirstW,lstrcmpiW,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,Process32NextW,lstrcmpiW,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,Process32NextW,6_2_000000018002E560
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018001F870 VirtualAllocEx,GetLastError,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualProtectEx,GetModuleHandleW,GetProcAddress,CreateRemoteThread,6_2_000000018001F870
Source: C:\Windows\System32\svchost.exeCode function: 6_2_0000000180029EA0 VirtualAlloc,GetLastError,VirtualFree,VirtualFree,GetLastError,memset,lstrcatW,lstrcatW,lstrcatW,memset,memset,memcpy,VirtualFree,VirtualFree,VirtualFree,VirtualFree,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,VirtualFree,VirtualFree,VirtualFree,GetLastError,VirtualFree,VirtualFree,VirtualFree,GetLastError,VirtualFree,VirtualFree,6_2_0000000180029EA0
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_000000018001F870 VirtualAllocEx,GetLastError,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualProtectEx,GetModuleHandleW,GetProcAddress,NtCreateThreadEx,CreateRemoteThread,10_2_000000018001F870
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_000000018002E560 CreateToolhelp32Snapshot,Process32FirstW,lstrcmpiW,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,Process32NextW,lstrcmpiW,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,Process32NextW,10_2_000000018002E560
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_0000000180029EA0 VirtualAlloc,GetLastError,VirtualFree,VirtualFree,GetLastError,memset,lstrcatW,lstrcatW,lstrcatW,memset,memset,memcpy,VirtualFree,VirtualFree,VirtualFree,VirtualFree,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,VirtualFree,VirtualFree,VirtualFree,GetLastError,VirtualFree,VirtualFree,VirtualFree,GetLastError,VirtualFree,VirtualFree,10_2_0000000180029EA0
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_000000018002E560 CreateToolhelp32Snapshot,Process32FirstW,lstrcmpiW,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,Process32NextW,lstrcmpiW,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,Process32NextW,11_2_000000018002E560
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_000000018001F870 VirtualAllocEx,GetLastError,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualProtectEx,GetModuleHandleW,GetProcAddress,CreateRemoteThread,11_2_000000018001F870
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_0000000180029EA0 VirtualAlloc,GetLastError,VirtualFree,VirtualFree,GetLastError,memset,lstrcatW,lstrcatW,lstrcatW,memset,memset,memcpy,VirtualFree,VirtualFree,VirtualFree,VirtualFree,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,VirtualFree,VirtualFree,VirtualFree,GetLastError,VirtualFree,VirtualFree,VirtualFree,GetLastError,VirtualFree,VirtualFree,11_2_0000000180029EA0
Source: C:\Program Files\Windows Mail\HoopCity.exeThread created: unknown EIP: 7B900000Jump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtAllocateVirtualMemory: Direct from: 0x1800209E3Jump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtAllocateVirtualMemory: Direct from: 0x18001F919Jump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtClose: Direct from: 0x1800208A1
Source: C:\Program Files\Windows Mail\HoopCity.exeNtAllocateVirtualMemory: Direct from: 0x18001B25AJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtAllocateVirtualMemory: Direct from: 0x18001B13DJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtAllocateVirtualMemory: Direct from: 0x180020A4EJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtWriteVirtualMemory: Direct from: 0x18001F93CJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtAllocateVirtualMemory: Direct from: 0x180020B8FJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtAllocateVirtualMemory: Direct from: 0x18001F95DJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtWriteVirtualMemory: Direct from: 0x18001F8F9Jump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtAllocateVirtualMemory: Direct from: 0x18002090DJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtAllocateVirtualMemory: Direct from: 0x180020978Jump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtProtectVirtualMemory: Direct from: 0x18002D588Jump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtProtectVirtualMemory: Direct from: 0x18002D5BBJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtWriteVirtualMemory: Direct from: 0x18001FA3DJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtAllocateVirtualMemory: Direct from: 0x18001B223Jump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtAllocateVirtualMemory: Direct from: 0x18002D1FBJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtProtectVirtualMemory: Direct from: 0x18001FA82Jump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtAllocateVirtualMemory: Direct from: 0x18001F704Jump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtProtectVirtualMemory: Direct from: 0x18001245AJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtQuerySystemInformation: Direct from: 0x18002CA14Jump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtUnmapViewOfSection: Direct from: 0x18002CA37Jump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtAllocateVirtualMemory: Direct from: 0x1800124B2Jump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtUnmapViewOfSection: Direct from: 0x18002CA54Jump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtProtectVirtualMemory: Direct from: 0x18001FA66Jump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtClose: Direct from: 0x18001FF26
Source: C:\Program Files\Windows Mail\HoopCity.exeNtAllocateVirtualMemory: Direct from: 0x18001247BJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtAllocateVirtualMemory: Direct from: 0x1800208B8Jump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtClose: Direct from: 0x18002CAD7
Source: C:\Program Files\Windows Mail\HoopCity.exeNtAllocateVirtualMemory: Direct from: 0x18001B291Jump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtQuerySystemInformation: Direct from: 0x1800126ECJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtAdjustPrivilegesToken: Direct from: 0x180020887Jump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtAllocateVirtualMemory: Direct from: 0x180020AB9Jump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtAllocateVirtualMemory: Direct from: 0x1800207FDJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtCreateThreadEx: Direct from: 0x18001FAE5Jump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtAllocateVirtualMemory: Direct from: 0x18001B1ECJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtQuerySystemInformation: Direct from: 0x18001240DJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtAllocateVirtualMemory: Direct from: 0x180020B24Jump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtAllocateVirtualMemory: Direct from: 0x18001F8CAJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtAllocateVirtualMemory: Direct from: 0x180020BFAJump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeNtAdjustPrivilegesToken: Direct from: 0x18001FF0CJump to behavior
Source: C:\Windows\System32\svchost.exeThread register set: target process: 3752Jump to behavior
Source: C:\Windows\System32\svchost.exeThread register set: target process: 2352Jump to behavior
Source: C:\Windows\System32\svchost.exeThread register set: target process: 6392Jump to behavior
Source: C:\Windows\System32\svchost.exeThread register set: target process: 1196Jump to behavior
Source: C:\Users\user\Desktop\360safe.exeMemory written: C:\Windows\System32\svchost.exe base: 2287A7D0000Jump to behavior
Source: C:\Users\user\Desktop\360safe.exeMemory written: C:\Windows\System32\svchost.exe base: 2287B200000Jump to behavior
Source: C:\Users\user\Desktop\360safe.exeMemory written: C:\Windows\System32\svchost.exe base: 2287A7E0000Jump to behavior
Source: C:\Users\user\Desktop\360safe.exeMemory written: C:\Windows\System32\svchost.exe base: 2287A7F0000Jump to behavior
Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\System32\dllhost.exe base: 2EA81F50000Jump to behavior
Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\System32\dllhost.exe base: 2EA81FE0000Jump to behavior
Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\System32\dllhost.exe base: 2EA81F40000Jump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeMemory written: C:\Windows\System32\svchost.exe base: 2287B860000Jump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeMemory written: C:\Windows\System32\svchost.exe base: 2287B870000Jump to behavior
Source: C:\Program Files\Windows Mail\HoopCity.exeMemory written: C:\Windows\System32\svchost.exe base: 2287B900000Jump to behavior
Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\System32\dllhost.exe base: 1B4F00A0000Jump to behavior
Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\System32\dllhost.exe base: 1B4F0130000Jump to behavior
Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\System32\dllhost.exe base: 1B4F0090000Jump to behavior
Source: C:\Windows\System32\svchost.exeCode function: WSAStartup,GetCommandLineW,CommandLineToArgvW,VirtualAlloc,InitializeCriticalSection,VirtualAlloc,InitializeCriticalSection,memset,GetCurrentProcessId,lstrcmpiW,lstrcmpiW,ExitThread,lstrcmpiW,GetCurrentProcess,TerminateProcess,lstrcmpiW,GetCurrentProcessId,OpenProcess,TerminateProcess,CloseHandle,WaitForSingleObject,GetExitCodeProcess,Sleep,CreateThread,WaitForSingleObject,CloseHandle,memset,GetModuleFileNameW,wcsstr,GetNativeSystemInfo,ExitProcess,lstrcmpiW,lstrcmpiW,GetNativeSystemInfo,ExitProcess,GetCurrentProcess,TerminateProcess, svchost.exe3_2_000002287B4F23E0
Source: C:\Windows\System32\svchost.exeCode function: WSAStartup,GetCommandLineW,CommandLineToArgvW,VirtualAlloc,InitializeCriticalSection,VirtualAlloc,InitializeCriticalSection,memset,GetCurrentProcessId,lstrcmpiW,lstrcmpiW,ExitThread,lstrcmpiW,GetCurrentProcess,TerminateProcess,lstrcmpiW,GetCurrentProcessId,OpenProcess,TerminateProcess,CloseHandle,WaitForSingleObject,GetExitCodeProcess,Sleep,CreateThread,WaitForSingleObject,CloseHandle,memset,GetModuleFileNameW,wcsstr,GetNativeSystemInfo,ExitProcess,lstrcmpiW,lstrcmpiW,GetNativeSystemInfo,ExitProcess,GetCurrentProcess,TerminateProcess, svchost.exe3_2_000002287BC123E0
Source: C:\Windows\System32\svchost.exeCode function: WSAStartup,GetCommandLineW,CommandLineToArgvW,VirtualAlloc,InitializeCriticalSection,VirtualAlloc,InitializeCriticalSection,memset,GetCurrentProcessId,lstrcmpiW,lstrcmpiW,ExitThread,lstrcmpiW,GetCurrentProcess,TerminateProcess,lstrcmpiW,GetCurrentProcessId,OpenProcess,TerminateProcess,CloseHandle,WaitForSingleObject,GetExitCodeProcess,Sleep,CreateThread,WaitForSingleObject,CloseHandle,memset,GetModuleFileNameW,wcsstr,GetNativeSystemInfo,ExitProcess,lstrcmpiW,lstrcmpiW,GetNativeSystemInfo,ExitProcess,GetCurrentProcess,TerminateProcess, svchost.exe6_2_00000001800123E0
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: WSAStartup,GetCommandLineW,CommandLineToArgvW,VirtualAlloc,InitializeCriticalSection,VirtualAlloc,InitializeCriticalSection,memset,GetCurrentProcessId,lstrcmpiW,lstrcmpiW,ExitThread,lstrcmpiW,GetCurrentProcess,TerminateProcess,lstrcmpiW,GetCurrentProcessId,OpenProcess,TerminateProcess,CloseHandle,WaitForSingleObject,GetExitCodeProcess,Sleep,CreateThread,WaitForSingleObject,CloseHandle,memset,GetModuleFileNameW,wcsstr,GetNativeSystemInfo,ExitProcess,lstrcmpiW,lstrcmpiW,GetNativeSystemInfo,ExitProcess,GetCurrentProcess,TerminateProcess, svchost.exe10_2_00000001800123E0
Source: C:\Windows\System32\dllhost.exeCode function: WSAStartup,GetCommandLineW,CommandLineToArgvW,VirtualAlloc,InitializeCriticalSection,VirtualAlloc,InitializeCriticalSection,memset,GetCurrentProcessId,lstrcmpiW,lstrcmpiW,ExitThread,lstrcmpiW,GetCurrentProcess,TerminateProcess,lstrcmpiW,GetCurrentProcessId,OpenProcess,TerminateProcess,CloseHandle,WaitForSingleObject,GetExitCodeProcess,Sleep,CreateThread,WaitForSingleObject,CloseHandle,memset,GetModuleFileNameW,wcsstr,GetNativeSystemInfo,ExitProcess,lstrcmpiW,lstrcmpiW,GetNativeSystemInfo,ExitProcess,GetCurrentProcess,TerminateProcess, svchost.exe11_2_00000001800123E0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B50E0A0 BlockInput,BlockInput,GetDC,GetDeviceCaps,GetDeviceCaps,GetDeviceCaps,GetDeviceCaps,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,mouse_event,BlockInput,3_2_000002287B50E0A0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B50E0A0 BlockInput,BlockInput,GetDC,GetDeviceCaps,GetDeviceCaps,GetDeviceCaps,GetDeviceCaps,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,mouse_event,BlockInput,3_2_000002287B50E0A0
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcsJump to behavior
Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Mail\HoopCity.exe "C:\Program Files\Windows Mail\HoopCity.exe"Jump to behavior
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcsJump to behavior
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}Jump to behavior
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}Jump to behavior
Source: C:\Windows\System32\svchost.exeFile opened: Windows Firewall: C:\Windows\System32\FirewallAPI.dllJump to behavior
Source: C:\Windows\System32\svchost.exeFile opened: Windows Firewall: C:\Windows\System32\FirewallAPI.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeFile opened: Windows Firewall: C:\Windows\System32\FirewallAPI.dllJump to behavior
Source: C:\Windows\System32\svchost.exeFile opened: Windows Firewall: C:\Windows\System32\FirewallAPI.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeFile opened: Windows Firewall: C:\Windows\System32\FirewallAPI.dllJump to behavior
Source: svchost.exe, 00000006.00000002.2491820168.0000013D1CF80000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1905194252.0000013D1CF80000.00000004.00001000.00020000.00000000.sdmp, dllhost.exe, 0000000B.00000003.1885811938.000002EA84860000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Program ManagerF
Source: svchost.exe, 00000006.00000003.1905243487.0000013D1D330000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1905440282.0000013D1D2B0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 0000000C.00000003.1922158074.0000019A4F990000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: TCPProgram ManagerF
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: GetLocaleInfoEx,FormatMessageA,10_2_00007FFB1C2E6118
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: GetLocaleInfoEx,GetLocaleInfoEx,10_2_00007FFB1C2EC030
Source: C:\Users\user\Desktop\360safe.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\MicrosoftEdgeUpdate VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\MicrosoftEdgeUpdate VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B507EB0 CreateNamedPipeW,GetLastError,ConnectNamedPipe,GetLastError,3_2_000002287B507EB0
Source: C:\Users\user\Desktop\360safe.exeCode function: 0_2_000000018000D05C GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_000000018000D05C
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B502570 memset,memset,memset,memset,gethostname,gethostbyname,inet_ntoa,wsprintfW,lstrcatW,GetForegroundWindow,GetWindowTextW,VirtualAlloc,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,VirtualFree,GetComputerNameW,GetCurrentProcess,IsWow64Process,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,RegCloseKey,GetSystemInfo,wsprintfW,GlobalMemoryStatusEx,wsprintfW,VirtualAlloc,VirtualAlloc,GetUserNameW,GetCurrentProcessId,wsprintfW,VirtualFree,VirtualFree,memset,GetWindowsDirectoryW,GetLastError,GetVolumeInformationW,wsprintfA,wsprintfA,wsprintfW,CoInitialize,CoCreateInstance,SysFreeString,CoUninitialize,GetCurrentProcess,IsWow64Process,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000002287B502570
Source: svchost.exe, 00000006.00000003.1276608978.0000013D1D1D0000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000003.1275037120.0000013D1C950000.00000004.00000001.00020000.00000000.sdmp, HoopCity.exe, 0000000A.00000003.1276915991.0000000001AC0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 360safe.exe
Source: 360safe.exe, 00000000.00000002.1269315814.000000000055D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vxh V\Device\HarddiskVolume3\Users\user\Desktop\360safe.exe
Source: 360safe.exe, 00000000.00000002.1270497811.00000000027F7000.00000004.00000020.00020000.00000000.sdmp, 360safe.exe, 00000000.00000002.1270497811.00000000027F0000.00000004.00000020.00020000.00000000.sdmp, 360safe.exe, 00000000.00000002.1269578958.0000000000955000.00000004.00000020.00020000.00000000.sdmp, 360safe.exe, 00000000.00000002.1271817842.00000000050E6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Users\user\Desktop\360safe.exe
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B52A8C0 socket,socket,htonl,bind,getsockname,3_2_000002287B52A8C0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5276C0 socket,setsockopt,setsockopt,setsockopt,WSAGetLastError,listen,closesocket,WSAGetLastError,closesocket,closesocket,3_2_000002287B5276C0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B5015B0 memset,VirtualFree,VirtualFree,socket,setsockopt,htons,inet_addr,htonl,bind,WSAGetLastError,listen,CreateThread,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,3_2_000002287B5015B0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287B536BC0 htons,_unlink,bind,WSAGetLastError,getsockname,htons,3_2_000002287B536BC0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC4A8C0 socket,socket,htonl,bind,getsockname,3_2_000002287BC4A8C0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC476C0 socket,setsockopt,setsockopt,setsockopt,WSAGetLastError,listen,closesocket,WSAGetLastError,closesocket,closesocket,3_2_000002287BC476C0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC215B0 memset,VirtualFree,VirtualFree,socket,setsockopt,htons,inet_addr,htonl,bind,WSAGetLastError,listen,CreateThread,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,3_2_000002287BC215B0
Source: C:\Windows\System32\svchost.exeCode function: 3_2_000002287BC56BC0 htons,_unlink,bind,WSAGetLastError,getsockname,htons,3_2_000002287BC56BC0
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800215B0 memset,VirtualFree,VirtualFree,socket,setsockopt,htons,inet_addr,htonl,bind,WSAGetLastError,listen,CreateThread,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,6_2_00000001800215B0
Source: C:\Windows\System32\svchost.exeCode function: 6_2_00000001800476C0 socket,setsockopt,setsockopt,setsockopt,WSAGetLastError,listen,closesocket,WSAGetLastError,closesocket,closesocket,6_2_00000001800476C0
Source: C:\Windows\System32\svchost.exeCode function: 6_2_000000018004A8C0 socket,socket,htonl,bind,getsockname,6_2_000000018004A8C0
Source: C:\Windows\System32\svchost.exeCode function: 6_2_0000000180056BC0 htons,_unlink,bind,WSAGetLastError,getsockname,htons,6_2_0000000180056BC0
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_00000001800215B0 memset,VirtualFree,VirtualFree,socket,setsockopt,htons,inet_addr,htonl,bind,WSAGetLastError,listen,CreateThread,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,10_2_00000001800215B0
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_00000001800476C0 socket,setsockopt,setsockopt,setsockopt,WSAGetLastError,listen,closesocket,WSAGetLastError,closesocket,closesocket,10_2_00000001800476C0
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_000000018004A8C0 socket,socket,htonl,bind,getsockname,10_2_000000018004A8C0
Source: C:\Program Files\Windows Mail\HoopCity.exeCode function: 10_2_0000000180056BC0 htons,_unlink,bind,WSAGetLastError,getsockname,htons,10_2_0000000180056BC0
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_00000001800215B0 memset,VirtualFree,VirtualFree,socket,setsockopt,htons,inet_addr,htonl,bind,WSAGetLastError,listen,CreateThread,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,11_2_00000001800215B0
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_00000001800476C0 socket,setsockopt,setsockopt,setsockopt,WSAGetLastError,listen,closesocket,WSAGetLastError,closesocket,closesocket,11_2_00000001800476C0
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_000000018004A8C0 socket,socket,htonl,bind,getsockname,11_2_000000018004A8C0
Source: C:\Windows\System32\dllhost.exeCode function: 11_2_0000000180056BC0 htons,_unlink,bind,WSAGetLastError,getsockname,htons,11_2_0000000180056BC0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Valid Accounts
11
Native API
1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
2
Disable or Modify Tools
21
Input Capture
1
System Time Discovery
Remote Services1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Exploitation for Client Execution
1
Create Account
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory11
Account Discovery
Remote Desktop Protocol21
Input Capture
1
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts2
Command and Scripting Interpreter
1
Valid Accounts
1
Valid Accounts
1
Abuse Elevation Control Mechanism
Security Account Manager1
System Service Discovery
SMB/Windows Admin Shares3
Clipboard Data
1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts1
Scheduled Task/Job
12
Windows Service
11
Access Token Manipulation
3
Obfuscated Files or Information
NTDS2
File and Directory Discovery
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud Accounts12
Service Execution
1
Scheduled Task/Job
12
Windows Service
2
Software Packing
LSA Secrets25
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts723
Process Injection
1
DLL Side-Loading
Cached Domain Credentials1
Network Share Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items1
Scheduled Task/Job
1
File Deletion
DCSync41
Security Software Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job12
Masquerading
Proc Filesystem1
Virtualization/Sandbox Evasion
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
Valid Accounts
/etc/passwd and /etc/shadow4
Process Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
Virtualization/Sandbox Evasion
Network Sniffing1
System Owner/User Discovery
Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd11
Access Token Manipulation
Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task723
Process Injection
KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
Indicator Removal
GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1565272 Sample: 360safe.exe Startdate: 29/11/2024 Architecture: WINDOWS Score: 92 34 www.wshifen.com 2->34 36 www.baidu.com 2->36 38 www.a.shifen.com 2->38 54 Contains functionality to inject threads in other processes 2->54 56 AI detected suspicious sample 2->56 9 360safe.exe 2->9         started        signatures3 process4 dnsIp5 42 www.wshifen.com 103.235.47.188, 49699, 80 BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtd Hong Kong 9->42 60 Writes to foreign memory regions 9->60 62 Allocates memory in foreign processes 9->62 13 svchost.exe 12 4 9->13 injected signatures6 process7 file8 30 C:\Program Files\...\HoopCityBase.dll, PE32+ 13->30 dropped 32 C:\Program Files\Windows Mail\HoopCity.exe, PE32+ 13->32 dropped 64 Benign windows process drops PE files 13->64 66 Contains functionality to inject threads in other processes 13->66 68 Contains functionality to inject code into remote processes 13->68 70 3 other signatures 13->70 17 HoopCity.exe 13->17         started        20 svchost.exe 1 13->20         started        23 svchost.exe 13->23         started        signatures9 process10 dnsIp11 44 Changes memory attributes in foreign processes to executable or writable 17->44 46 Writes to foreign memory regions 17->46 48 Allocates memory in foreign processes 17->48 52 2 other signatures 17->52 40 192.197.113.45, 49703, 49704, 80 HKKFGL-AS-APHKKwaifongGroupLimitedHK China 20->40 50 Modifies the context of a thread in another process (thread injection) 20->50 25 dllhost.exe 20->25         started        28 dllhost.exe 23->28         started        signatures12 process13 signatures14 58 Contains functionality to inject threads in other processes 25->58

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
360safe.exe11%ReversingLabs
SourceDetectionScannerLabelLink
C:\Program Files\Windows Mail\HoopCity.exe0%ReversingLabs
C:\Program Files\Windows Mail\HoopCityBase.dll11%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://tools.soft.360.cn/jump?id=41X0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
www.wshifen.com
103.235.47.188
truefalse
    high
    www.baidu.com
    unknown
    unknownfalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://s.360.cn/safe/xxzx.html?stype=msgcenter&type=360safe.exe, 00000000.00000000.1247174904.0000000141933000.00000002.00000001.01000000.00000003.sdmpfalse
        high
        https://chrome.google.com/webstore?hl=zh-CNCtrl$1360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpfalse
          high
          http://html4/loose.dtd360safe.exefalse
            high
            https://chromeenterprise.google/policies/#BrowserSwitcherEnabled360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpfalse
              high
              https://chrome.google.com/webstore/category/extensions360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpfalse
                high
                https://support.google.com/chromebook?p=app_intent360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpfalse
                  high
                  https://support.google.com/chrome/answer/6098869360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpfalse
                    high
                    https://www.google.com/chrome/privacy/eula_text.html360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpfalse
                      high
                      http://www.360.cn/weishi/cht/index.html#http://dl.360safe.com/setupbeta.exe360safe.exe, 00000000.00000000.1247174904.0000000141933000.00000002.00000001.01000000.00000003.sdmpfalse
                        high
                        https://support.google.com/chrome/answer/96817360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpfalse
                          high
                          http://.css360safe.exefalse
                            high
                            https://support.google.com/chrome/a/?p=browser_profile_details360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpfalse
                              high
                              https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpfalse
                                high
                                https://myactivity.google.com/360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpfalse
                                  high
                                  https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpfalse
                                    high
                                    https://chromeenterprise.google/policies/#BrowserSwitcherUseIeSitelist360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpfalse
                                      high
                                      https://chromeenterprise.google/policies/#BrowserSwitcherUrlList360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpfalse
                                        high
                                        https://passwords.google.com360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpfalse
                                          high
                                          http://dl.360safe.com/offlinepackv4.exe360safe.exe, 00000000.00000000.1247174904.0000000141933000.00000002.00000001.01000000.00000003.sdmpfalse
                                            high
                                            https://policies.google.com/360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpfalse
                                              high
                                              https://support.google.com/chrome/a/answer/9122284360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpfalse
                                                high
                                                https://tools.soft.360.cn/jump?id=41X360safe.exe, 00000000.00000000.1247174904.0000000141933000.00000002.00000001.01000000.00000003.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%22360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpfalse
                                                  high
                                                  http://.jpg360safe.exefalse
                                                    high
                                                    https://chrome.google.com/webstore?hl=zh-CN&category=theme81https://myactivity.google.com/myactivity360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpfalse
                                                      high
                                                      https://chromeenterprise.google/policies/#BrowserSwitcherUrlGreylist360safe.exe, 00000000.00000000.1246386089.0000000141157000.00000002.00000001.01000000.00000003.sdmpfalse
                                                        high
                                                        https://update.360safe.com/safe/checkupdate.ini2http://update.360safe.com/safe/checkupdate_cht.ini&360safe.exe, 00000000.00000000.1247174904.0000000141933000.00000002.00000001.01000000.00000003.sdmpfalse
                                                          high
                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs
                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          192.197.113.45
                                                          unknownChina
                                                          133115HKKFGL-AS-APHKKwaifongGroupLimitedHKfalse
                                                          103.235.47.188
                                                          www.wshifen.comHong Kong
                                                          55967BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtdfalse
                                                          Joe Sandbox version:41.0.0 Charoite
                                                          Analysis ID:1565272
                                                          Start date and time:2024-11-29 14:49:12 +01:00
                                                          Joe Sandbox product:CloudBasic
                                                          Overall analysis duration:0h 8m 17s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:full
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                          Number of analysed new started processes analysed:18
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:1
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Sample name:360safe.exe
                                                          Detection:MAL
                                                          Classification:mal92.evad.winEXE@11/5@1/2
                                                          EGA Information:
                                                          • Successful, ratio: 100%
                                                          HCA Information:
                                                          • Successful, ratio: 99%
                                                          • Number of executed functions: 42
                                                          • Number of non-executed functions: 277
                                                          Cookbook Comments:
                                                          • Found application associated with file extension: .exe
                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                          • Excluded domains from analysis (whitelisted): fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                                          • Not all processes where analyzed, report is missing behavior information
                                                          • Report creation exceeded maximum time and may have missing disassembly code information.
                                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                                          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                          • VT rate limit hit for: 360safe.exe
                                                          TimeTypeDescription
                                                          14:50:07Task SchedulerRun new task: MicrosoftEdgeUpdate path: C:\Program Files\Windows Mail\HoopCity.exe
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          103.235.47.188Iifpj4i2kC.exeGet hashmaliciousFormBookBrowse
                                                          • www.zruypj169g.top/md02/?oHH8=VZUPDXU8mXkToFn&0PG4QdD=KBMih/6UmjMCLIvQj8A+JVJ0ZduXlvkac/jrKRN7UGcA2YCWIWeuvW479UURmW6VwJBRFqK2PA==
                                                          3.exeGet hashmaliciousBlackMoon, XRedBrowse
                                                          • www.baidu.com/
                                                          CZyOWoN2hiszA6d.exeGet hashmaliciousFormBookBrowse
                                                          • www.vicmvm649n.top/v15n/?Yn=UsBn8mn1PUl4czyMQZxenuqc6dPBc+Q3khu6MN2NNQj7YA4ug5lWpId+R/K0fD87Hm6v&mv=Y4QppplhSjwxWBd
                                                          f2.exeGet hashmaliciousBlackMoonBrowse
                                                          • www.baidu.com/
                                                          f1.exeGet hashmaliciousUnknownBrowse
                                                          • www.baidu.com/
                                                          SecuriteInfo.com.FileRepMalware.29184.31872.exeGet hashmaliciousUnknownBrowse
                                                          • www.baidu.com/
                                                          chAJcIK6ZO.exeGet hashmaliciousUnknownBrowse
                                                          • www.baidu.com/
                                                          LisectAVT_2403002A_489.exeGet hashmaliciousUnknownBrowse
                                                          • www.baidu.com/
                                                          d48c236503a4d2e54e23d9ebc9aa48e86300fd24955c871a7b8792656c47fb6a.exeGet hashmaliciousBdaejecBrowse
                                                          • www.baidu.com/
                                                          7Y18r(100).exeGet hashmaliciousUnknownBrowse
                                                          • www.baidu.com/
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          www.wshifen.comXiaobingOnekey.exeGet hashmaliciousUnknownBrowse
                                                          • 103.235.46.96
                                                          DNF#U604b#U62180224a.exeGet hashmaliciousUnknownBrowse
                                                          • 103.235.46.96
                                                          http://profdentalcare.comGet hashmaliciousUnknownBrowse
                                                          • 103.235.46.96
                                                          Iifpj4i2kC.exeGet hashmaliciousFormBookBrowse
                                                          • 103.235.47.188
                                                          https://www.baidu.com/link?url=7AgUGxkCgEsQdPm9T1PXcA0XghaPOWMLvdhGyyVngg844uS4x-KZy4IMqs1ov0OgdFqhAB-_X2oOV9exK4hWC_&wd=ZWxraW58WTI5eVpUUmpaUzVqYjIwPXxNYkdVSlpkdVROdWNyeW1UWU1laElVVW1QbGRGb0F5RmNLcWJadW1CT01YYw==Get hashmaliciousHTMLPhisherBrowse
                                                          • 103.235.46.96
                                                          kHslwiV2w6.exeGet hashmaliciousFormBookBrowse
                                                          • 103.235.47.188
                                                          http://wap.smarthomehungary.com/Get hashmaliciousUnknownBrowse
                                                          • 103.235.46.96
                                                          http://www.allencai.net/Get hashmaliciousUnknownBrowse
                                                          • 103.235.46.96
                                                          LuJJk0US5g.msiGet hashmaliciousUnknownBrowse
                                                          • 103.235.46.96
                                                          https://ebaite.cn/Get hashmaliciousUnknownBrowse
                                                          • 103.235.46.96
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtdXiaobingOnekey.exeGet hashmaliciousUnknownBrowse
                                                          • 103.235.46.96
                                                          arm7.elfGet hashmaliciousMiraiBrowse
                                                          • 106.13.224.235
                                                          splarm.elfGet hashmaliciousUnknownBrowse
                                                          • 180.76.142.163
                                                          ivySCI-5.6.3.exeGet hashmaliciousUnknownBrowse
                                                          • 45.113.194.85
                                                          arm.elfGet hashmaliciousMirai, MoobotBrowse
                                                          • 106.13.166.147
                                                          DNF#U604b#U62180224a.exeGet hashmaliciousUnknownBrowse
                                                          • 103.235.46.96
                                                          http://profdentalcare.comGet hashmaliciousUnknownBrowse
                                                          • 103.235.46.96
                                                          la.bot.arm.elfGet hashmaliciousUnknownBrowse
                                                          • 106.12.5.224
                                                          la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                                                          • 180.76.189.191
                                                          la.bot.mips.elfGet hashmaliciousUnknownBrowse
                                                          • 180.76.189.198
                                                          HKKFGL-AS-APHKKwaifongGroupLimitedHK1Eo0gOdDsV.exeGet hashmaliciousQuasarBrowse
                                                          • 154.83.15.5
                                                          FS04dlvJrq.exeGet hashmaliciousFormBookBrowse
                                                          • 192.197.113.67
                                                          botnet.mips.elfGet hashmaliciousMirai, MoobotBrowse
                                                          • 154.221.28.71
                                                          mips.elfGet hashmaliciousMiraiBrowse
                                                          • 154.221.30.1
                                                          sh4.elfGet hashmaliciousMiraiBrowse
                                                          • 154.221.30.6
                                                          http://telegiraum.club/Get hashmaliciousTelegram PhisherBrowse
                                                          • 156.236.70.154
                                                          http://telegiraum.club/Get hashmaliciousTelegram PhisherBrowse
                                                          • 156.236.70.154
                                                          na.elfGet hashmaliciousMiraiBrowse
                                                          • 194.120.230.54
                                                          na.elfGet hashmaliciousMiraiBrowse
                                                          • 194.120.230.54
                                                          na.elfGet hashmaliciousUnknownBrowse
                                                          • 194.120.230.54
                                                          No context
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          C:\Program Files\Windows Mail\HoopCityBase.dllsetup#U4f01#U4e1a#U540d#U5355.exeGet hashmaliciousUnknownBrowse
                                                            C:\Program Files\Windows Mail\HoopCity.exesetup#U4f01#U4e1a#U540d#U5355.exeGet hashmaliciousUnknownBrowse
                                                              dfp383.exeGet hashmaliciousUnknownBrowse
                                                                Process:C:\Windows\System32\svchost.exe
                                                                File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):652760
                                                                Entropy (8bit):4.901210814900958
                                                                Encrypted:false
                                                                SSDEEP:6144:JojTX6o9ODnsnR/yJJpcwPi0EcjIQh/IK9rdOACd+AVi2K:67kns1y7uwK+jrIorHs++i2K
                                                                MD5:EF8BDE64E1943C51E2DE2E5CB0182DEB
                                                                SHA1:46194A480734F31455C2A1499B241A45BDEF9183
                                                                SHA-256:D312491920F1CF6599998CEDB9F6988F2FA3F81810B9AD1F5BFC265B16E3A234
                                                                SHA-512:60AC38AF1FE9C887364BAC54F3BAF2A1168E18EB028B74C2E0E550F40EAFB42702A69D58A735D70BA84BCCB64E15F9746784EBE6733928D113DF336F8DECAC9B
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Joe Sandbox View:
                                                                • Filename: setup#U4f01#U4e1a#U540d#U5355.exe, Detection: malicious, Browse
                                                                • Filename: dfp383.exe, Detection: malicious, Browse
                                                                Reputation:low
                                                                Preview:MZ......................@...............0R.f............................!..L.!This program cannot be run in DOS mode....$........T9 .5Ws.5Ws.5Ws.]Sr.5Ws.]Tr.5Ws.]Rr.5Ws.]Vr.5Ws.DRr.5Ws.DSr.5Ws.DTr.5Ws3GVr.5Ws.5Vs.5Ws3GRr.5Ws3GWr.5Ws3G.s.5Ws3GUr.5WsRich.5Ws........................PE..d....].b..........#..........f.......k.........@.............................p.......*.... ..........................................E.......j..(.......H....p..T........)...........5..T............................6..8............................................std....@........Z.................. ..`.std................^..............@..@.std.........P......................@....std....T....p......................@..@.std................................@..@.std....H...........................@..@.std....(+...@...,.................. ...................................................................................................................................................................................
                                                                Process:C:\Windows\System32\svchost.exe
                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):165376
                                                                Entropy (8bit):6.110130693026057
                                                                Encrypted:false
                                                                SSDEEP:3072:1zHrFX5aetLIuiUFVS1crInryCzaTFCANvIw8:fvj0iInWEMzv
                                                                MD5:0E1C6BE6CE3F42B360A45A6D14375388
                                                                SHA1:8B983028B0A3E0DEA90988165B6C0531E9BF862B
                                                                SHA-256:EE71ED13F8E5A47C44AC230C96A13D8C876993763426EF50AE5F4E627C4BB287
                                                                SHA-512:0F32AEB86C4883623743FE772E37C7833C0117021FB2E8A7379E80EE48B0B15E31FBAB63578F8A2E53E9D95BFF437E546ACD0F8562B01C05A9F9DEE5B965D1AD
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 11%
                                                                Joe Sandbox View:
                                                                • Filename: setup#U4f01#U4e1a#U540d#U5355.exe, Detection: malicious, Browse
                                                                Reputation:low
                                                                Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$........z..H.mGH.mGH.mG\piFM.mG\phFO.mG..GN.mG..lFJ.mG..hFi.mG..hFI.mG..nFJ.mGX.nFL.mGX.iF@.mGX.hFr.mG.clFO.mGH.lG..mG..dFJ.mG..mFI.mG..oFI.mGRichH.mG........................PE..d...n..g.........." ...).............{....................................................`.........................................@#..H....#..P........@...P..\............p.. .......8.......................(.......@...............H............................text.............................. ..`.rdata...].......^..................@..@.data........0....... ..............@....pdata..\....P......................@..@.reloc.. ....p.......@..............@..B.rsrc....P.......B...D..............@..@........................................................................................................................................................................................................
                                                                Process:C:\Windows\System32\svchost.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):546764
                                                                Entropy (8bit):6.542788539432496
                                                                Encrypted:false
                                                                SSDEEP:12288:fQi1QXluDFR8drN0Q/mBnHRTO2S8NYrDbwo7XmG0lUjSI2e:GIqKxjNjoLSre
                                                                MD5:5BF44632D2B4CAAFFF1C552FC71748BC
                                                                SHA1:E03519CDC49C5F17CBFD896FB67FBD6491E57DDA
                                                                SHA-256:C1284C3F12E95C9A6385265512246B640969E1E9B12A24B0B364905499F09289
                                                                SHA-512:09FDB978FBA847B1639825444560F54AF9936E1322240352426EA4871C132DF4AF823B768C2808EC2EA0DAD44FB77C298948A2C3B260E72018410F60267F703E
                                                                Malicious:false
                                                                Preview:4...H..(H...D$8run.H.L$8.O...H..(...eH..%`......D..3.L..E..t"A........A..a.J..L.I....A..D....u..H.A.....H.\$.H.l$.H.t$.WAVAWH.. D......H.P.H.j L..I.......M..L.P0M..tLIcB<B.........t<I.<..O.I...j....w 3.I..D..9_.v...I...P...A..D;.t+..H...;_.r.L;.u.3.H.\$@H.l$HH.t$PH.. A_A^_.O$I..D...Y.O.I..B...I.......@SH.. H.......%...H..H.. [H....H.\$.WH.. H..H...........H..H..H.\$0H.. _H.....H.\$.UVWATAUAVAWH.. L..M..3.Z.H........2=..L.......-A..H.D$x....M..M.f.H.D$p3...A..y.H..(fA;A.s|I..9.u29E8~ZHc]8A......O.H..I..A.....A..L..G.3.H...T$p.-.O.A.......I..A.....A..W.H..D..I..H...T$x._.I....H..(..H......;.|.H.\$`H.. A_A^A]A\_^].H.\$.H.l$.H.t$ WATAUAVAWH..@L..-A........ ...H.L$ D..H..3...D.g.E..H.L$ A....E..W.H.L$$..E..W.H.L$(..E..W.H.L$,..E..W.H.L$0..E..W`H.L$4..E..H.L$8....E..W H.L$<....O.B....../.H...5...M..E3.L..A..H.........A..Y.I.q0H..(H#.fE;i.......I..D.C.A.....A.....E..A#.A...A#.A....s..K.A..@....H.....OH..B..I..RD.T. A....A....D.CT. ..u.A..@t.A.A ..E..y.A.A$..t..K.L.L$pH...E.
                                                                Process:C:\Windows\System32\svchost.exe
                                                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):3168
                                                                Entropy (8bit):3.557099643328887
                                                                Encrypted:false
                                                                SSDEEP:48:yei1q9tNTPQOYZj9c9V9Lbra+iaiudupRCRvA9ufAuRa7T5XhPsV8ic4dTkp+++:t7U4diaigVA9ll7dhFFx+
                                                                MD5:7A14711F4CC145CB55937FD77D3219DB
                                                                SHA1:FC526C4F7FFAD339A68C03853CE5027793AD6541
                                                                SHA-256:94FDA09E6FC744536DD0199C79A44B5105EF9D66ADEDC09BB2452DC598EA07B7
                                                                SHA-512:9E52C0D73764CD5F8F53D74ACC53247A905DA114453B762D203D28190D4099036A0851C91129CF0508A5D5330F23A18580339DBEEB0BB9D8CCEEFF560B1D532B
                                                                Malicious:false
                                                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...2.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.A.u.t.h.o.r.>.S.Y.S.T.E.M.<./.A.u.t.h.o.r.>..... . . . .<.D.e.s.c.r.i.p.t.i.o.n.>.M.i.c.r.o.s.o.f.t. .E.d.g.e. .U.p.d.a.t.e. .T.a.s.k. .M.a.c.h.i.n.e.C.o.r.e.<./.D.e.s.c.r.i.p.t.i.o.n.>..... . . . .<.U.R.I.>.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.M.i.c.r.o.s.o.f.t.E.d.g.e.U.p.d.a.t.e.<./.U.R.I.>..... . .<./.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . .<.T.r.i.g.g.e.r.s.>..... . . . .<.B.o.o.t.T.r.i.g.g.e.r.>..... . . . . . .<.E.n.a.b.l.e.d.>.t.r.u.e.<./.E.n.a.b.l.e.d.>..... . . . .<./.B.o.o.t.T.r.i.g.g.e.r.>..... . .<./.T.r.i.g.g.e.r.s.>..... . .<.P.r.i.n.c.i.p.a.l.s.>..... . . . .<.P.r.i.n.c.i.p.a.l. .i.d.=.".A.u.t.h.o.r.".>..... . . . . . .<.U.s.e.r.I.d.>.S.-.1.-.5.-.1.8.<./.U.s.e.r.I.d.
                                                                Process:C:\Windows\System32\svchost.exe
                                                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                Category:modified
                                                                Size (bytes):4680
                                                                Entropy (8bit):3.7110483398889156
                                                                Encrypted:false
                                                                SSDEEP:96:pYMguQII4i26h4aGdinipV9ll7UY5HAmzQ+:9A4G/xne7HO+
                                                                MD5:7A1771E88EA8639F907770CEFD03A7B1
                                                                SHA1:2403D7888786C13F0ABD6120A210B3F27391E14E
                                                                SHA-256:420B340C55C364FC3650B5026ABEDC3F07D812E43D67C3E8AE646F6451C58BBE
                                                                SHA-512:59274D6BACF223C681AA9103FA09CC7EADF6AB96333947C7FB30FE23AA862874CAB94DB482457F3C3C2319F24BF5FDD110AFBE4053EF2A963BF553EAECEA79B7
                                                                Malicious:false
                                                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...6.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.S.o.u.r.c.e.>.$.(.@.%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.p.p.c...d.l.l.,.-.2.0.0.).<./.S.o.u.r.c.e.>..... . . . .<.A.u.t.h.o.r.>.$.(.@.%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.p.p.c...d.l.l.,.-.2.0.0.).<./.A.u.t.h.o.r.>..... . . . .<.V.e.r.s.i.o.n.>.1...0.<./.V.e.r.s.i.o.n.>..... . . . .<.D.e.s.c.r.i.p.t.i.o.n.>.$.(.@.%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.p.p.c...d.l.l.,.-.2.0.1.).<./.D.e.s.c.r.i.p.t.i.o.n.>..... . . . .<.U.R.I.>.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.S.o.f.t.w.a.r.e.P.r.o.t.e.c.t.i.o.n.P.l.a.t.f.o.r.m.\.S.v.c.R.e.s.t.a.r.t.T.a.s.k.<./.U.R.I.>..... . . . .<.S.e.c.u.r.i.t.y.D.e.s.c.r.i.p.t.o.r.>.D.:.P.(.A.;.;.F.A.;.;.;.S.Y.).(.A.;.;.F.A.;.;.;.B.A.).
                                                                File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                Entropy (8bit):7.004827847025262
                                                                TrID:
                                                                • Win64 Executable GUI (202006/5) 92.65%
                                                                • Win64 Executable (generic) (12005/4) 5.51%
                                                                • Generic Win/DOS Executable (2004/3) 0.92%
                                                                • DOS Executable Generic (2002/1) 0.92%
                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                File name:360safe.exe
                                                                File size:26'331'648 bytes
                                                                MD5:da7d87948abd48d5ba7f0449a12baed1
                                                                SHA1:ce1a7523a2333d3bfedeb2ff596cd950e2d73c6d
                                                                SHA256:0452656d33fcd78f19ad3fbb44594fa6b64852a2882353266377cfe3e65ad02f
                                                                SHA512:f46f2560b254b396f9c3d546a596effba9b9ad18ee40e01b3a62640a2a9f04938253a5d8fef63fad9d526c08e2f0152fbb5501a5cbf356623654ed5350fcaf4f
                                                                SSDEEP:393216:Rl7keYu3DWru9NDwj6SGEgCWwgF1oVicOCOlJsv6tWKFdu9CfKFZ2Sa+LipLWAYU:v7iuZqON6a+FAYU
                                                                TLSH:A747AE67B2A608D4E876E0388A579117EFB1F81557B187DB21B496DA2F337E02D3B310
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........A....................................FRj......v.......v.......q.......q.......s.......s.......w.............................
                                                                Icon Hash:00928e8e8686b000
                                                                Entrypoint:0x140b1b8b4
                                                                Entrypoint Section:.text
                                                                Digitally signed:false
                                                                Imagebase:0x140000000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                DLL Characteristics:HIGH_ENTROPY_VA, TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x6746818C [Wed Nov 27 02:18:52 2024 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:6
                                                                OS Version Minor:0
                                                                File Version Major:6
                                                                File Version Minor:0
                                                                Subsystem Version Major:6
                                                                Subsystem Version Minor:0
                                                                Import Hash:beb0eb5afc4aa49a8bfc290f6f650356
                                                                Instruction
                                                                dec eax
                                                                sub esp, 28h
                                                                call 00007FCDF8F6688Ch
                                                                dec eax
                                                                add esp, 28h
                                                                jmp 00007FCDF8F65ACFh
                                                                int3
                                                                int3
                                                                inc eax
                                                                push ebx
                                                                dec eax
                                                                sub esp, 20h
                                                                dec eax
                                                                mov ebx, ecx
                                                                dec eax
                                                                lea ecx, dword ptr [00D19D68h]
                                                                call dword ptr [00383F6Ah]
                                                                and dword ptr [ebx], 00000000h
                                                                dec eax
                                                                lea ecx, dword ptr [00D19D58h]
                                                                call dword ptr [00383F62h]
                                                                dec eax
                                                                lea ecx, dword ptr [00D19D43h]
                                                                dec eax
                                                                add esp, 20h
                                                                pop ebx
                                                                dec eax
                                                                jmp dword ptr [00383F3Fh]
                                                                int3
                                                                int3
                                                                int3
                                                                inc eax
                                                                push ebx
                                                                dec eax
                                                                sub esp, 20h
                                                                dec eax
                                                                mov ebx, ecx
                                                                dec eax
                                                                lea ecx, dword ptr [00D19D2Ch]
                                                                call dword ptr [00383F2Eh]
                                                                mov eax, dword ptr [00CEE29Ch]
                                                                dec eax
                                                                lea ecx, dword ptr [00D19D19h]
                                                                mov edx, dword ptr [00D19D1Bh]
                                                                inc eax
                                                                mov dword ptr [00CEE287h], eax
                                                                mov dword ptr [ebx], eax
                                                                dec eax
                                                                mov eax, dword ptr [00000058h]
                                                                inc ecx
                                                                mov ecx, 00000014h
                                                                dec esp
                                                                mov eax, dword ptr [eax+edx*8]
                                                                mov eax, dword ptr [00CEE26Ch]
                                                                inc ebx
                                                                mov dword ptr [ecx+eax], eax
                                                                call dword ptr [00383EF6h]
                                                                dec eax
                                                                lea ecx, dword ptr [00D19CD7h]
                                                                dec eax
                                                                add esp, 20h
                                                                pop ebx
                                                                dec eax
                                                                jmp dword ptr [00383ED3h]
                                                                int3
                                                                int3
                                                                int3
                                                                inc eax
                                                                push ebx
                                                                dec eax
                                                                sub esp, 20h
                                                                dec eax
                                                                mov ebx, ecx
                                                                dec eax
                                                                lea ecx, dword ptr [00000000h]
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x17b1da00x1f4.rdata
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x19330000xa39c.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x183f0000xa22f4.pdata
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x16bc0300x70.rdata
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x16bc1000x28.rdata
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x16bbef00x140.rdata
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0xe9f0000x20a8.rdata
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x10000xe9d2240xe9d400ccd0fa7028fa261f0a826e028b4a5ddaunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .rdata0xe9f0000x9193640x9194002cb09709b8bfb18804abc41efb15167bunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .data0x17b90000x858100x6a0003a5fe993167ff8619f1e84f60dc3111aFalse0.22242362544221697data3.9810579474128382IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .pdata0x183f0000xa22f40xa2400aaee8d3dea05433af360d32658ad1350False0.49019224287365176data6.800829870815186IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .qtmetad0x18e20000x5360x600bfd0a37e057f358d80d1716d9a9abd7eFalse0.24609375data5.0500249701877475IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                .qtmimed0x18e30000x4ece50x4ee002d32d357ab751ffbbb513570c6ee6986False0.997458770800317gzip compressed data, original size modulo 2^32 07.998000978505572IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                _RDATA0x19320000x300x200fc2f14d81e335ad78fd3a2189af093b9False0.046875data0.24749732431271465IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .rsrc0x19330000xb0000xa400d253f0d6684b864eb73034682b397843False0.8785727896341463data7.709873577338243IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                RT_ICON0x19332f80x86cePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedChineseChina1.000608519269777
                                                                RT_DIALOG0x193b9c80x2cdataChineseChina0.8409090909090909
                                                                RT_DIALOG0x193b9f40x4cdataChineseChina0.8289473684210527
                                                                RT_DIALOG0x193ba400x90dataChineseChina0.6666666666666666
                                                                RT_STRING0x193bad00x3b0dataChineseChina0.3877118644067797
                                                                RT_STRING0x193be800x290dataChineseChina0.3277439024390244
                                                                RT_STRING0x193c1100x3a4dataChineseChina0.3927038626609442
                                                                RT_STRING0x193c4b40x868dataChineseChina0.15427509293680297
                                                                RT_ACCELERATOR0x193cd1c0x70dataChineseChina0.6785714285714286
                                                                RT_RCDATA0x193cd8c0x80dataEnglishUnited States1.0859375
                                                                RT_VERSION0x193ce0c0x320dataChineseChina0.47375
                                                                RT_MANIFEST0x193d12c0x26eASCII text, with CRLF line terminatorsEnglishUnited States0.5176848874598071
                                                                DLLImport
                                                                KERNEL32.dllInitializeCriticalSectionEx, PeekNamedPipe, AreFileApisANSI, LCIDToLocaleName, ExitProcess, VirtualQuery, RtlUnwindEx, ReadConsoleW, ReadConsoleA, SetConsoleMode, GetConsoleMode, GetACP, GetEnvironmentVariableW, GetStdHandle, GetSystemDirectoryA, lstrcatW, lstrcatA, AcquireSRWLockShared, ReleaseSRWLockShared, CreateFileMappingA, lstrlenA, GetModuleHandleA, MapViewOfFileEx, CreateEventA, InitializeSRWLock, GetTempFileNameW, SearchPathW, GetProfileIntW, VerifyVersionInfoW, VerSetConditionMask, GetWindowsDirectoryW, FindResourceExW, lstrcpyW, VirtualProtect, GetUserDefaultUILanguage, SystemTimeToTzSpecificLocalTime, GetFileTime, FileTimeToLocalFileTime, GetVersionExW, GlobalFindAtomW, GlobalDeleteAtom, GlobalFlags, lstrcmpiW, LoadLibraryExW, UnlockFile, LockFile, GlobalAddAtomW, GlobalGetAtomNameW, lstrcmpA, LocalReAlloc, LocalAlloc, GlobalHandle, GlobalReAlloc, MulDiv, GlobalFree, FindResourceW, SizeofResource, LockResource, LoadResource, QueryActCtxW, FindActCtxSectionStringW, DeactivateActCtx, ActivateActCtx, CreateActCtxW, InitializeCriticalSectionAndSpinCount, GetProcessHeap, HeapSize, HeapFree, HeapReAlloc, HeapAlloc, HeapDestroy, SetLastError, OutputDebugStringA, InitializeSListHead, GetSystemTimeAsFileTime, IsDebuggerPresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, SleepConditionVariableSRW, WakeAllConditionVariable, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, LCMapStringEx, DecodePointer, EncodePointer, RaiseException, GetLocaleInfoEx, FormatMessageA, VirtualFree, VirtualAlloc, CreateMutexW, ReleaseMutex, GetExitCodeProcess, GetUserGeoID, GetGeoInfoW, GetTimeZoneInformation, GetModuleHandleExW, FreeLibrary, FindNextFileW, FindFirstFileExW, FindNextChangeNotification, FindFirstChangeNotificationW, FindCloseChangeNotification, MultiByteToWideChar, CompareStringW, RegisterWaitForSingleObject, UnregisterWaitEx, SetFilePointerEx, SetEndOfFile, GetFileType, FlushFileBuffers, GetFileInformationByHandleEx, SystemTimeToFileTime, FileTimeToSystemTime, TzSpecificLocalTimeToSystemTime, MoveFileExW, MoveFileW, CopyFileW, DeviceIoControl, SetErrorMode, GetVolumePathNamesForVolumeNameW, GetTempPathW, SetFileTime, RemoveDirectoryW, GetLogicalDrives, lstrcmpW, GetLastError, GetCurrentThreadId, GetModuleHandleW, GetProcAddress, LocalFree, FormatMessageW, WTSGetActiveConsoleSessionId, ExpandEnvironmentStringsW, CloseHandle, CreateProcessW, CheckRemoteDebuggerPresent, OpenProcess, GlobalAlloc, GlobalUnlock, GlobalLock, GetLocaleInfoW, LoadLibraryW, LoadLibraryA, GlobalSize, GetCurrentProcessId, GetUserDefaultLangID, CreateFileA, CreateFileW, GetFileSizeEx, ReadFile, SetFilePointer, WriteFile, CreateFileMappingW, MapViewOfFile, UnmapViewOfFile, WideCharToMultiByte, GetLongPathNameW, GetVolumeInformationW, GetDriveTypeW, GetConsoleWindow, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, GetFileSize, CompareStringEx, GetCommandLineW, OutputDebugStringW, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, GetSystemTime, GetLocalTime, SetEvent, WaitForSingleObjectEx, CreateEventW, GetSystemDirectoryW, DuplicateHandle, WaitForSingleObject, Sleep, WaitForMultipleObjects, SwitchToThread, CreateThread, GetCurrentThread, SetThreadPriority, GetThreadPriority, TerminateThread, ResumeThread, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetSystemInfo, ResetEvent, GetDateFormatW, GetTimeFormatW, GetCurrencyFormatW, GetUserDefaultLCID, GetUserPreferredUILanguages, GetFileAttributesExW, QueryPerformanceCounter, QueryPerformanceFrequency, GetTickCount64, GetStartupInfoW, GetModuleFileNameW, GetCurrentDirectoryW, CreateDirectoryW, DeleteFileW, FindClose, FindFirstFileW, GetFileAttributesW, GetFileInformationByHandle, GetFullPathNameW
                                                                WTSAPI32.dllWTSFreeMemory, WTSQuerySessionInformationW
                                                                UxTheme.dllDrawThemeBackground, DrawThemeParentBackground, DrawThemeText, OpenThemeData, GetThemePartSize, GetThemeColor, GetThemeInt, GetThemeEnumValue, GetThemeMargins, GetThemePropertyOrigin, GetWindowTheme, CloseThemeData, GetThemeBackgroundRegion, IsThemeBackgroundPartiallyTransparent, GetThemeBool, SetWindowTheme, IsThemeActive, IsAppThemed, GetCurrentThemeName, GetThemeSysColor, GetThemeTransitionDuration
                                                                dwmapi.dllDwmIsCompositionEnabled, DwmGetWindowAttribute, DwmEnableBlurBehindWindow, DwmSetWindowAttribute
                                                                IMM32.dllImmGetDefaultIMEWnd, ImmGetVirtualKey, ImmSetCandidateWindow, ImmSetCompositionWindow, ImmNotifyIME, ImmGetOpenStatus, ImmGetCompositionStringW, ImmAssociateContextEx, ImmAssociateContext, ImmReleaseContext, ImmGetContext
                                                                USERENV.dllGetUserProfileDirectoryW
                                                                VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                                NETAPI32.dllNetApiBufferFree, NetShareEnum
                                                                WS2_32.dllgetpeername, WSAAsyncSelect, getservbyport, WSACleanup, WSAStartup, ntohs, WSACloseEvent, getsockname, getsockopt, htonl, htons, WSAGetLastError, send, setsockopt, shutdown, WSASetLastError, WSAIoctl, WSAStringToAddressA, getaddrinfo, freeaddrinfo, inet_ntop, bind, gethostbyname, gethostbyaddr, inet_ntoa, socket, connect, recv, __WSAFDIsSet, closesocket, select, ioctlsocket, inet_addr, getservbyname, WSACreateEvent, WSAEnumNetworkEvents, WSAEventSelect, WSAResetEvent, WSAWaitForMultipleEvents
                                                                WINMM.dlltimeGetTime, timeBeginPeriod, timeGetDevCaps, timeEndPeriod, PlaySoundW, timeSetEvent, timeKillEvent
                                                                MSIMG32.dllAlphaBlend, TransparentBlt
                                                                CRYPT32.dllCertEnumCertificatesInStore, CertFindCertificateInStore, CertDuplicateCertificateContext, CertFreeCertificateContext, CertCloseStore, CertOpenStore, CertGetCertificateContextProperty
                                                                msvcrt.dll_errno, acosf, isxdigit, strcpy_s, isspace, acos, sinf, cosf, isdigit, floorf, log10, atan2, rand, log, exp, floor, bsearch, atoi, calloc, getenv_s, ceil, sqrt, ftell, fseek, fread, fopen, fclose, getenv, strtol, qsort, strncpy, strncmp, realloc, pow, wcsncmp, tan, sin, cos, atan, strcmp, toupper, fflush, free, malloc, _setjmp, strerror, _local_unwind, __DestructExceptionObject, _amsg_exit, wcsstr, wcschr, __C_specific_handler, strchr, memchr, longjmp, strrchr, _CxxThrowException, strstr, memmove, memcmp, wcsrchr, memset, memcpy, _fileno, _close, _open_osfhandle, _getdrive, fgets, _fseeki64, _read, _write, tolower, __pctype_func, isupper, ___lc_codepage_func, _wcsdup, islower, strcspn, __strncnt, ___mb_cur_max_func, abort, wcsnlen, _callnewh, _initterm, _initterm_e, _set_fmode, wcsncpy_s, wcscpy_s, wcslen, strlen, ldiv, wcscspn, labs, _wtoi, _expand, _msize, wcscat_s, wcscmp, __doserrno, _wcsicmp, wcspbrk, _wmakepath_s, _wsplitpath_s, _wcsupr_s, iswspace, wcscoll, iswalnum, iswalpha, iswdigit, iswprint, towupper, towlower, _wtol, abs, _wcsicoll, _resetstkoflw, _wcslwr_s, clock, _beginthread, _endthread, ferror, strnlen, _time64, _localtime64, _gmtime64_s, strcat_s, strerror_s, setvbuf, _setmode, strspn, _wfopen, raise, signal, wcstol, _mbtowc_l, wctomb_s, _lock, _unlock, _iob, iswctype, feof, ceilf, tanf, strtoul, _hypotf, _localtime64_s, strncpy_s, _wgetenv_s, fputs, _mktime64, _tzset, _beginthreadex, _endthreadex, _lseeki64, asin, rand_s, _waccess, _wchmod, _get_osfhandle, _clearfp, _strtoui64, _wcstoui64, _isatty, _wfullpath, _commode, ?_set_new_mode@@YAHH@Z, _ismbblead, __set_app_type, _XcptFilter, __getmainargs, ___lc_handle_func, _hypot, fgetpos, ?terminate@@YAXXZ, _tzname, _timezone, __argv, __argc, _acmdln, __CxxFrameHandler3
                                                                gdiplus.dllGdipGetImageGraphicsContext, GdipGetImageWidth, GdipGetImageHeight, GdipGetImagePixelFormat, GdipGetImagePalette, GdipGetImagePaletteSize, GdipCreateBitmapFromStream, GdipDisposeImage, GdipCreateBitmapFromScan0, GdipBitmapLockBits, GdipBitmapUnlockBits, GdipDeleteGraphics, GdipDrawImageI, GdipCreateBitmapFromHBITMAP, GdipCreateFromHDC, GdipSetInterpolationMode, GdipDrawImageRectI, GdipCloneImage, GdiplusStartup, GdipFree, GdiplusShutdown, GdipAlloc
                                                                OLEACC.dllLresultFromObject, AccessibleObjectFromWindow, CreateStdAccessibleObject
                                                                bcrypt.dllBCryptGenRandom
                                                                USER32.dllGetWindowRgn, DispatchMessageA, SubtractRect, TranslateMDISysAccel, DefMDIChildProcW, DefFrameProcW, IsClipboardFormatAvailable, CharUpperBuffW, SetMenuDefaultItem, LockWindowUpdate, SetRect, CopyAcceleratorTableW, DestroyAcceleratorTable, CreateAcceleratorTableW, ToUnicodeEx, MapVirtualKeyExW, IsCharLowerW, WaitMessage, PostThreadMessageW, GetComboBoxInfo, ReuseDDElParam, UnpackDDElParam, InsertMenuItemW, TranslateAcceleratorW, PeekMessageA, MsgWaitForMultipleObjects, LoadAcceleratorsW, UnionRect, DrawIcon, CopyIcon, BringWindowToTop, DrawFrameControl, DrawEdge, SetClassLongPtrW, DrawStateW, GetProcessWindowStation, GetUserObjectInformationW, FrameRect, EmptyClipboard, SetClipboardData, CloseClipboard, OpenClipboard, LoadMenuW, GetKeyNameTextW, GetMenuDefaultItem, NotifyWinEvent, InvertRect, EnableScrollBar, IsRectEmpty, DrawFocusRect, GetNextDlgGroupItem, IntersectRect, DeleteMenu, ShowOwnedPopups, MapDialogRect, GetNextDlgTabItem, EndDialog, CreateDialogIndirectParamW, OffsetRect, SetRectEmpty, SendDlgItemMessageA, CopyImage, InflateRect, FillRect, GetWindowDC, TabbedTextOutW, GrayStringW, DrawTextExW, DrawTextW, PostQuitMessage, IsDialogMessageW, CheckDlgButton, GetSystemMetrics, SystemParametersInfoW, DefWindowProcW, DestroyWindow, GetDC, ReleaseDC, GetSysColor, GetDesktopWindow, GetDoubleClickTime, IsWindow, MessageBeep, GetCaretBlinkTime, UpdateLayeredWindowIndirect, SendMessageW, PostMessageW, AttachThreadInput, CreateWindowExW, IsChild, ShowWindow, UpdateLayeredWindow, SetLayeredWindowAttributes, FlashWindowEx, MoveWindow, SetWindowPos, GetWindowPlacement, SetWindowPlacement, IsWindowVisible, IsIconic, SetFocus, RegisterTouchWindow, UnregisterTouchWindow, IsTouchWindow, GetCapture, SetCapture, ReleaseCapture, GetMenu, GetSystemMenu, EnableMenuItem, GetForegroundWindow, SetForegroundWindow, BeginPaint, EndPaint, GetUpdateRect, SetWindowRgn, InvalidateRect, SetWindowTextW, GetClientRect, GetWindowRect, AdjustWindowRectEx, SetCursor, ClientToScreen, ScreenToClient, GetWindowLongW, SetWindowLongW, GetWindowLongPtrW, SetWindowLongPtrW, GetParent, SetParent, GetWindowThreadProcessId, GetWindow, DestroyCursor, DestroyIcon, MonitorFromPoint, GetAncestor, GetKeyboardLayoutList, RegisterPowerSettingNotification, UnregisterPowerSettingNotification, UnregisterClassW, GetClassInfoW, RegisterClassExW, GetFocus, GetCursorPos, WindowFromPoint, ChildWindowFromPointEx, GetSysColorBrush, LoadImageW, SetMenu, DrawMenuBar, CreateMenu, CreatePopupMenu, DestroyMenu, InsertMenuW, AppendMenuW, ModifyMenuW, RemoveMenu, TrackPopupMenu, GetMenuItemInfoW, SetMenuItemInfoW, MonitorFromWindow, GetMonitorInfoW, EnumDisplayMonitors, LoadIconW, IsHungAppWindow, SetClipboardViewer, ChangeClipboardChain, RegisterClipboardFormatW, GetKeyboardLayout, RegisterWindowMessageW, IsWindowEnabled, CreateCaret, DestroyCaret, HideCaret, ShowCaret, SetCaretPos, FindWindowA, PeekMessageW, IsZoomed, GetKeyState, GetKeyboardState, ToAscii, ToUnicode, MapVirtualKeyW, TrackPopupMenuEx, RegisterClassW, EnumDisplayDevicesW, SetCursorPos, GetCursor, LoadCursorW, CreateCursor, CreateIconIndirect, GetIconInfo, GetCursorInfo, GetClipboardFormatNameW, TrackMouseEvent, GetMessageExtraInfo, GetAsyncKeyState, GetTouchInputInfo, CloseTouchInputHandle, GetWindowTextW, EnumWindows, RealGetWindowClassW, ChangeWindowMessageFilterEx, MessageBoxW, DrawIconEx, TranslateMessage, DispatchMessageW, GetQueueStatus, MsgWaitForMultipleObjectsEx, SetTimer, KillTimer, CharNextExA, RegisterDeviceNotificationW, UnregisterDeviceNotification, GetMenuStringW, GetMenuState, GetSubMenu, GetMenuItemID, GetMenuItemCount, UnhookWindowsHookEx, EnableWindow, GetLastActivePopup, GetMessageW, GetActiveWindow, ValidateRect, SetWindowsHookExW, CallNextHookEx, GetWindowTextLengthW, CharUpperW, GetDlgCtrlID, PtInRect, GetClassNameW, RealChildWindowFromPoint, CheckMenuItem, SetMenuItemBitmaps, GetMenuCheckMarkDimensions, LoadBitmapW, GetMessagePos, GetMessageTime, CallWindowProcW, GetClassInfoExW, IsMenu, BeginDeferWindowPos, DeferWindowPos, EndDeferWindowPos, GetDlgItem, UpdateWindow, SetActiveWindow, RedrawWindow, ScrollWindow, SetScrollPos, GetScrollPos, SetScrollRange, GetScrollRange, ShowScrollBar, SetPropW, GetPropW, RemovePropW, MapWindowPoints, CopyRect, EqualRect, GetClassLongPtrW, GetTopWindow, SetScrollInfo, GetScrollInfo, WinHelpW
                                                                GDI32.dllOffsetRgn, BitBlt, GdiFlush, CreateDIBSection, SelectObject, GetDeviceCaps, GetViewportOrgEx, GetWindowOrgEx, SetPixelV, SetPaletteEntries, ExtFloodFill, PtInRegion, GetBoundsRect, FrameRgn, FillRgn, RoundRect, GetRgnBox, Rectangle, LPtoDP, CreateRoundRectRgn, Polyline, Polygon, CreatePolygonRgn, GetTextColor, Ellipse, CreateEllipticRgn, SetDIBColorTable, StretchBlt, SetPixel, GetTextCharsetInfo, EnumFontFamiliesW, CreateDIBitmap, GetBkColor, RealizePalette, SelectClipRgn, GetRegionData, DeleteObject, DeleteDC, CreateRectRgn, CreateCompatibleDC, CombineRgn, SetLayout, GetSystemPaletteEntries, GetPaletteEntries, GetNearestPaletteIndex, CreatePalette, DPtoLP, SetRectRgn, PatBlt, CreateRectRgnIndirect, ScaleWindowExtEx, ScaleViewportExtEx, OffsetWindowOrgEx, OffsetViewportOrgEx, SetWindowOrgEx, SetWindowExtEx, SetViewportOrgEx, SetViewportExtEx, TextOutW, MoveToEx, SetROP2, SetPolyFillMode, GetLayout, SetMapMode, SelectPalette, ExtSelectClipRgn, SaveDC, RestoreDC, RectVisible, PtVisible, LineTo, IntersectClipRect, GetWindowExtEx, GetViewportExtEx, GetPixel, GetObjectType, GetClipBox, ExcludeClipRect, Escape, CreateSolidBrush, CreatePatternBrush, CreatePen, CreateHatchBrush, SetBkColor, CopyMetaFileW, GetDIBits, ExtTextOutW, SetWorldTransform, SetTextAlign, SetTextColor, SetGraphicsMode, SetBkMode, GetCharABCWidthsI, GetTextExtentPoint32W, GetOutlineTextMetricsW, GetGlyphOutlineW, GetCharABCWidthsFloatW, GetCharABCWidthsW, GetTextFaceW, GetTextMetricsW, RemoveFontMemResourceEx, AddFontMemResourceEx, RemoveFontResourceExW, AddFontResourceExW, GetStockObject, GetFontData, EnumFontFamiliesExW, CreateFontIndirectW, GetObjectW, GetBitmapBits, SwapBuffers, GetPixelFormat, DescribePixelFormat, SetPixelFormat, ChoosePixelFormat, CreateBitmap, CreateDCW, CreateCompatibleBitmap
                                                                WINSPOOL.DRVOpenPrinterW, ClosePrinter, DocumentPropertiesW
                                                                ADVAPI32.dllRegQueryValueExW, RegCreateKeyExW, CryptEnumProvidersW, CryptSignHashW, CryptDestroyHash, CryptCreateHash, CryptDecrypt, CryptExportKey, CryptGetUserKey, CryptGetProvParam, CryptSetHashParam, CryptDestroyKey, CryptReleaseContext, CryptAcquireContextW, ReportEventW, RegisterEventSourceW, DeregisterEventSource, BuildTrusteeWithSidW, GetNamedSecurityInfoW, GetEffectiveRightsFromAclW, LookupAccountSidW, MapGenericMask, GetLengthSid, RegDeleteKeyW, RegDeleteValueW, RegEnumKeyExW, RegEnumValueW, RegFlushKey, RegQueryInfoKeyW, RegCloseKey, RegOpenKeyExW, RegSetValueExW, SystemFunction036, GetSidSubAuthority, GetSidSubAuthorityCount, FreeSid, DuplicateToken, CopySid, AllocateAndInitializeSid, AccessCheck, OpenProcessToken, GetTokenInformation
                                                                SHELL32.dllSHGetStockIconInfo, ShellExecuteW, SHCreateItemFromIDList, SHCreateItemFromParsingName, SHGetMalloc, SHGetPathFromIDListW, SHGetKnownFolderIDList, SHBrowseForFolderW, Shell_NotifyIconW, Shell_NotifyIconGetRect, CommandLineToArgvW, SHGetKnownFolderPath, SHAppBarMessage, DragFinish, DragQueryFileW, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFileInfoW
                                                                ole32.dllIsAccelerator, OleTranslateAccelerator, OleDestroyMenuDescriptor, OleCreateMenuDescriptor, OleLockRunning, CreateStreamOnHGlobal, CoDisconnectObject, OleDuplicateData, CoTaskMemAlloc, StringFromGUID2, CoCreateGuid, CoGetMalloc, ReleaseStgMedium, CoTaskMemFree, DoDragDrop, CoCreateInstance, OleIsCurrentClipboard, OleFlushClipboard, OleGetClipboard, OleSetClipboard, CoInitialize, CoInitializeEx, CoUninitialize, OleUninitialize, OleInitialize, RevokeDragDrop, RegisterDragDrop, CoLockObjectExternal
                                                                OLEAUT32.dllSysFreeString, SafeArrayPutElement, SafeArrayCreateVector, SysAllocString, LoadTypeLib, SysAllocStringLen, SysStringLen, SystemTimeToVariantTime, VariantTimeToSystemTime, VariantInit, VarBstrFromDate, VariantChangeType, VariantCopy, VariantClear
                                                                SHLWAPI.dllStrFormatKBSizeW, PathFindFileNameW, PathIsUNCW, PathStripToRootW, StrChrA, PathRemoveFileSpecW, PathFindExtensionW
                                                                Language of compilation systemCountry where language is spokenMap
                                                                ChineseChina
                                                                EnglishUnited States
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Nov 29, 2024 14:50:06.444077969 CET4969980192.168.2.7103.235.47.188
                                                                Nov 29, 2024 14:50:06.564030886 CET8049699103.235.47.188192.168.2.7
                                                                Nov 29, 2024 14:50:06.568030119 CET4969980192.168.2.7103.235.47.188
                                                                Nov 29, 2024 14:50:08.937055111 CET4970380192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:50:09.057019949 CET8049703192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:50:09.057100058 CET4970380192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:50:09.057274103 CET4970380192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:50:09.177242994 CET8049703192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:50:09.192728996 CET4969980192.168.2.7103.235.47.188
                                                                Nov 29, 2024 14:50:10.454047918 CET4970480192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:50:10.555140018 CET8049703192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:50:10.574692965 CET8049704192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:50:10.574768066 CET4970480192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:50:10.574889898 CET4970480192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:50:10.598282099 CET4970380192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:50:10.694797993 CET8049704192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:50:10.711946964 CET4970380192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:50:10.832031965 CET8049703192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:50:12.133790970 CET8049704192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:50:12.176438093 CET4970480192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:50:12.268671989 CET4970480192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:50:12.388814926 CET8049704192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:50:20.832731009 CET4970380192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:50:20.952775002 CET8049703192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:50:22.395237923 CET4970480192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:50:22.515630960 CET8049704192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:50:30.957875967 CET4970380192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:50:31.078047037 CET8049703192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:50:32.520286083 CET4970480192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:50:32.640237093 CET8049704192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:50:41.082860947 CET4970380192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:50:41.202830076 CET8049703192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:50:42.645347118 CET4970480192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:50:42.765362024 CET8049704192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:50:51.207916021 CET4970380192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:50:51.328068972 CET8049703192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:50:52.770536900 CET4970480192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:50:52.890461922 CET8049704192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:51:01.333007097 CET4970380192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:51:01.452893972 CET8049703192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:51:02.895633936 CET4970480192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:51:03.015774012 CET8049704192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:51:11.458192110 CET4970380192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:51:11.578335047 CET8049703192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:51:11.947010994 CET4970380192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:51:12.067028999 CET8049703192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:51:13.020615101 CET4970480192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:51:13.140686989 CET8049704192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:51:13.690711975 CET4970480192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:51:13.810817957 CET8049704192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:51:22.067698956 CET4970380192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:51:22.187731028 CET8049703192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:51:23.817509890 CET4970480192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:51:23.937871933 CET8049704192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:51:32.192568064 CET4970380192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:51:32.312496901 CET8049703192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:51:33.942698002 CET4970480192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:51:34.062705040 CET8049704192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:51:42.317642927 CET4970380192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:51:42.534537077 CET8049703192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:51:44.067637920 CET4970480192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:51:44.187558889 CET8049704192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:51:52.536449909 CET4970380192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:51:52.656661987 CET8049703192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:51:54.192708969 CET4970480192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:51:54.312752962 CET8049704192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:52:02.661621094 CET4970380192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:52:02.781656981 CET8049703192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:52:04.317986965 CET4970480192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:52:04.439369917 CET8049704192.197.113.45192.168.2.7
                                                                Nov 29, 2024 14:52:10.849457026 CET4970380192.168.2.7192.197.113.45
                                                                Nov 29, 2024 14:52:10.969443083 CET8049703192.197.113.45192.168.2.7
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Nov 29, 2024 14:50:06.299245119 CET6455753192.168.2.71.1.1.1
                                                                Nov 29, 2024 14:50:06.439141035 CET53645571.1.1.1192.168.2.7
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Nov 29, 2024 14:50:06.299245119 CET192.168.2.71.1.1.10xfbf7Standard query (0)www.baidu.comA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Nov 29, 2024 14:50:06.439141035 CET1.1.1.1192.168.2.70xfbf7No error (0)www.baidu.comwww.a.shifen.comCNAME (Canonical name)IN (0x0001)false
                                                                Nov 29, 2024 14:50:06.439141035 CET1.1.1.1192.168.2.70xfbf7No error (0)www.a.shifen.comwww.wshifen.comCNAME (Canonical name)IN (0x0001)false
                                                                Nov 29, 2024 14:50:06.439141035 CET1.1.1.1192.168.2.70xfbf7No error (0)www.wshifen.com103.235.47.188A (IP address)IN (0x0001)false
                                                                Nov 29, 2024 14:50:06.439141035 CET1.1.1.1192.168.2.70xfbf7No error (0)www.wshifen.com103.235.46.96A (IP address)IN (0x0001)false
                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                0192.168.2.749703192.197.113.45803752C:\Windows\System32\svchost.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 29, 2024 14:50:09.057274103 CET56OUTData Raw: 0d 10 25 13 01 29 02 0b 26 18 01 2b 16 22 2d 19 02 07 1c 19 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 1e 1a 3d 38
                                                                Data Ascii: %)&+"-::::::::::::::::::::::::::::::::=8
                                                                Nov 29, 2024 14:50:10.555140018 CET85INData Raw: 04 08 05 02 0a 2a 12 09 16 20 0e 03 18 07 2d 2d 16 05 09 07 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3b 3a 3a 3a 5e 3a 3a 3a 27 3a 3a 3a 3a 3a 3a 3a 1e 1a 3d 38 78 9c 63 b2 12 b1 e2 b3 e2 01 92 dc 56 1c 56 9c 40 9a 03 08 99 ac a8 09 00 b5
                                                                Data Ascii: * --::::::::::::::::;:::^:::':::::::=8xcVV@w
                                                                Nov 29, 2024 14:50:10.711946964 CET756OUTData Raw: 04 08 05 02 0a 2a 12 09 16 20 0e 03 18 07 2d 2d 16 05 09 07 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3b 3a 3a 3a 10 1b 3a 3a 86 38 3a 3a 3a 3a 3a 3a 1e 1a 3d 38 78 9c ed 57 dd 6b 1a 41 10 2f e6 c5 fa 91 e6 c1 87 70 94 52 42 29 a5 b4 7d ea
                                                                Data Ascii: * --::::::::::::::::;:::::8::::::=8xWkA/pRB)}$P<1'x*iRXH(]f6UE1ag,H#S8@VaBl#_Oumi|Ep023<q]V`F9NiE}),uw88
                                                                Nov 29, 2024 14:50:20.832731009 CET6OUTData Raw: 00
                                                                Data Ascii:
                                                                Nov 29, 2024 14:50:30.957875967 CET6OUTData Raw: 00
                                                                Data Ascii:
                                                                Nov 29, 2024 14:50:41.082860947 CET6OUTData Raw: 00
                                                                Data Ascii:
                                                                Nov 29, 2024 14:50:51.207916021 CET6OUTData Raw: 00
                                                                Data Ascii:
                                                                Nov 29, 2024 14:51:01.333007097 CET6OUTData Raw: 00
                                                                Data Ascii:
                                                                Nov 29, 2024 14:51:11.458192110 CET6OUTData Raw: 00
                                                                Data Ascii:
                                                                Nov 29, 2024 14:51:11.947010994 CET576OUTData Raw: 2f 0d 1b 24 1f 11 06 15 19 28 0f 22 23 01 1b 15 1f 28 17 10 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 32 1a 3a 3a 72 23 3a 3a 32 38 3a 3a 3a 3a 3a 3a 1e 1a 3d 38 78 9c ed 59 4d 4b c3 40 10 05 4f 82 17 0f 3d 94 22 22 45 44 44 c5 83 a7 87 a7
                                                                Data Ascii: /$("#(::::::::::::::::2::r#::28::::::=8xYMK@O=""EDDiJPk*R7AL[b)}<=8Zgu|'@;<.|Zbor#e@R.rH)N3/?G65-c<HauR


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                1192.168.2.749704192.197.113.45802352C:\Windows\System32\svchost.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 29, 2024 14:50:10.574889898 CET56OUTData Raw: 00 1c 1d 23 0f 20 0a 08 16 24 02 07 2d 21 1d 17 00 2c 17 12 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 1e 1a 3d 38
                                                                Data Ascii: # $-!,::::::::::::::::::::::::::::::::=8
                                                                Nov 29, 2024 14:50:12.133790970 CET85INData Raw: 2b 15 2d 2d 00 0d 1b 09 01 2c 0a 0f 07 05 0d 1b 14 22 00 1b 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3b 3a 3a 3a 5e 3a 3a 3a 27 3a 3a 3a 3a 3a 3a 3a 1e 1a 3d 38 78 9c 63 b2 12 b1 e2 b3 e2 01 92 dc 56 1c 56 9c 40 9a 03 08 99 ac a8 09 00 b5
                                                                Data Ascii: +--,"::::::::::::::::;:::^:::':::::::=8xcVV@w
                                                                Nov 29, 2024 14:50:12.268671989 CET754OUTData Raw: 2b 15 2d 2d 00 0d 1b 09 01 2c 0a 0f 07 05 0d 1b 14 22 00 1b 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3b 3a 3a 3a 34 1b 3a 3a 80 38 3a 3a 3a 3a 3a 3a 1e 1a 3d 38 78 9c ed 57 4b 6b 1b 41 0c 2e ce c5 f5 23 cd c1 87 b0 94 52 42 29 a5 b4 3d f5
                                                                Data Ascii: +--,"::::::::::::::::;:::4::8::::::=8xWKkA.#RB)=JewqG6iq!!&5uFI#iF<"<LejXM)%?JF[)rjO>.KX'QAULKFu6vXm85H#1>F
                                                                Nov 29, 2024 14:50:22.395237923 CET6OUTData Raw: 00
                                                                Data Ascii:
                                                                Nov 29, 2024 14:50:32.520286083 CET6OUTData Raw: 00
                                                                Data Ascii:
                                                                Nov 29, 2024 14:50:42.645347118 CET6OUTData Raw: 00
                                                                Data Ascii:
                                                                Nov 29, 2024 14:50:52.770536900 CET6OUTData Raw: 00
                                                                Data Ascii:
                                                                Nov 29, 2024 14:51:02.895633936 CET6OUTData Raw: 00
                                                                Data Ascii:
                                                                Nov 29, 2024 14:51:13.020615101 CET6OUTData Raw: 00
                                                                Data Ascii:
                                                                Nov 29, 2024 14:51:13.690711975 CET576OUTData Raw: 21 0a 28 27 20 22 17 0a 08 00 14 2a 05 0a 0b 19 13 2e 01 29 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 32 1a 3a 3a 72 23 3a 3a 32 38 3a 3a 3a 3a 3a 3a 1e 1a 3d 38 78 9c ed 59 4d 4b c3 40 10 05 4f 82 17 0f 3d 94 22 22 45 44 44 c5 83 a7 87 a7
                                                                Data Ascii: !(' "*.)::::::::::::::::2::r#::28::::::=8xYMK@O=""EDDiJPk*R7AL[b)}<=8Zgu|'@;<.|Zbor#e@R.rH)N3/?G65-c<HauR


                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:08:50:05
                                                                Start date:29/11/2024
                                                                Path:C:\Users\user\Desktop\360safe.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:"C:\Users\user\Desktop\360safe.exe"
                                                                Imagebase:0x140000000
                                                                File size:26'331'648 bytes
                                                                MD5 hash:DA7D87948ABD48D5BA7F0449A12BAED1
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:3
                                                                Start time:08:50:06
                                                                Start date:29/11/2024
                                                                Path:C:\Windows\System32\svchost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                                                                Imagebase:0x7ff7b4ee0000
                                                                File size:55'320 bytes
                                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:false

                                                                Target ID:6
                                                                Start time:08:50:07
                                                                Start date:29/11/2024
                                                                Path:C:\Windows\System32\svchost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\svchost.exe -k netsvcs
                                                                Imagebase:0x7ff7b4ee0000
                                                                File size:55'320 bytes
                                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:false

                                                                Target ID:10
                                                                Start time:08:50:07
                                                                Start date:29/11/2024
                                                                Path:C:\Program Files\Windows Mail\HoopCity.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:"C:\Program Files\Windows Mail\HoopCity.exe"
                                                                Imagebase:0x140000000
                                                                File size:652'760 bytes
                                                                MD5 hash:EF8BDE64E1943C51E2DE2E5CB0182DEB
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Antivirus matches:
                                                                • Detection: 0%, ReversingLabs
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:11
                                                                Start time:08:50:08
                                                                Start date:29/11/2024
                                                                Path:C:\Windows\System32\dllhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}
                                                                Imagebase:0x7ff7d8730000
                                                                File size:21'312 bytes
                                                                MD5 hash:08EB78E5BE019DF044C26B14703BD1FA
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:moderate
                                                                Has exited:false

                                                                Target ID:12
                                                                Start time:08:50:08
                                                                Start date:29/11/2024
                                                                Path:C:\Windows\System32\svchost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\svchost.exe -k netsvcs
                                                                Imagebase:0x7ff7b4ee0000
                                                                File size:55'320 bytes
                                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:false

                                                                Target ID:13
                                                                Start time:08:50:09
                                                                Start date:29/11/2024
                                                                Path:C:\Windows\System32\dllhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}
                                                                Imagebase:0x7ff7d8730000
                                                                File size:21'312 bytes
                                                                MD5 hash:08EB78E5BE019DF044C26B14703BD1FA
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:moderate
                                                                Has exited:false

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:3.1%
                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                  Signature Coverage:33.9%
                                                                  Total number of Nodes:561
                                                                  Total number of Limit Nodes:4
                                                                  execution_graph 4144 18000dbe8 4145 18000dbf1 4144->4145 4159 18000d9f0 4144->4159 4146 18000dc06 strtol 4145->4146 4147 18000dbf9 _errno 4145->4147 4148 18000dc38 _errno 4146->4148 4146->4159 4147->4146 4148->4159 4149 18000e00f free 4150 18000e01d 4149->4150 4155 18000cb60 8 API calls 4150->4155 4151 18000dde8 4151->4149 4152 18000dfbd 4151->4152 4153 18000de32 free 4151->4153 4154 18000dfe7 4151->4154 4156 18000de07 4151->4156 4152->4149 4153->4150 4154->4152 4157 18000dff1 free 4154->4157 4158 18000e03c 4155->4158 4156->4149 4156->4152 4156->4153 4157->4150 4159->4151 4161 18000f680 4159->4161 4162 18000f689 4161->4162 4163 18000f6a5 4162->4163 4166 18000f6d0 IsProcessorFeaturePresent 4162->4166 4163->4151 4167 18000f705 4166->4167 4168 18000f716 memset RtlCaptureContext RtlLookupFunctionEntry 4167->4168 4169 18000f7c8 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 4168->4169 4170 18000f78f RtlVirtualUnwind 4168->4170 4171 18000f830 GetCurrentProcess TerminateProcess 4169->4171 4172 18000f822 4169->4172 4170->4169 4173 18000cb60 8 API calls 4171->4173 4172->4171 4174 18000f6c5 4173->4174 4463 18000dce8 4464 18000dced 4463->4464 4478 18000d9f0 4463->4478 4465 18000dd02 strtol 4464->4465 4466 18000dcf5 _errno 4464->4466 4467 18000dd34 _errno 4465->4467 4465->4478 4466->4465 4467->4478 4468 18000dde8 4469 18000e00f free 4468->4469 4471 18000dfbd 4468->4471 4472 18000de32 free 4468->4472 4473 18000dfe7 4468->4473 4475 18000de07 4468->4475 4470 18000e01d 4469->4470 4474 18000cb60 8 API calls 4470->4474 4471->4469 4472->4470 4473->4471 4476 18000dff1 free 4473->4476 4477 18000e03c 4474->4477 4475->4469 4475->4471 4475->4472 4476->4470 4478->4468 4479 18000f680 18 API calls 4478->4479 4479->4468 4544 180003169 RpcRaiseException 4545 180003153 4544->4545 4626 18000da6d 4627 18000da7f 4626->4627 4628 18000db04 _errno 4627->4628 4642 18000d9f0 4627->4642 4629 18000db14 _errno 4628->4629 4630 18000f680 18 API calls 4628->4630 4631 18000f680 18 API calls 4629->4631 4630->4629 4631->4642 4632 18000e00f free 4633 18000e01d 4632->4633 4638 18000cb60 8 API calls 4633->4638 4634 18000dde8 4634->4632 4635 18000dfbd 4634->4635 4636 18000de32 free 4634->4636 4637 18000dfe7 4634->4637 4639 18000de07 4634->4639 4635->4632 4636->4633 4637->4635 4640 18000dff1 free 4637->4640 4641 18000e03c 4638->4641 4639->4632 4639->4635 4639->4636 4640->4633 4642->4634 4643 18000f680 18 API calls 4642->4643 4643->4634 4607 1800109f0 GetModuleHandleW 4608 180010a06 GetProcAddress 4607->4608 4609 180010a20 4607->4609 4608->4609 4014 1800080f2 VirtualAllocEx WriteProcessMemory 4015 180008273 memset RtlCopyMemory NtAlpcConnectPort 4014->4015 4558 18000dd73 4559 18000de45 4558->4559 4560 18000dd7c 4558->4560 4562 18000db14 _errno 4559->4562 4567 18000d9f0 4559->4567 4560->4567 4576 18000e250 4560->4576 4563 18000f680 18 API calls 4562->4563 4563->4567 4564 18000de7b 4566 18000cb60 8 API calls 4564->4566 4565 18000e00f free 4565->4564 4569 18000e03c 4566->4569 4567->4564 4568 18000dde8 4567->4568 4575 18000f680 18 API calls 4567->4575 4568->4565 4570 18000de32 free 4568->4570 4571 18000dfbd 4568->4571 4572 18000de07 4568->4572 4573 18000dfe7 4568->4573 4570->4564 4571->4565 4572->4565 4572->4570 4572->4571 4573->4571 4574 18000dff1 free 4573->4574 4574->4564 4575->4568 4577 18000e27a 4576->4577 4578 18000cb60 8 API calls 4577->4578 4579 18000e92a 4578->4579 4579->4567 4670 180012ef4 __scrt_dllmain_exception_filter 4175 1800103f6 4178 18000fee0 4175->4178 4192 180010e00 4178->4192 4182 18000ff6e 4183 18000ff6a 4183->4182 4184 18000ff99 RtlCopyMemory 4183->4184 4185 18000ffb0 4183->4185 4184->4185 4185->4182 4185->4185 4186 18000ffcb RtlCopyMemory 4185->4186 4187 18000fff2 4186->4187 4189 18000ffe6 4186->4189 4245 1800105d0 4187->4245 4189->4182 4190 18001003b memset 4189->4190 4191 18001002b RtlCopyMemory 4189->4191 4190->4182 4191->4190 4193 180010e52 fegetenv 4192->4193 4194 180010ebc 4193->4194 4197 180010eec 4193->4197 4195 180010ec5 strcpy_s 4194->4195 4208 180010fd7 4194->4208 4196 18001291b 4195->4196 4234 180010ee7 4195->4234 4198 18000f6d0 18 API calls 4196->4198 4199 180010fb4 4197->4199 4201 180010f91 strcpy_s 4197->4201 4202 180010f3d 4197->4202 4197->4208 4200 18001292f 4198->4200 4199->4196 4199->4234 4201->4196 4201->4234 4204 180010f42 4202->4204 4205 180010f6e strcpy_s 4202->4205 4203 18000cb60 8 API calls 4206 18000ff25 4203->4206 4207 180010f4b strcpy_s 4204->4207 4204->4208 4205->4196 4205->4234 4235 180010cf0 4206->4235 4207->4196 4207->4234 4211 180011462 memset 4208->4211 4216 18001108a 4208->4216 4222 18001136d memset 4208->4222 4209 1800115b0 memset RtlCopyMemory 4233 180011582 4209->4233 4210 180011ae0 memset RtlCopyMemory 4232 180011ab4 4210->4232 4213 18001143d 4211->4213 4211->4216 4214 180011451 RtlCopyMemory 4213->4214 4215 180011548 memset _errno 4213->4215 4214->4216 4217 18000f680 18 API calls 4215->4217 4216->4216 4216->4232 4216->4233 4217->4216 4218 18001172a memset _errno 4224 18000f680 18 API calls 4218->4224 4219 18001171c RtlCopyMemory 4219->4233 4220 180011bf3 memset _errno 4225 18000f680 18 API calls 4220->4225 4221 180011be5 RtlCopyMemory 4221->4232 4222->4213 4222->4216 4224->4233 4225->4232 4226 180011ef7 memset _errno 4230 18000f680 18 API calls 4226->4230 4227 180011ee9 RtlCopyMemory 4227->4232 4228 1800119a4 memset _errno 4231 18000f680 18 API calls 4228->4231 4229 180011996 RtlCopyMemory 4229->4233 4230->4232 4231->4233 4232->4210 4232->4220 4232->4221 4232->4226 4232->4227 4232->4234 4233->4209 4233->4218 4233->4219 4233->4228 4233->4229 4233->4234 4234->4203 4234->4234 4236 180010d16 4235->4236 4237 180010cfc _errno 4235->4237 4236->4237 4240 180010d4a 4236->4240 4241 180010d30 _errno 4236->4241 4238 18000f680 18 API calls 4237->4238 4239 180010d0c 4238->4239 4239->4183 4240->4237 4244 180010d4f 4240->4244 4242 18000f680 18 API calls 4241->4242 4243 180010d40 4242->4243 4243->4183 4244->4183 4262 180010b30 4245->4262 4247 180010689 4251 1800106f9 MultiByteToWideChar 4247->4251 4252 1800106e6 4247->4252 4248 1800105ef 4248->4247 4249 18001069c MultiByteToWideChar 4248->4249 4261 1800105f4 4248->4261 4249->4247 4250 1800107b2 4253 18001080f 4250->4253 4256 180010822 MultiByteToWideChar 4250->4256 4251->4252 4252->4250 4255 1800107c5 MultiByteToWideChar 4252->4255 4254 18001086c 4253->4254 4258 18001087f MultiByteToWideChar 4253->4258 4257 1800108d4 4254->4257 4259 1800108e7 MultiByteToWideChar 4254->4259 4255->4250 4256->4253 4260 180010942 MultiByteToWideChar 4257->4260 4257->4261 4258->4254 4259->4257 4260->4261 4261->4189 4263 180010b7c 4262->4263 4264 180010b5f 4262->4264 4265 180010b94 4263->4265 4266 180010b9b GetModuleHandleW 4263->4266 4264->4248 4267 180010bf1 4265->4267 4268 180010bc1 GetProcAddress 4265->4268 4266->4265 4267->4248 4268->4267 4269 18000e3fc 4270 18000e42d 4269->4270 4271 18000e470 strnlen 4269->4271 4270->4271 4272 18000e44c wcsnlen 4270->4272 4277 18000e593 4271->4277 4272->4277 4275 18000cb60 8 API calls 4276 18000e92a 4275->4276 4284 18000e856 4277->4284 4286 18000ef80 4277->4286 4279 18000e861 4280 18000ef80 RtlCopyMemory 4279->4280 4279->4284 4280->4284 4281 18000e7a0 wctomb_s 4283 18000e78e 4281->4283 4281->4284 4283->4281 4283->4284 4285 18000e7f7 RtlCopyMemory 4283->4285 4284->4275 4285->4283 4287 18000ef89 4286->4287 4289 18000e6e3 4286->4289 4288 18000efcb RtlCopyMemory 4287->4288 4287->4289 4288->4289 4289->4279 4289->4283 4580 18000397e 4581 1800039b2 4580->4581 4582 180003992 4580->4582 4583 18000cb60 8 API calls 4581->4583 4584 1800039b7 4583->4584 4688 18000db82 4692 18000d9f0 4688->4692 4689 18000e00f free 4690 18000e01d 4689->4690 4696 18000cb60 8 API calls 4690->4696 4691 18000dde8 4691->4689 4693 18000dfbd 4691->4693 4694 18000de32 free 4691->4694 4695 18000dfe7 4691->4695 4698 18000de07 4691->4698 4692->4691 4697 18000f680 18 API calls 4692->4697 4693->4689 4694->4690 4695->4693 4699 18000dff1 free 4695->4699 4700 18000e03c 4696->4700 4697->4691 4698->4689 4698->4693 4698->4694 4699->4690 4701 180010384 4704 18000f890 4701->4704 4703 1800103b8 4705 18000f8da 4704->4705 4706 18000f8bd _errno 4704->4706 4707 18000f8f1 4705->4707 4712 18000f96c 4705->4712 4708 18000f680 18 API calls 4706->4708 4716 18000fc00 4707->4716 4710 18000f8cd 4708->4710 4710->4703 4711 18000f926 4711->4703 4713 1800105d0 9 API calls 4712->4713 4715 18000f9f6 4712->4715 4713->4715 4714 18000fa79 memset 4714->4711 4715->4711 4715->4714 4717 180010e00 43 API calls 4716->4717 4718 18000fc4c 4717->4718 4719 180010cf0 20 API calls 4718->4719 4720 18000fc9c 4719->4720 4721 18000fca0 4720->4721 4722 18000fd00 31 API calls 4720->4722 4721->4711 4722->4721 4585 18000d184 4586 18000d18d __scrt_release_startup_lock 4585->4586 4588 18000d191 __scrt_initialize_crt 4586->4588 4589 18000f2f0 4586->4589 4592 18000f330 4589->4592 4591 18000f2fd __getmainargs 4591->4588 4592->4591 4023 180005a0d GetProcessId 4024 180005a8c 4023->4024 4671 180002b0e 4672 180002b5d 4671->4672 4673 180002b71 4672->4673 4674 18000cb60 8 API calls 4672->4674 4675 180002b8c 4674->4675 4295 18000e490 4308 18000ea40 4295->4308 4297 18000cb60 8 API calls 4298 18000e92a 4297->4298 4299 18000ef80 RtlCopyMemory 4303 18000e6e3 4299->4303 4301 18000e861 4302 18000ef80 RtlCopyMemory 4301->4302 4306 18000e856 4301->4306 4302->4306 4303->4301 4305 18000e78e 4303->4305 4304 18000e7a0 wctomb_s 4304->4305 4304->4306 4305->4304 4305->4306 4307 18000e7f7 RtlCopyMemory 4305->4307 4306->4297 4307->4305 4309 18000ea5e 4308->4309 4324 18000e0d0 4309->4324 4311 18000eaa1 4331 1800101c0 4311->4331 4313 18000eb83 4314 18000ebb0 tolower 4313->4314 4319 18000ebb7 4313->4319 4323 18000ec20 4313->4323 4314->4319 4316 18000ebf3 4317 18000ebfb tolower 4316->4317 4321 18000ec02 4316->4321 4317->4321 4318 18000e498 4318->4299 4318->4306 4319->4316 4320 18000ebe8 __pctype_func 4319->4320 4320->4319 4322 1800105d0 9 API calls 4321->4322 4321->4323 4322->4323 4323->4318 4352 18000e190 4323->4352 4325 18000e0e8 _errno 4324->4325 4326 18000e0fb 4324->4326 4325->4311 4327 18000e12d malloc 4326->4327 4328 18000e120 4326->4328 4329 18000e142 free 4327->4329 4330 18000e15b free free 4327->4330 4328->4311 4329->4311 4330->4311 4332 1800101d5 _errno 4331->4332 4335 1800101f1 4331->4335 4333 18000f680 18 API calls 4332->4333 4334 1800101e5 4333->4334 4334->4313 4335->4332 4336 180010208 4335->4336 4337 180010350 4336->4337 4342 180010263 4336->4342 4338 180010e00 43 API calls 4337->4338 4339 180010460 4338->4339 4340 180010cf0 20 API calls 4339->4340 4341 180010499 4340->4341 4343 1800102b3 4341->4343 4344 1800104f5 4341->4344 4346 1800104b5 4341->4346 4342->4343 4345 18001031a strcpy_s 4342->4345 4343->4313 4366 18000fd00 4344->4366 4345->4343 4347 180010555 4345->4347 4356 180010070 4346->4356 4349 18000f6d0 18 API calls 4347->4349 4350 180010569 4349->4350 4353 18000e1aa 4352->4353 4355 18000e19e 4352->4355 4354 1800105d0 9 API calls 4353->4354 4354->4355 4355->4318 4357 180010099 4356->4357 4357->4357 4358 1800100ea RtlCopyMemory 4357->4358 4360 180010101 4357->4360 4358->4360 4359 18001019b 4359->4343 4360->4359 4360->4360 4361 18001011d RtlCopyMemory 4360->4361 4362 180010141 4361->4362 4364 180010135 4361->4364 4363 1800105d0 9 API calls 4362->4363 4363->4364 4364->4359 4365 18001017b RtlCopyMemory memset 4364->4365 4365->4359 4367 18000fd2d _errno 4366->4367 4370 18000fd51 4366->4370 4368 18000f680 18 API calls 4367->4368 4369 18000fd3d 4368->4369 4369->4343 4370->4370 4372 18000fd8e RtlCopyMemory 4370->4372 4373 18000fd9a 4370->4373 4371 18000fdeb strcpy_s 4375 18000fec4 4371->4375 4381 18000fe27 4371->4381 4372->4373 4373->4371 4374 18000fdc9 4373->4374 4376 1800105d0 9 API calls 4373->4376 4374->4371 4377 18000f6d0 18 API calls 4375->4377 4376->4374 4378 18000fedc 4377->4378 4379 18000feae 4379->4343 4380 18000fe9f RtlCopyMemory 4380->4379 4381->4379 4381->4380 4610 18000d210 4611 18000d234 __scrt_release_startup_lock 4610->4611 4612 1800109e8 __CppXcptFilter 4611->4612 4493 18000e513 4495 18000e527 4493->4495 4494 18000e579 _errno 4496 18000f680 18 API calls 4494->4496 4495->4494 4501 18000e589 4496->4501 4497 18000cb60 8 API calls 4498 18000e92a 4497->4498 4499 18000ef80 RtlCopyMemory 4503 18000e6e3 4499->4503 4500 18000e861 4502 18000ef80 RtlCopyMemory 4500->4502 4506 18000e856 4500->4506 4501->4499 4501->4506 4502->4506 4503->4500 4505 18000e78e 4503->4505 4504 18000e7a0 wctomb_s 4504->4505 4504->4506 4505->4504 4505->4506 4507 18000e7f7 RtlCopyMemory 4505->4507 4506->4497 4507->4505 4644 18000e297 4645 18000e2a3 4644->4645 4650 18000e306 4644->4650 4646 18000e2f9 wctomb_s 4645->4646 4645->4650 4646->4650 4647 18000cb60 8 API calls 4648 18000e92a 4647->4648 4649 18000ef80 RtlCopyMemory 4653 18000e6e3 4649->4653 4650->4649 4656 18000e856 4650->4656 4651 18000e861 4652 18000ef80 RtlCopyMemory 4651->4652 4651->4656 4652->4656 4653->4651 4655 18000e78e 4653->4655 4654 18000e7a0 wctomb_s 4654->4655 4654->4656 4655->4654 4655->4656 4657 18000e7f7 RtlCopyMemory 4655->4657 4656->4647 4657->4655 4031 180001920 memset GetModuleFileNameW wcsstr 4032 1800019a8 4031->4032 4033 18000197a SHTestTokenMembership 4031->4033 4065 180001010 malloc 4032->4065 4034 180001984 4033->4034 4035 180001995 4033->4035 4043 1800015b0 4034->4043 4040 18000199f ExitProcess 4035->4040 4044 1800015db malloc 4043->4044 4045 1800018ce 4043->4045 4044->4045 4047 1800015f7 RtlCopyMemory malloc 4044->4047 4046 18000cb60 8 API calls 4045->4046 4048 18000190e ExitProcess 4046->4048 4047->4045 4049 180001625 memset 4047->4049 4050 180001656 4049->4050 4051 18000165b 4049->4051 4052 18000169b memset GetModuleFileNameW malloc 4050->4052 4051->4050 4053 180001682 RtlCopyMemory 4051->4053 4052->4045 4054 1800016df memset RtlCopyMemory 4052->4054 4053->4052 4055 180001720 4054->4055 4055->4055 4056 180001773 OpenSCManagerW 4055->4056 4056->4045 4057 18000179b EnumServicesStatusExW malloc 4056->4057 4057->4045 4058 1800017f4 memset EnumServicesStatusExW 4057->4058 4059 180001845 CloseServiceHandle free 4058->4059 4060 180001856 CloseServiceHandle 4058->4060 4059->4045 4060->4045 4061 180001865 4060->4061 4062 180001870 lstrcmpiW 4061->4062 4064 180001893 4061->4064 4062->4061 4063 180001895 free 4062->4063 4063->4045 4063->4064 4064->4045 4066 180001568 4065->4066 4071 18000104e 4065->4071 4067 18000cb60 8 API calls 4066->4067 4068 18000159f 4067->4068 4102 18000cb60 4068->4102 4069 1800010c4 malloc 4069->4066 4070 1800010db RtlCopyMemory RtlCopyMemory 4069->4070 4072 180001120 4070->4072 4071->4069 4072->4066 4073 180001195 memset wsprintfW CreateFileW 4072->4073 4074 180001212 GetLastError 4073->4074 4075 18000121a WriteFile 4073->4075 4076 18000124c Sleep memset wsprintfW CreateFileW 4074->4076 4077 180001243 CloseHandle 4075->4077 4078 18000123d GetLastError 4075->4078 4079 1800012c4 GetLastError 4076->4079 4080 1800012cc WriteFile 4076->4080 4077->4076 4078->4077 4083 1800012fe Sleep memset wsprintfW CreateFileW 4079->4083 4081 1800012f5 CloseHandle 4080->4081 4082 1800012ef GetLastError 4080->4082 4081->4083 4082->4081 4084 180001376 GetLastError 4083->4084 4085 18000137e WriteFile 4083->4085 4086 1800013ac Sleep 4084->4086 4087 1800013a3 CloseHandle 4085->4087 4088 18000139d GetLastError 4085->4088 4086->4066 4089 1800013c1 VirtualAlloc 4086->4089 4087->4086 4088->4087 4089->4066 4090 1800013e6 RtlCopyMemory CreateThread 4089->4090 4111 180001a10 CoInitialize 4090->4111 4093 180001523 memset RtlCopyMemory CreateThread 4093->4066 4094 180001430 VariantInit 4095 180001498 4094->4095 4096 18000149c SysAllocString 4095->4096 4097 1800014be GetLastError 4095->4097 4099 1800014ba 4096->4099 4098 1800014c4 4097->4098 4098->4093 4100 1800014ca memset wsprintfW 4098->4100 4099->4097 4099->4098 4119 180001d60 4100->4119 4103 18000cb69 4102->4103 4104 1800019c0 4103->4104 4105 18000cf14 IsProcessorFeaturePresent 4103->4105 4106 18000cf2c 4105->4106 4132 18000cfe8 RtlCaptureContext 4106->4132 4112 180001b50 4111->4112 4112->4112 4113 180001cae CLSIDFromString 4112->4113 4114 180001d04 IIDFromString 4113->4114 4115 180001d3b 4113->4115 4114->4115 4116 180001d17 CoCreateInstance 4114->4116 4117 18000cb60 8 API calls 4115->4117 4116->4115 4118 180001423 4117->4118 4118->4093 4118->4094 4120 180001da5 SysAllocString 4119->4120 4131 18000206a 4119->4131 4122 180001dbb 4120->4122 4121 18000cb60 8 API calls 4123 180002086 4121->4123 4124 180001dd9 SysAllocString SysAllocString 4122->4124 4122->4131 4123->4093 4125 180001e08 4124->4125 4126 180001f1f IIDFromString 4125->4126 4125->4131 4127 180001f4c 4126->4127 4128 180001f5e SysAllocString SysAllocString 4127->4128 4127->4131 4129 180001f88 4128->4129 4130 180001fd9 VariantInit SysAllocString 4129->4130 4129->4131 4130->4131 4131->4121 4133 18000d002 RtlLookupFunctionEntry 4132->4133 4134 18000cf3f 4133->4134 4135 18000d018 RtlVirtualUnwind 4133->4135 4136 18000cee0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 4134->4136 4135->4133 4135->4134 4382 18000e4a0 4395 18000ece0 4382->4395 4384 18000cb60 8 API calls 4385 18000e92a 4384->4385 4386 18000ef80 RtlCopyMemory 4390 18000e6e3 4386->4390 4388 18000e861 4389 18000ef80 RtlCopyMemory 4388->4389 4393 18000e856 4388->4393 4389->4393 4390->4388 4392 18000e78e 4390->4392 4391 18000e7a0 wctomb_s 4391->4392 4391->4393 4392->4391 4392->4393 4394 18000e7f7 RtlCopyMemory 4392->4394 4393->4384 4394->4392 4396 18000ed0b 4395->4396 4397 18000ed2d _errno 4396->4397 4398 18000ed44 4396->4398 4399 18000f680 18 API calls 4397->4399 4400 18000e0d0 5 API calls 4398->4400 4401 18000e4b1 4398->4401 4399->4401 4400->4401 4401->4386 4401->4393 4658 18000cea0 4659 18000cec1 4658->4659 4660 18000cebc 4658->4660 4662 18000d05c 4660->4662 4663 18000d0f3 4662->4663 4664 18000d07f GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 4662->4664 4663->4659 4664->4663 4019 180005824 realloc NtQuerySystemInformation 4613 180012e30 __C_specific_handler 4614 180012e51 4613->4614 4615 180012e44 4613->4615 4615->4614 4616 180012e57 ?terminate@ __CxxFrameHandler3 4615->4616 4137 180008e30 RtlAdjustPrivilege 4138 180008eb4 4137->4138 4139 180008eaf 4137->4139 4140 18000cb60 8 API calls 4138->4140 4141 180008eb9 4140->4141 4012 18000a8b2 WriteProcessMemory 4013 18000a939 4012->4013 4402 18000e4b6 4403 18000e4c2 4402->4403 4404 18000ece0 24 API calls 4403->4404 4408 18000e4d9 4404->4408 4405 18000cb60 8 API calls 4406 18000e92a 4405->4406 4407 18000ef80 RtlCopyMemory 4411 18000e6e3 4407->4411 4408->4407 4414 18000e856 4408->4414 4409 18000e861 4410 18000ef80 RtlCopyMemory 4409->4410 4409->4414 4410->4414 4411->4409 4413 18000e78e 4411->4413 4412 18000e7a0 wctomb_s 4412->4413 4412->4414 4413->4412 4413->4414 4415 18000e7f7 RtlCopyMemory 4413->4415 4414->4405 4415->4413 4736 1800103bd 4737 18000fc00 58 API calls 4736->4737 4738 1800103f1 4737->4738 4142 180009bc0 VirtualAllocEx 4143 180009da0 4142->4143 4416 18000d8c0 4417 18000d911 4416->4417 4418 18000d8f7 _errno 4416->4418 4417->4418 4420 18000d91b 4417->4420 4419 18000f680 18 API calls 4418->4419 4424 18000d907 4419->4424 4426 18000dde8 4420->4426 4431 18000f680 18 API calls 4420->4431 4421 18000cb60 8 API calls 4422 18000e03c 4421->4422 4423 18000e00f free 4423->4424 4424->4421 4425 18000dfbd 4425->4423 4426->4423 4426->4425 4427 18000de32 free 4426->4427 4428 18000dfe7 4426->4428 4429 18000de07 4426->4429 4427->4424 4428->4425 4430 18000dff1 free 4428->4430 4429->4423 4429->4425 4429->4427 4430->4424 4431->4426 4665 180002ecc 4668 180004ba0 4665->4668 4669 180002f4d WaitForSingleObject 4668->4669 4676 18000e34d 4681 18000e361 4676->4681 4677 18000cb60 8 API calls 4678 18000e92a 4677->4678 4679 18000ef80 RtlCopyMemory 4683 18000e6e3 4679->4683 4680 18000e861 4682 18000ef80 RtlCopyMemory 4680->4682 4687 18000e856 4680->4687 4681->4679 4681->4687 4682->4687 4683->4680 4685 18000e78e 4683->4685 4684 18000e7a0 wctomb_s 4684->4685 4684->4687 4685->4684 4686 18000e7f7 RtlCopyMemory 4685->4686 4685->4687 4686->4685 4687->4677 4739 180002fcd RpcAsyncCompleteCall 4622 180010a50 4623 180010a97 4622->4623 4625 180010a58 4622->4625 4624 180010a85 FreeLibrary 4624->4625 4625->4623 4625->4624 4598 1800019d0 DeleteFileW 4599 1800019e3 Sleep DeleteFileW 4598->4599 4600 1800019fb 4598->4600 4599->4599 4599->4600 4601 18000f5d0 free free 4020 1800054d5 4021 180005524 DuplicateHandle 4020->4021 4022 1800055a7 4021->4022 4437 18000e4de 4438 18000ece0 24 API calls 4437->4438 4442 18000e4ee 4438->4442 4439 18000cb60 8 API calls 4440 18000e92a 4439->4440 4441 18000ef80 RtlCopyMemory 4445 18000e6e3 4441->4445 4442->4441 4447 18000e856 4442->4447 4443 18000e861 4444 18000ef80 RtlCopyMemory 4443->4444 4443->4447 4444->4447 4445->4443 4449 18000e78e 4445->4449 4446 18000e7a0 wctomb_s 4446->4447 4446->4449 4447->4439 4448 18000e7f7 RtlCopyMemory 4448->4449 4449->4446 4449->4447 4449->4448

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: mallocmemset$CloseCopyEnumHandleMemoryServiceServicesStatus$FileManagerModuleNameOpenfreelstrcmpi
                                                                  • String ID: Schedule
                                                                  • API String ID: 2398014078-2739827629
                                                                  • Opcode ID: 73369f28b7aa16c2a8f2d980950be6b4cc62dc581846ff5ac2f05964a5a53fdb
                                                                  • Instruction ID: aa6e580511663bbfe265cf69901141db5296ca1bdbbd027ad18742ebc6271d7a
                                                                  • Opcode Fuzzy Hash: 73369f28b7aa16c2a8f2d980950be6b4cc62dc581846ff5ac2f05964a5a53fdb
                                                                  • Instruction Fuzzy Hash: 59A18B36705B8886EBA2CB19E4843EDB7A4F78DBC4F44D129EA8903755EF38D648C700

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Strings
                                                                  • Dive right in and make a splash,We're throwing a pool party in a flash!Bring your swimsuits and sunscreen galore,We'll turn up the heat and let the good times pour!, xrefs: 0000000180008315
                                                                  • 0, xrefs: 000000018000828B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: Memory$AllocAlpcConnectCopyPortProcessVirtualWritememset
                                                                  • String ID: 0$Dive right in and make a splash,We're throwing a pool party in a flash!Bring your swimsuits and sunscreen galore,We'll turn up the heat and let the good times pour!
                                                                  • API String ID: 2976569565-3460289035
                                                                  • Opcode ID: ba10ff0ad143dc255e677196fa68b063caf770b72bb99dc8d96f21d25adc268a
                                                                  • Instruction ID: c867e681d528c686af98a10dae80cf32f62379cc457a419eb79b0f10cf2203a4
                                                                  • Opcode Fuzzy Hash: ba10ff0ad143dc255e677196fa68b063caf770b72bb99dc8d96f21d25adc268a
                                                                  • Instruction Fuzzy Hash: DA714AB5314AC495EFA5CF24EC687DA6362F788798F809122CE5E07668DF3CC24AC700

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 47 180009bc0-180009d4a VirtualAllocEx 48 180009da0-180009da9 47->48 49 180009db1-180009e16 48->49 50 180009dab 48->50 50->49
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID: @
                                                                  • API String ID: 4275171209-2766056989
                                                                  • Opcode ID: 895774fe39c432a9b9607027b095213d7444ba67ac4258149de1e0ad329cd703
                                                                  • Instruction ID: 18fc404becee558648dc3b88deb7cd26e24f8305e57b1969b75a8bcb2d1568be
                                                                  • Opcode Fuzzy Hash: 895774fe39c432a9b9607027b095213d7444ba67ac4258149de1e0ad329cd703
                                                                  • Instruction Fuzzy Hash: 1141F132314B8891EA55CF62FC50BD67764F788784F518116EE9E53B20DF38C61AC740

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 54 180005824-1800058d4 realloc NtQuerySystemInformation
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: InformationQuerySystemrealloc
                                                                  • String ID:
                                                                  • API String ID: 4089764311-0
                                                                  • Opcode ID: 5b2271d777f21188a61ef38d5ba3f89a884e304cdec4f019188cd102fd86097b
                                                                  • Instruction ID: 427c8884ce8749a78ca3d3c3a8c27aa53bcbca740cc51bc6bbb167420c726022
                                                                  • Opcode Fuzzy Hash: 5b2271d777f21188a61ef38d5ba3f89a884e304cdec4f019188cd102fd86097b
                                                                  • Instruction Fuzzy Hash: 37011BB671498496FF41CFA6EC6879AB362E78DBD4F45D022DE5E47728CE28C1098700

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 55 1800054d5-1800055a1 DuplicateHandle 57 1800055a7 55->57 58 1800069ad 55->58 57->58
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: DuplicateHandle
                                                                  • String ID:
                                                                  • API String ID: 3793708945-0
                                                                  • Opcode ID: 19fd5c849ab6d6bb4bfb0504d01622fbd0855da7b3ae26213c64984a74220370
                                                                  • Instruction ID: 1af2901ad9ea5d48a71e1387facd5c3dc420b40515ed1f24f3c52e30eae20cd4
                                                                  • Opcode Fuzzy Hash: 19fd5c849ab6d6bb4bfb0504d01622fbd0855da7b3ae26213c64984a74220370
                                                                  • Instruction Fuzzy Hash: 3A11BFB160478885FB51CFA5EC287CA77A0E389794F55A122DE4E17764CF38C209C704

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: memset$malloc$CopyExitFileMemoryModuleNameProcess$ManagerMembershipOpenTestTokenwcsstr
                                                                  • String ID: svchost.exe
                                                                  • API String ID: 4182427535-3106260013
                                                                  • Opcode ID: 49b2746f520621c52c2f6b1137a1e3989a23aebb1405abeb5981ef2b69f05654
                                                                  • Instruction ID: 3d9f09b143253cd0dfd0e6581948ee01b3a167d7ad96167eb3876c00e91661b1
                                                                  • Opcode Fuzzy Hash: 49b2746f520621c52c2f6b1137a1e3989a23aebb1405abeb5981ef2b69f05654
                                                                  • Instruction Fuzzy Hash: 59011631310A4D91FBA6EB25E8A63DA3360BB8DBC5F448015A58E466A5DF3CC34CC740

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 51 18000ad3e-18000adcc VirtualAllocEx 52 18000add5 51->52 53 18000adce 51->53 53->52
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID: @
                                                                  • API String ID: 4275171209-2766056989
                                                                  • Opcode ID: 4c3b16f85558678d99978a2826ea59a476f0fecef5113a1fd359f289397e99d2
                                                                  • Instruction ID: 61b381563d42cd6753897e2385543e004ac5681d5a2be3bd69d8f72948d93a77
                                                                  • Opcode Fuzzy Hash: 4c3b16f85558678d99978a2826ea59a476f0fecef5113a1fd359f289397e99d2
                                                                  • Instruction Fuzzy Hash: 7501A9B4315A8C81FB85CBA2EC68BD62320A38DBD4F009216DD0F63B65CE38C20A8340

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 59 18000a9be-18000aa4b VirtualAllocEx 60 18000aa51 59->60 61 18000b194 59->61 60->61
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: 09e9e4a3515dd01a16282e12e76213f45599d8a1d7260836c2c4a2b9d7084a13
                                                                  • Instruction ID: 73e87c2b7c2d5619f46bf5d70013e5ca0052a29b2a2f4204b7040bb4172c38ed
                                                                  • Opcode Fuzzy Hash: 09e9e4a3515dd01a16282e12e76213f45599d8a1d7260836c2c4a2b9d7084a13
                                                                  • Instruction Fuzzy Hash: F9017CB1605A8891FB99CBA1EC64BDA6724E78DB90F409116DE1E53B60DF28C20AC300

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: AdjustPrivilege
                                                                  • String ID:
                                                                  • API String ID: 3260937286-0
                                                                  • Opcode ID: 04f793066cab408fed6589d09ad0fe1fffaf3af776d1e9cf15d361d7c489d70e
                                                                  • Instruction ID: e4abec9a57f5e6cf389df4562fc0fbd72bc56ee49a3068fea4ec594597959d4a
                                                                  • Opcode Fuzzy Hash: 04f793066cab408fed6589d09ad0fe1fffaf3af776d1e9cf15d361d7c489d70e
                                                                  • Instruction Fuzzy Hash: 8FF04F3A321B8C81EA82DB66EC657953BA0F34CB94F419412ED9E53734CE3DC2098B00

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 67 180005a0d-180005a86 GetProcessId 68 1800069ba 67->68 69 180005a8c 67->69 69->68
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: Process
                                                                  • String ID:
                                                                  • API String ID: 1235230986-0
                                                                  • Opcode ID: 50f958970ebb76354ffea4ce1ff0be6425b08e38d9476523f750ab82be1909a1
                                                                  • Instruction ID: 66fdd7e8d1beca02ada1f235eec6f3e8d8bb28daf1441ad2ec8515806f49a421
                                                                  • Opcode Fuzzy Hash: 50f958970ebb76354ffea4ce1ff0be6425b08e38d9476523f750ab82be1909a1
                                                                  • Instruction Fuzzy Hash: 6501A2B2214A0896EA80CB59E8603AA7371F789BD8F509122EF4F83734CF29C216C700

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 70 18000af22-18000afa4 WriteProcessMemory 71 18000afaa 70->71 72 18000b1a0 70->72 71->72
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: MemoryProcessWrite
                                                                  • String ID:
                                                                  • API String ID: 3559483778-0
                                                                  • Opcode ID: ccffb0519a1b9c89baffc0360623a97ea4d16e3d4b406d7972a077802599c2a0
                                                                  • Instruction ID: 7ff3df5bac33cfd624bc324d8d31064a5bf78969ddbca9639b8b43afe07be034
                                                                  • Opcode Fuzzy Hash: ccffb0519a1b9c89baffc0360623a97ea4d16e3d4b406d7972a077802599c2a0
                                                                  • Instruction Fuzzy Hash: E301E8B5315A8891FB95CB92EC98386A762A78DBD0F41C116DD1E57768CE29C109C344

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 73 18000a8b2-18000a937 WriteProcessMemory 74 18000a939 73->74 75 18000a940 73->75 74->75
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: MemoryProcessWrite
                                                                  • String ID:
                                                                  • API String ID: 3559483778-0
                                                                  • Opcode ID: 3d4ad1e4b773f5052256976749b827bf9fceb0f49c8bdd15a119f946dfcf417c
                                                                  • Instruction ID: f53447897d0afbce070d8cf6422c94e204f60e1333671bc7201952eebc3bc3bb
                                                                  • Opcode Fuzzy Hash: 3d4ad1e4b773f5052256976749b827bf9fceb0f49c8bdd15a119f946dfcf417c
                                                                  • Instruction Fuzzy Hash: D70119F5305A8891FB91CB56EC98786A762E78EBD4F41C112CD5E47768CE3DC1098340

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 76 18000b100-18000b183 WriteProcessMemory 77 18000b185 76->77 78 18000b18c 76->78 77->78
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: MemoryProcessWrite
                                                                  • String ID:
                                                                  • API String ID: 3559483778-0
                                                                  • Opcode ID: 6e2161141dd83c3af048edcd6057f7ac8833ef0ae4a502c593557384e899631b
                                                                  • Instruction ID: 24a5fe1f65a8ff2b3f9b336ffdde7a29a110ba51538feb9284479ebd75def28f
                                                                  • Opcode Fuzzy Hash: 6e2161141dd83c3af048edcd6057f7ac8833ef0ae4a502c593557384e899631b
                                                                  • Instruction Fuzzy Hash: 40F03CF5315A8991FF91CB56EC58786A722F789BD4F41D1128D1E57768CE2DC2098380

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 79 180001010-180001048 malloc 80 18000104e-18000107d call 18000d800 79->80 81 180001590-1800015a9 call 18000cb60 79->81 86 180001084-18000108c 80->86 87 18000107f-180001082 80->87 89 180001093-1800010a4 86->89 90 18000108e-180001091 86->90 88 1800010c4-1800010d5 malloc 87->88 91 180001578-180001588 88->91 92 1800010db-180001116 RtlCopyMemory * 2 88->92 93 1800010a6-1800010a9 89->93 94 1800010ab-1800010be call 18000d836 89->94 90->88 91->81 96 180001120-18000116c 92->96 93->88 94->88 96->96 98 18000116e-18000117a 96->98 99 180001180-18000118b 98->99 99->99 100 18000118d-18000118f 99->100 100->91 101 180001195-180001210 memset wsprintfW CreateFileW 100->101 102 180001212-180001218 GetLastError 101->102 103 18000121a-18000123b WriteFile 101->103 104 18000124c-1800012c2 Sleep memset wsprintfW CreateFileW 102->104 105 180001243-180001246 CloseHandle 103->105 106 18000123d GetLastError 103->106 107 1800012c4-1800012ca GetLastError 104->107 108 1800012cc-1800012ed WriteFile 104->108 105->104 106->105 111 1800012fe-180001374 Sleep memset wsprintfW CreateFileW 107->111 109 1800012f5-1800012f8 CloseHandle 108->109 110 1800012ef GetLastError 108->110 109->111 110->109 112 180001376-18000137c GetLastError 111->112 113 18000137e-18000139b WriteFile 111->113 114 1800013ac-1800013bb Sleep 112->114 115 1800013a3-1800013a6 CloseHandle 113->115 116 18000139d GetLastError 113->116 117 1800013c1-1800013e0 VirtualAlloc 114->117 118 180001568-180001570 114->118 115->114 116->115 117->118 119 1800013e6-18000142a RtlCopyMemory CreateThread call 180001a10 117->119 118->91 122 180001523-180001562 memset RtlCopyMemory CreateThread 119->122 123 180001430-18000149a VariantInit 119->123 122->118 125 18000149c-1800014bc SysAllocString 123->125 126 1800014be GetLastError 123->126 125->126 127 1800014c4-1800014c8 125->127 126->127 127->122 129 1800014ca-18000151e memset wsprintfW call 180001d60 127->129 129->122
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$File$Creatememset$CopyMemorywsprintf$CloseHandleSleepWrite$AllocThreadmalloc$InitStringVariantVirtual
                                                                  • String ID: %s\%s$\Microsoft\Windows
                                                                  • API String ID: 252973232-4137575348
                                                                  • Opcode ID: 25a54c13e9a735a875ead524e7afe43dc856ba856741995bc76f1784370f9354
                                                                  • Instruction ID: 8444b12730cc2e4b24a21f92cbaba62370983439c4159096c57ec2b4dd869c75
                                                                  • Opcode Fuzzy Hash: 25a54c13e9a735a875ead524e7afe43dc856ba856741995bc76f1784370f9354
                                                                  • Instruction Fuzzy Hash: 85F17932600B89D5F7A2DF65E8157DD37A0FB8DB98F448215EE9A57A94EF38C209C700
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: strcpy_s$fegetenv
                                                                  • String ID: $ $1#IND$1#INF$1#QNAN$1#SNAN
                                                                  • API String ID: 3803379885-3106414055
                                                                  • Opcode ID: a264154010b335dcc8e77e63ee817b6bf3ede139aa726cf6f4ca62368f08a2f6
                                                                  • Instruction ID: 7d45f6c654c956143fd9d26eaeeaae5a9dbd0b7ac36d89918087f78a63c1df12
                                                                  • Opcode Fuzzy Hash: a264154010b335dcc8e77e63ee817b6bf3ede139aa726cf6f4ca62368f08a2f6
                                                                  • Instruction Fuzzy Hash: D0F2F372614A898FE7AACE69D4407ED77A1F38C7C9F109125EE1657B84EF34CA18CB40

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 605 180001a10-180001b4f CoInitialize 606 180001b50-180001b5c 605->606 606->606 607 180001b5e-180001c9b 606->607 608 180001ca0-180001cac 607->608 608->608 609 180001cae-180001d02 CLSIDFromString 608->609 610 180001d04-180001d15 IIDFromString 609->610 611 180001d3b-180001d5a call 18000cb60 609->611 610->611 612 180001d17-180001d39 CoCreateInstance 610->612 612->611
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: FromString$CreateInitializeInstance
                                                                  • String ID: :_:$:Y:$:$A::$X:[:$X:^:$Y::$Y:\:$\:[:$\:^:$^:G:
                                                                  • API String ID: 511945936-2205580742
                                                                  • Opcode ID: 042c554cad8af894e656224a2f31c9785861aedbae0dc43e1f823e5507c20a61
                                                                  • Instruction ID: bb9760e412e0da7a9fa856a0e12bed8815f139b06612a008ac7157658cf1ee11
                                                                  • Opcode Fuzzy Hash: 042c554cad8af894e656224a2f31c9785861aedbae0dc43e1f823e5507c20a61
                                                                  • Instruction Fuzzy Hash: CA91ED73D18BD4CAE311CF7994016ADBB70F799348F14A249EA946A919EB78E684CF00
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: String$Alloc$FromInitVariant
                                                                  • String ID: SYSTEM${4c3d624d-fd6b-49a3-b9b7-09cb3cd3f047}
                                                                  • API String ID: 929278495-107290059
                                                                  • Opcode ID: 614b72df1dcfdb13e6e7e9f40b98ec6a16ace2cc5bef3ea5268e0735b5c70f43
                                                                  • Instruction ID: ea068f2d577331d4d34f7ce72b56dd1e3d0ea9ea0467babe62b28c7e472ad91b
                                                                  • Opcode Fuzzy Hash: 614b72df1dcfdb13e6e7e9f40b98ec6a16ace2cc5bef3ea5268e0735b5c70f43
                                                                  • Instruction Fuzzy Hash: 36B1CF36B00B588AEB40DFAAD88429D77B1FB88F99F558026DE0E57B28DF35C149C300
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionFilterPresentProcessUnhandled$CaptureContextCurrentDebuggerEntryFeatureFunctionLookupProcessorTerminateUnwindVirtualmemset
                                                                  • String ID:
                                                                  • API String ID: 2775880128-0
                                                                  • Opcode ID: 7dc4868741350a1ed7cc7bec7e1247bba303b169c19a5f1790be2632382eac85
                                                                  • Instruction ID: ba24e1ffb11a22a24deea4117bc60841cceb276e4587d3da583010efd0501156
                                                                  • Opcode Fuzzy Hash: 7dc4868741350a1ed7cc7bec7e1247bba303b169c19a5f1790be2632382eac85
                                                                  • Instruction Fuzzy Hash: 48413032A14F858AE751CF64E8513EE73B0F79D748F009229EB8D46A59EF78C298C704
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                  • String ID:
                                                                  • API String ID: 313767242-0
                                                                  • Opcode ID: 7f20e88019a3dea1c98dff80d091ead56c2a804e3afe9e7b797dc77bfc3d9804
                                                                  • Instruction ID: f0d81ebf82978fd56193d97fecd2d6932c3beb8f3f5aa989cc62be3c5867452e
                                                                  • Opcode Fuzzy Hash: 7f20e88019a3dea1c98dff80d091ead56c2a804e3afe9e7b797dc77bfc3d9804
                                                                  • Instruction Fuzzy Hash: 4C314172205F8886EBA1DF64E8413DD7364F788784F44842AEA4E47B94DF38C64CC714
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ?Vse4"$NtAlpcConnectPort$NtAlpcCreatePort$NtAlpcSetInformation$TpAllocAlpcCompletion$\RPC Control\$ntdll.dll
                                                                  • API String ID: 0-3440571002
                                                                  • Opcode ID: f2272cd02c527ba66290fdd0511b9d73e927a503c006ae6aff4811d714ae7238
                                                                  • Instruction ID: db531cbe6c7215b7beac89914ea0d5b623cdbc859f3fd4c8ffed9520062f2ae3
                                                                  • Opcode Fuzzy Hash: f2272cd02c527ba66290fdd0511b9d73e927a503c006ae6aff4811d714ae7238
                                                                  • Instruction Fuzzy Hash: F6121BF5721A9895FE41CBB9EC687D66362F78D798F81A113CE1E57624DE38C20AC340
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: wctomb_s
                                                                  • String ID: 0
                                                                  • API String ID: 2215178078-4108050209
                                                                  • Opcode ID: 9590b62b1cdf5e2e9ba92ac2b374c7ec93504cf439e0da941adb929f049209f1
                                                                  • Instruction ID: 669014fd47de581cbd80178cec617e364a3d39619997f68f623dd0f90899f060
                                                                  • Opcode Fuzzy Hash: 9590b62b1cdf5e2e9ba92ac2b374c7ec93504cf439e0da941adb929f049209f1
                                                                  • Instruction Fuzzy Hash: 46D1A272204BC886EBA6CF28D1403AD77A1F34ABD8F649215EE4D57794DF35CA8AC740
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: _errno
                                                                  • String ID: -$localeconv
                                                                  • API String ID: 2918714741-4132363106
                                                                  • Opcode ID: e614fc95d6bfa4c868340b5e87e00c9b46572d26c8992a6dcab7d30d20e0c0dc
                                                                  • Instruction ID: bbbc25cdd6ce2d31a73f7a7a53944f50a293d9bcd6a7e264c5b47ba25a2fc233
                                                                  • Opcode Fuzzy Hash: e614fc95d6bfa4c868340b5e87e00c9b46572d26c8992a6dcab7d30d20e0c0dc
                                                                  • Instruction Fuzzy Hash: FE911772704AC886EBA28B14A5447EA7761F359BE4F248211EBD947BC5DFBCC649C700
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: _errno
                                                                  • String ID: gfffffff
                                                                  • API String ID: 2918714741-1523873471
                                                                  • Opcode ID: 259df5ac207aadec5ffe8e6be151dc588cda67961492783d10a339cafb3c06fb
                                                                  • Instruction ID: 2c8cc9d6f96ba83e52b87df3f6bcb5a0f79e46ee7c8db7fa2b845fdc616ab7e2
                                                                  • Opcode Fuzzy Hash: 259df5ac207aadec5ffe8e6be151dc588cda67961492783d10a339cafb3c06fb
                                                                  • Instruction Fuzzy Hash: D891E4B27057C986EBA2CB69E1503F97B90A7697C0F048032DB8947BC1DF7CC259A701
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: C:\windows\$C:\windows\system32\$WinSta0\Default$taskmgr.exe
                                                                  • API String ID: 0-638001070
                                                                  • Opcode ID: c5207e7b4b0b86d756437afbad151232ef68d88f78f63fe6f242a49dccbc7778
                                                                  • Instruction ID: ff44758d759536888d3377b4f2813c100e0f227a2d98dccd77a8a15a1d04d7e0
                                                                  • Opcode Fuzzy Hash: c5207e7b4b0b86d756437afbad151232ef68d88f78f63fe6f242a49dccbc7778
                                                                  • Instruction Fuzzy Hash: C58110F6760A8942FF91CBA9FCA97D66322F74A7D8F40A112CD1E57624DE38D209C704
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: C:\windows\$C:\windows\system32\$WinSta0\Default$winver.exe
                                                                  • API String ID: 0-1160837885
                                                                  • Opcode ID: 93a2b0484ba751841bc05e7f2adad842797d3a80603c1b654e7f384ed92a7746
                                                                  • Instruction ID: 3f1cfa4d575335075bd3c48e5055bf53680ae5065dce3768eae8732111aa9669
                                                                  • Opcode Fuzzy Hash: 93a2b0484ba751841bc05e7f2adad842797d3a80603c1b654e7f384ed92a7746
                                                                  • Instruction Fuzzy Hash: A84170B2324A8892FF51CB69FCA97966321F389BC8F4091169D5E47624DF3CC209C704
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 0$p
                                                                  • API String ID: 0-2059906072
                                                                  • Opcode ID: a7af8e94d9d122363c9ba56be279431bec711b8c03149f6ef1f085cd7ee20895
                                                                  • Instruction ID: f316587ab43161bc0d965a4e9064b50efd4ab337fd6d027ea46d3ae0e774efcc
                                                                  • Opcode Fuzzy Hash: a7af8e94d9d122363c9ba56be279431bec711b8c03149f6ef1f085cd7ee20895
                                                                  • Instruction Fuzzy Hash: DE31F076645A8982EB51CF56EC94BD62320F38DBD8F429212ED5E0BB24EF38C15AC700
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: _errno
                                                                  • String ID:
                                                                  • API String ID: 2918714741-0
                                                                  • Opcode ID: 088da372acf342deeb9aaef58484ed788e46ecb761bacfe233fb86b787f10960
                                                                  • Instruction ID: 90a0499567bef4520dec738d2bc1efd56d1f1741844553329cca12d79335cddb
                                                                  • Opcode Fuzzy Hash: 088da372acf342deeb9aaef58484ed788e46ecb761bacfe233fb86b787f10960
                                                                  • Instruction Fuzzy Hash: F281C672305A888AE7A6CF29D4503A973A5F74DBC8F148122EF4D67399DF35CA4AC340
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: LaGOl56
                                                                  • API String ID: 0-375277488
                                                                  • Opcode ID: edffe9ef7f78a61489372e6522847bd1819d8db715b60a1dc90c2952b104cf7f
                                                                  • Instruction ID: d3257a9512b94aa5c3a30b8927bef16899f8b480e1152b34fbd2b4f0f67e6ca9
                                                                  • Opcode Fuzzy Hash: edffe9ef7f78a61489372e6522847bd1819d8db715b60a1dc90c2952b104cf7f
                                                                  • Instruction Fuzzy Hash: EA41E6B2314E48D2DF44CF15E854B9A7365F758BC8F658216DA8E87728EF39C21AC700
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 201ef99a-7fa0-444c-9399-19ba84f12a1a
                                                                  • API String ID: 0-3963691810
                                                                  • Opcode ID: 548d5f5d09b7bb71e88ed0911d28de3462597b3670c4aedf013fb6f8f4e188b3
                                                                  • Instruction ID: 2e4d1bfc098e70fecb24e6cd4a49aaacbc8653426ce865a339d261f1d8c382e2
                                                                  • Opcode Fuzzy Hash: 548d5f5d09b7bb71e88ed0911d28de3462597b3670c4aedf013fb6f8f4e188b3
                                                                  • Instruction Fuzzy Hash: 224141B6755B8947EF89CB64EDA63AB2321EB8D7A8F419516C91F43761DE38C209C300
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ncalrpc
                                                                  • API String ID: 0-2983622238
                                                                  • Opcode ID: ec491b8541e5ba87cc55742f637b6646835075508169ec297f56b02c3a6529be
                                                                  • Instruction ID: 188c8e747a7d88b86d36049d4f8611b16dc2ca68c56705edde0c2f8f15fb9419
                                                                  • Opcode Fuzzy Hash: ec491b8541e5ba87cc55742f637b6646835075508169ec297f56b02c3a6529be
                                                                  • Instruction Fuzzy Hash: 48314FB2720A5842EF85CF69ECA87966762F78D7D4F81D522CE1E47624DF38C2098300
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 40544349071ee85384a1097bfe23c0cbcca023351ab990b872ef2eee0ae8b1d0
                                                                  • Instruction ID: 5ebbf2754306c0b60d6152e30984c4b2a34126c98b08edfc288c299e3dba13eb
                                                                  • Opcode Fuzzy Hash: 40544349071ee85384a1097bfe23c0cbcca023351ab990b872ef2eee0ae8b1d0
                                                                  • Instruction Fuzzy Hash: 4C410472B11A5886EB10CB65F815B9A73A8F798794F404025EF9E47B68EF3CC156CB00
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: dcd5d524ca4281c96afd2f1c5b5990144d8f5f497f1f2e0554f370cd08c41020
                                                                  • Instruction ID: 5ce47defba9ad22839667c52f00c55d8e2e7d4e0bfcac176853e5dfddf30a043
                                                                  • Opcode Fuzzy Hash: dcd5d524ca4281c96afd2f1c5b5990144d8f5f497f1f2e0554f370cd08c41020
                                                                  • Instruction Fuzzy Hash: 7551FBEA650A8942EF91DBA9FCA97D72322F74A7D4F40E112CD2E57718DE38D209C704
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 955f7af3fa6c4d2fa96144ec7ae0311ee617ac675d3b737044756a099a389f3c
                                                                  • Instruction ID: 5fa998d76dde1407050f089c5c97169da02c15a811c501e4416ba08492098967
                                                                  • Opcode Fuzzy Hash: 955f7af3fa6c4d2fa96144ec7ae0311ee617ac675d3b737044756a099a389f3c
                                                                  • Instruction Fuzzy Hash: B151B132715B8896EB50CB65F95478A77A5F3887C4F55812AEE8E83B28EF3CD119C700
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: df93bf9fb1fa2b87573994d8dfd09ce25e71a23708a3cb17e2d3b575460a5204
                                                                  • Instruction ID: 7c169c72a3cd49dadeb4283ec1d10796d64338e09e8f27c9aa23a8ed8d1d8600
                                                                  • Opcode Fuzzy Hash: df93bf9fb1fa2b87573994d8dfd09ce25e71a23708a3cb17e2d3b575460a5204
                                                                  • Instruction Fuzzy Hash: 9251C2B5710A9992EA50CFA5EC687D66321F789BD4F40E126DE1F67B24DE38C51AC300
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b13a1cb9ad1de499c3aa4824b5acdf7727e80b8a1733a0aec0b37f9f565618ab
                                                                  • Instruction ID: b4d02f0d51c95df83c98d355d25a743b1602a7ff861fa07585bc0084ab603ac1
                                                                  • Opcode Fuzzy Hash: b13a1cb9ad1de499c3aa4824b5acdf7727e80b8a1733a0aec0b37f9f565618ab
                                                                  • Instruction Fuzzy Hash: 3C41EFB3715A4995EA15CF61EC5478AB7A5F3887D8F44D126EE4E4BA28DF38C24AC300
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 34f12bbec3ef4c21acf85d16b0a115e4a7e0493bc861de78a5f35de5683c3d02
                                                                  • Instruction ID: 6460ceb4c15a3ed5359fcdf969113481d425c3230f3a87ff8fc2c19d9e9b03ef
                                                                  • Opcode Fuzzy Hash: 34f12bbec3ef4c21acf85d16b0a115e4a7e0493bc861de78a5f35de5683c3d02
                                                                  • Instruction Fuzzy Hash: 2C419F76B54A8886EB50CB65F854B9AB365F78CBC8F408126DE4E53B28DE3DC216C740
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7b297dc0b12863ea5633e0394b25c6481c274db880565e99598a358100e8291a
                                                                  • Instruction ID: 953ac995840ab945eafaf149798731085ccbd96a3d42a2912d3ad9ebdee2443a
                                                                  • Opcode Fuzzy Hash: 7b297dc0b12863ea5633e0394b25c6481c274db880565e99598a358100e8291a
                                                                  • Instruction Fuzzy Hash: 9841F1B2318F4996DB50CFA5E8557AA7B61F348788F84801ADE8F47624DF38C12AC340
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4cfa6a913d7c4ff124cb3aa69afb99d83595d1418767386c9633c732c9792808
                                                                  • Instruction ID: 5850766affd1dc1006efbcf663fcd044a5b0c42a56f90ee8d84e9915f07db0dd
                                                                  • Opcode Fuzzy Hash: 4cfa6a913d7c4ff124cb3aa69afb99d83595d1418767386c9633c732c9792808
                                                                  • Instruction Fuzzy Hash: 324160B2304F84D6EB45CF55E88478AB7A6F3447C4F94C126EA8D5BA28DF78C15AC740
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e9698306a213f8c13e5c744f7ec092e0b35f2306cd29e4199544cb17bea7b188
                                                                  • Instruction ID: b47c33fa182b2b6e406ff42d742b16e34a2be846b06d7cc3c47bcc5ad0dd5191
                                                                  • Opcode Fuzzy Hash: e9698306a213f8c13e5c744f7ec092e0b35f2306cd29e4199544cb17bea7b188
                                                                  • Instruction Fuzzy Hash: 064124B2714A49E2DB10CF25EA9878E7762F3443C4F459206EE4E97238DF39C225C700
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1d4257d8eece49b07830ae728c934a0f990658fde052998d00cffd0e02d3b839
                                                                  • Instruction ID: 3a2a54fd14ba3c9112fcd9d06e2a83f2faa874cf33c3fc19e07575f54e4b3df5
                                                                  • Opcode Fuzzy Hash: 1d4257d8eece49b07830ae728c934a0f990658fde052998d00cffd0e02d3b839
                                                                  • Instruction Fuzzy Hash: A931B2B2754A8987DF44CFA4E8657EA3B21F344798F84911BDA5F47A24CE78C11AC341
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ae0daa0753ebf70cac3f1989174038f561a0c5660f626df88f0a2939a5c04a6c
                                                                  • Instruction ID: 2a1ed074ffd7e39de9dbbb892b36c7f1f966cdf4f6d65e5bdce06b4abba8519a
                                                                  • Opcode Fuzzy Hash: ae0daa0753ebf70cac3f1989174038f561a0c5660f626df88f0a2939a5c04a6c
                                                                  • Instruction Fuzzy Hash: 203123FA655B8892EA51CBB8FC697C72322F74E7D4F81A502CE1E67614DE38D209C340
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b73174d58ad3160897c5a64570d9003ffaf5d087b7b9248789bc756d00bdab3d
                                                                  • Instruction ID: 942c5937e91a832c3798b686b0af252ed0c82f0c3b6d5ce8abc2cb51314499f8
                                                                  • Opcode Fuzzy Hash: b73174d58ad3160897c5a64570d9003ffaf5d087b7b9248789bc756d00bdab3d
                                                                  • Instruction Fuzzy Hash: C1311BB5315A8481EE85CFA6ECA93A66362FB88BD4F50D116CE1F67B74CE38C1058304
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f0f56db044ec06fe9913ba76ce3c2bf12016da8f8da552b3796bd1813fef10e1
                                                                  • Instruction ID: 0f0f3af555497e93059dc6571c7412b3cf3e20d7676d806d74ba2686562364a5
                                                                  • Opcode Fuzzy Hash: f0f56db044ec06fe9913ba76ce3c2bf12016da8f8da552b3796bd1813fef10e1
                                                                  • Instruction Fuzzy Hash: 4D215EF635599842EA91CBA4ECB87972312E749BD8F81E112CD1F57758DE38C209C304
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a006de8f1fa7d243e3a9e9c69abcd2beb43e2c5219531642d7352cf58e783ff9
                                                                  • Instruction ID: 0398998c4114ad5c5b94ddcd0fb1f602503181105fadb351b64ed8fd47976dc8
                                                                  • Opcode Fuzzy Hash: a006de8f1fa7d243e3a9e9c69abcd2beb43e2c5219531642d7352cf58e783ff9
                                                                  • Instruction Fuzzy Hash: 3821E4B2714A8885EA81CF66EC28B9A7365F78CBD8F418125DE4E47724CE3CC50AC700
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 24fe960c443452bf0ca02dabf0d677333f7eabc8cd444734c87d950e4602ee01
                                                                  • Instruction ID: ab0ffabe3359154a9a054265eb67cdc921f16df733aa97232a2a79013b0c5846
                                                                  • Opcode Fuzzy Hash: 24fe960c443452bf0ca02dabf0d677333f7eabc8cd444734c87d950e4602ee01
                                                                  • Instruction Fuzzy Hash: 9031B1F2705A49DAEB10CF60E85478AB3A5F3447C8F48E126EA5E47A2CDF78C115C300
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 37cd48eb86cffa3e912c72a7c123d50d0eaa709cb8e30086e54480a646824998
                                                                  • Instruction ID: cac3c35be222ff7eef943cb234c43953059dc6fb381ac3a95ed8d8d7d73f5086
                                                                  • Opcode Fuzzy Hash: 37cd48eb86cffa3e912c72a7c123d50d0eaa709cb8e30086e54480a646824998
                                                                  • Instruction Fuzzy Hash: 8D21D5B2754B5892DA458FB6EC64BCA3765E759BD4F419122EE0E57324EE38CA06C300
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d64c56d490765ec9f9d46dfeab995d0ba34f0f31c8983dff4219531d9fbfdcd4
                                                                  • Instruction ID: a6e6edd21a1a0c722a2499f339a184c92f9c9d010025383cad1e5f5c62af46d3
                                                                  • Opcode Fuzzy Hash: d64c56d490765ec9f9d46dfeab995d0ba34f0f31c8983dff4219531d9fbfdcd4
                                                                  • Instruction Fuzzy Hash: C731A2B2724A49E6DB11CF64D65878E7B62F3443D4F49A206DB0E97638EF39C16AC700
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 71e217b24b7fe48aa955040255649620cb74da878ba68ae1136ca8d1af41fc62
                                                                  • Instruction ID: 9760054fc79c478af4dd39252b2b751102fb23d7a1b59b1fbf3b89b659a09381
                                                                  • Opcode Fuzzy Hash: 71e217b24b7fe48aa955040255649620cb74da878ba68ae1136ca8d1af41fc62
                                                                  • Instruction Fuzzy Hash: 40214DB67A1A5982EB85CFB5ECA87972321E74EBD8F45E112CD1E17720DE28D6098300
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4d2d5e05eff172b05dc87084c5523a4ecc04e86c45d5e3728672f408956a8a85
                                                                  • Instruction ID: a1eb8e041cf6125ce916b131f004215fd0dc4e0823b2c10b9e6b369a0edfe964
                                                                  • Opcode Fuzzy Hash: 4d2d5e05eff172b05dc87084c5523a4ecc04e86c45d5e3728672f408956a8a85
                                                                  • Instruction Fuzzy Hash: C72151F6720A9883EB81CFB4E8A87D62761F74D794F81A413CE1D47620EE39C209C300
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2500243ea94212a5fd507f9d99e92e0f8a02bad23cbb205cd462231196f1815e
                                                                  • Instruction ID: 4e70c7cdf9cf98d4b06827ce81096b38f4c6550eb1c3702f94efa454c28f36ae
                                                                  • Opcode Fuzzy Hash: 2500243ea94212a5fd507f9d99e92e0f8a02bad23cbb205cd462231196f1815e
                                                                  • Instruction Fuzzy Hash: 401181A371198C46FA92DBB8FD69BD76322E74C3A5F81A0129D1E07A15DE38C24AC704
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 86626058d538872f07d77dda5097a3ecc31de5526fa1fad0316364cda8ebfd5b
                                                                  • Instruction ID: 8a330624d2ba0a6fed1f57350598af27946c66593bd366883eb837f41dd1fc67
                                                                  • Opcode Fuzzy Hash: 86626058d538872f07d77dda5097a3ecc31de5526fa1fad0316364cda8ebfd5b
                                                                  • Instruction Fuzzy Hash: 19214DF6711A9882EB45CF75ECA8BD663A2E78DBD4F42D5138D1E4B624DE38C209C300
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 68e99ab8dcbc8e63c5f9103b9d6fa0c8fb216801dfa18011b9ec8e283faf2431
                                                                  • Instruction ID: 9fa600c9fe03323da2054d219e5722fb772a2560d15068f858cbbefadb7b799e
                                                                  • Opcode Fuzzy Hash: 68e99ab8dcbc8e63c5f9103b9d6fa0c8fb216801dfa18011b9ec8e283faf2431
                                                                  • Instruction Fuzzy Hash: 7E214CA63A1A4986EB41CF65EC94B9A2321E78DBD8F01A112CD1E07728DF3CD209C300
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 445f07d13ce021b97b4416e3be73bb395122839d113d106c3414c649594de6e0
                                                                  • Instruction ID: 2b6b2132a0a2e07f8bd3ee14bfededbc3de52b34ac7b1e2e4bc17d2910e7999e
                                                                  • Opcode Fuzzy Hash: 445f07d13ce021b97b4416e3be73bb395122839d113d106c3414c649594de6e0
                                                                  • Instruction Fuzzy Hash: 4D215EB6614B8483EB41CBA5E8993C663A1FB49794F409506DA5E57A24EF38D209C300
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 15019dd00c72fdc341cb36ccde0155ea6700116316576b32820349e0d845168f
                                                                  • Instruction ID: 887f6319f8645ccbc92e08c78cc143592e8fc5d0258ff08adeb588e841213fec
                                                                  • Opcode Fuzzy Hash: 15019dd00c72fdc341cb36ccde0155ea6700116316576b32820349e0d845168f
                                                                  • Instruction Fuzzy Hash: 1B11E7A361059C82F655CFE6ACA9F962325E34ABD8F01D123DD6E5B714CE39C10AC300
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6e3fb5a9eeac10a3300f6d077840e530f46ebbf9fe4c016881d133850f8f17c8
                                                                  • Instruction ID: a36b7cc2c4af6d59f8afc0f71b9ec04b8d8af27577798510533ca63255a80c4a
                                                                  • Opcode Fuzzy Hash: 6e3fb5a9eeac10a3300f6d077840e530f46ebbf9fe4c016881d133850f8f17c8
                                                                  • Instruction Fuzzy Hash: 2A21D4B2749A9482EB45CF64ECA87977761FB8D398F41A116DE4E43A24DF3DC109C700
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 037cd8c268e63617e2917473a09d9d6e921883355685c35b3bec0bb58f67b92c
                                                                  • Instruction ID: ce12811f72a3b7b9351d994e929a9a9e0453ea8930cd5cb3cc7f46b610d4d47c
                                                                  • Opcode Fuzzy Hash: 037cd8c268e63617e2917473a09d9d6e921883355685c35b3bec0bb58f67b92c
                                                                  • Instruction Fuzzy Hash: 231184B271495442EB50CB64E8A839B6321F78D7B8F819316C97F576E4DF39C10AC744
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7df05994bc2830c2c591ae22fcb2ccbea56bd1d89860d065a78f4855e0779169
                                                                  • Instruction ID: 1c532c8fced2f2eff92fe9ef23c76dde44938aa8fd7dc95dde59c2570677d884
                                                                  • Opcode Fuzzy Hash: 7df05994bc2830c2c591ae22fcb2ccbea56bd1d89860d065a78f4855e0779169
                                                                  • Instruction Fuzzy Hash: EA117CE271155846FF89CF66DDA97665393EB8C7E4F81D4268E1E8B768EE3CC1098300
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 20e3eeeece8eeac1b5fdc5ff2af2172208a6d805095d4d8f6a69d2ed7f9ee251
                                                                  • Instruction ID: 86db7e252892e2eaadae42e44f2c957c744d5fecb62b8453a0a9ac8a031b211d
                                                                  • Opcode Fuzzy Hash: 20e3eeeece8eeac1b5fdc5ff2af2172208a6d805095d4d8f6a69d2ed7f9ee251
                                                                  • Instruction Fuzzy Hash: ED119EA7611A9E43E74ADFF4BC64FCA3765E38A740F01A51A9E5A53510DA38C21AC300
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: dfde7ca919d01b1d8f614db6afdd124e649404b4f0619785e71302ca0f375fc9
                                                                  • Instruction ID: ced17bf83e16dd0701111f08fa452e8f17ab33ca8eb30b9d252154dc16dbeed1
                                                                  • Opcode Fuzzy Hash: dfde7ca919d01b1d8f614db6afdd124e649404b4f0619785e71302ca0f375fc9
                                                                  • Instruction Fuzzy Hash: AA117CB6710A9842FB45CBB4ECA83DA6362E78C7D4F8199278A1F47264DE38C2098300
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3981ec6c961d556c00c3e4b10dd43c218bdcd83b1e0207a8ebea4f0d41fe31ea
                                                                  • Instruction ID: 40a28b2c97b41e0fc0812b0c5bacec4405646e71b8d2ce031f7683d578f96f73
                                                                  • Opcode Fuzzy Hash: 3981ec6c961d556c00c3e4b10dd43c218bdcd83b1e0207a8ebea4f0d41fe31ea
                                                                  • Instruction Fuzzy Hash: 061186B6650A9842EA50CBA4FCA47DB2321F74D788F81A113CD1F57624EE35C21AC340
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0c5436a6c5fed49d038f598a762ae50c577332b5992abba539b3fad6c53f9324
                                                                  • Instruction ID: 2a1d0ad3e82236da7e983b079ac5a449a3d56a79dbfa68b5f7bcf8e0b78a1cc8
                                                                  • Opcode Fuzzy Hash: 0c5436a6c5fed49d038f598a762ae50c577332b5992abba539b3fad6c53f9324
                                                                  • Instruction Fuzzy Hash: 97115BB2355A5882EB55CF65ED987876322E74D788F82E122CC5E47628EF39C248C300
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8672aeb0f0ed0c879d86e5c19cf19667cc3d459669cac2b5084f95841a785535
                                                                  • Instruction ID: 450b3370faa2cb2d5a601fdc78b43f919674feb271f0df1ae12ace71e4efb6dd
                                                                  • Opcode Fuzzy Hash: 8672aeb0f0ed0c879d86e5c19cf19667cc3d459669cac2b5084f95841a785535
                                                                  • Instruction Fuzzy Hash: C21170B270195882EB45CF65ECA8B9667A5F78DB84F42D516DE1E47324DF38C209C300
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b759a81910c3b524e99b3858d0a9e2b41ff0f9b01c5675c1ab0c077c0862eb0e
                                                                  • Instruction ID: b4e84d8ab7710c4c57239755c51ef58129f0ad994c9bc3cc5351e6695056dc5a
                                                                  • Opcode Fuzzy Hash: b759a81910c3b524e99b3858d0a9e2b41ff0f9b01c5675c1ab0c077c0862eb0e
                                                                  • Instruction Fuzzy Hash: 7F1157A639286982EB85CF65EDA8B975312E7497D8F82E112CC1E4B718EE39D109C300
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5a7c1f2ac30cd9147bed69705b889b18d2bbd8005b7e9ddbbd9d54ecfba733a7
                                                                  • Instruction ID: d2eb94fba6b0b182a7d533999943f5c586038182622a3c8a7b6f043987faea39
                                                                  • Opcode Fuzzy Hash: 5a7c1f2ac30cd9147bed69705b889b18d2bbd8005b7e9ddbbd9d54ecfba733a7
                                                                  • Instruction Fuzzy Hash: 9A11A5F1320AC896EE81CBB5EC683DA6361E78D7D4F84A022CE1E47725CE28C209C304
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7f8c571c074744f899f8f377c1d9c9612274bc3d2c791104e4fe1bf5c42216b3
                                                                  • Instruction ID: cb11016d0a43076771842deb3ba7d133cfca034649766b9352b12f2f9073b384
                                                                  • Opcode Fuzzy Hash: 7f8c571c074744f899f8f377c1d9c9612274bc3d2c791104e4fe1bf5c42216b3
                                                                  • Instruction Fuzzy Hash: 500152B679165983EB85DF75ECA97EB2320EB4DB94F82A512CC1E57320DE39D909C300
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 131fd006a779a5085bf5b46e7193536c8db86a2ac8e5575b52316daaa72f9f56
                                                                  • Instruction ID: 402b98fdaeec88650cd8a168ad7d649d0fade3e9ba3baff6a7fd0df4b1199967
                                                                  • Opcode Fuzzy Hash: 131fd006a779a5085bf5b46e7193536c8db86a2ac8e5575b52316daaa72f9f56
                                                                  • Instruction Fuzzy Hash: 030152F6621A9983FB45CBB8ECA83D76325E74E7E8F41D1128E1E67625DE34C2098340
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 487311b2c9820503d6a5dae3d8d60110bd4d6cee73057637963884f56c4af8e6
                                                                  • Instruction ID: 8e92bc29d282ae0d928d91614fe53d78085dbcdd226fe0ee173ca4ef4d5826f0
                                                                  • Opcode Fuzzy Hash: 487311b2c9820503d6a5dae3d8d60110bd4d6cee73057637963884f56c4af8e6
                                                                  • Instruction Fuzzy Hash: A30140F2652A4A83FB45CBA4FDA8BC76322EB4D798F41E1169C1D07618EF38D2198300
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_release_startup_lock_initterm
                                                                  • String ID:
                                                                  • API String ID: 3249158762-0
                                                                  • Opcode ID: 5a5c9a036abee4f6952f0532d8eede2d64ee21733db9d877116367acf72bafba
                                                                  • Instruction ID: 2a4c13dbbe97c67b96177ecc31692964245443ac3ae8643659713bb35536c99c
                                                                  • Opcode Fuzzy Hash: 5a5c9a036abee4f6952f0532d8eede2d64ee21733db9d877116367acf72bafba
                                                                  • Instruction Fuzzy Hash: 5581BE7170064D86FBE3EB69E842BE93691AB8D7C0F14C026F90947796DE38CB4D8752
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 0$localeconv
                                                                  • API String ID: 0-1694054256
                                                                  • Opcode ID: 000e3b79443add43eec902b8c5a9a1890054fb5e372f480aa3582f9a7df45344
                                                                  • Instruction ID: 2204af7f2798db5be68ead3cf5d52d981f3db15f1d163f86b4a7d8b6d4ad82e3
                                                                  • Opcode Fuzzy Hash: 000e3b79443add43eec902b8c5a9a1890054fb5e372f480aa3582f9a7df45344
                                                                  • Instruction Fuzzy Hash: CAC19072205F84D6E7A28F25E49039C3BA4F709BD4F248216EACD47BA5CF78C669D740
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: strnlenwcsnlen
                                                                  • String ID: (null)$(null)$0
                                                                  • API String ID: 3725369605-212571832
                                                                  • Opcode ID: d2eaeb3988bd27a5faeef8766c77f7b733958c6187e28012baf5872acc1337cd
                                                                  • Instruction ID: dcdd580166d80e6fe1632dc5e17e73228d4e784e24bcf56e6512a722ba1fc2f2
                                                                  • Opcode Fuzzy Hash: d2eaeb3988bd27a5faeef8766c77f7b733958c6187e28012baf5872acc1337cd
                                                                  • Instruction Fuzzy Hash: 3FA1BF72214AC886EBE6CF28D0407E937A1F35ABD8F649215EE4D67784DF31CA89C740
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: CopyMemory$_errnostrcpy_s
                                                                  • String ID: e+000$gfff
                                                                  • API String ID: 2629432028-3030954782
                                                                  • Opcode ID: 14fa7ff08853d1dd469ed48625ab93b643952035aa5e23bb5ed39967f3df6ac0
                                                                  • Instruction ID: 296f8e79fda0498c0103e755cbace666a6b69cf4b30755128c13b51cace9f301
                                                                  • Opcode Fuzzy Hash: 14fa7ff08853d1dd469ed48625ab93b643952035aa5e23bb5ed39967f3df6ac0
                                                                  • Instruction Fuzzy Hash: B35105727046C845E7B6CE25E8013A9BB91E348BC4F48C122EA944BFD6DF7DC649D701
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: CopyMemory$fegetenvmemsetstrcpy_s
                                                                  • String ID: -
                                                                  • API String ID: 659228780-2547889144
                                                                  • Opcode ID: 241718116317a55847dbd77936b3fd7edb74e61a092d9900892a81e3fc4d62ef
                                                                  • Instruction ID: ebfefbfd2f1e93d5e76747c711c9b4a1ebb90a974b4e753599a4ad646017aae4
                                                                  • Opcode Fuzzy Hash: 241718116317a55847dbd77936b3fd7edb74e61a092d9900892a81e3fc4d62ef
                                                                  • Instruction Fuzzy Hash: E241C532708B8D82EBA2DF2191403AA7795F74DFC4F54D221FA8A57B99DF78D6098700
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                  • API String ID: 4061214504-1276376045
                                                                  • Opcode ID: 5c9ed31946e5f1abe64733cdbf29012430a9d2c9ccabc5a3e62e375394e850ce
                                                                  • Instruction ID: d0444890418ef41b94753d1b29e08f1744ba7167098742cde55e476dbf3f1036
                                                                  • Opcode Fuzzy Hash: 5c9ed31946e5f1abe64733cdbf29012430a9d2c9ccabc5a3e62e375394e850ce
                                                                  • Instruction Fuzzy Hash: 2CF0B431300F0481EFA2CB64F4553A923A0AB8D7E0F548225E9AE416E4CF38C34DC700
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: _errno
                                                                  • String ID:
                                                                  • API String ID: 2918714741-0
                                                                  • Opcode ID: eed2b5ada40f7ed7c64ed98c70b1544cb2c79cf4fd7996e08ae8be4713d9825c
                                                                  • Instruction ID: e31efeba5aa8630548cf1455b3d7c3197fdc07e7fa40510998546db08c0f2279
                                                                  • Opcode Fuzzy Hash: eed2b5ada40f7ed7c64ed98c70b1544cb2c79cf4fd7996e08ae8be4713d9825c
                                                                  • Instruction Fuzzy Hash: EA11E73260478480EAE5AB25F1403DD7390E3887E4F09A226FB6A1B7C5CE38D5D78704
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: AddDllDirectory$kernel32
                                                                  • API String ID: 1646373207-3758863895
                                                                  • Opcode ID: 386a41037e1f46b603523911a17befd6bb2b2881cc82ca9c4875bdc49c7b4b0c
                                                                  • Instruction ID: 94d1fcfb6abe9a13ea19cdbd68d76d0c9b2a371dcf28bdc137a2f57a4cac4c69
                                                                  • Opcode Fuzzy Hash: 386a41037e1f46b603523911a17befd6bb2b2881cc82ca9c4875bdc49c7b4b0c
                                                                  • Instruction Fuzzy Hash: F7F0C074B26F4991EB87CB15AC553D027A07B5D760F44D666A85E41730FF68D3DC9300
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: ?terminate@@C_specific_handler
                                                                  • String ID: csm$f
                                                                  • API String ID: 2859504863-629598281
                                                                  • Opcode ID: 7f38064bf84f83e2da008ef77d2bc27bf8bfc6624cbad9441c0f0498e1572bce
                                                                  • Instruction ID: d8af0d244737bd96d47b441d0cdb5588ea9a02764b58c3b2b79adbe2221d83fc
                                                                  • Opcode Fuzzy Hash: 7f38064bf84f83e2da008ef77d2bc27bf8bfc6624cbad9441c0f0498e1572bce
                                                                  • Instruction Fuzzy Hash: 78D05E3982094C81FFEB376150463E919C0A72CB88F18C010FD500C282BE29CBBD8742
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: _errno
                                                                  • String ID:
                                                                  • API String ID: 2918714741-0
                                                                  • Opcode ID: 64169f0de9148cba93a94b23cde77ed5616a539a806e978f060aeee07665ae95
                                                                  • Instruction ID: b4c25039a5e367aa9eadbe8b47c637cb2dab23a3a00ca16383e83dad19a33ec9
                                                                  • Opcode Fuzzy Hash: 64169f0de9148cba93a94b23cde77ed5616a539a806e978f060aeee07665ae95
                                                                  • Instruction Fuzzy Hash: DD716E322047C886E7A6DF29A8803EE76A4F7597C8F148115FF8917B99CF79C6948B10
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: _errno$freestrtol
                                                                  • String ID:
                                                                  • API String ID: 3444388478-0
                                                                  • Opcode ID: 0535ea31191012cb0ebb1afcc0821a21b4e33bf00769aa06bf1cc059e2b9d95a
                                                                  • Instruction ID: 3594dde9a326aa4b8f2b59f85447f76c2ce1c5b2a12f24d1702eb303a5c88620
                                                                  • Opcode Fuzzy Hash: 0535ea31191012cb0ebb1afcc0821a21b4e33bf00769aa06bf1cc059e2b9d95a
                                                                  • Instruction Fuzzy Hash: 5E517E3260478C86FBA2CF15E0407EAB7A1F3997D8F108016FA4947B99CF79D689CB10
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: _errno$freestrtol
                                                                  • String ID:
                                                                  • API String ID: 3444388478-0
                                                                  • Opcode ID: 4123794607728ac7d8285b0ca81476db4304b0a98aa376d898cb4ad2edb44a44
                                                                  • Instruction ID: cb2ca2e76594b4d565196faaffe70d983b25cd8198377d698b3980531248ab77
                                                                  • Opcode Fuzzy Hash: 4123794607728ac7d8285b0ca81476db4304b0a98aa376d898cb4ad2edb44a44
                                                                  • Instruction Fuzzy Hash: B6414E3220478C86FBA2DF15E0407EAB7A1E7997D8F148017FA4947B99CF79D689CB10
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: CopyMemory$memset
                                                                  • String ID:
                                                                  • API String ID: 2685965848-0
                                                                  • Opcode ID: e6b595ed9eac46fe0a6f8968eb00a07e6a0e6c2457ad58b6a2533e7af3dbf1af
                                                                  • Instruction ID: 3e1ef25bd6a04dfa44c655fa15ffa098bb5a7d5c6890a3a97510f97d159ad76b
                                                                  • Opcode Fuzzy Hash: e6b595ed9eac46fe0a6f8968eb00a07e6a0e6c2457ad58b6a2533e7af3dbf1af
                                                                  • Instruction Fuzzy Hash: 0C31A032604BC895EB969F21D49039A7BA0F75DBD4F588221FB8A47785DFBCC649C301
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: (null)$0
                                                                  • API String ID: 0-38302674
                                                                  • Opcode ID: 7855268e428f67f01df85f77ed174941f8b83656bd2305661a4cef01b1e4b8ca
                                                                  • Instruction ID: 481108fa4de768a69059f33bd072525b723e4b801b254d1e1887360759fd7071
                                                                  • Opcode Fuzzy Hash: 7855268e428f67f01df85f77ed174941f8b83656bd2305661a4cef01b1e4b8ca
                                                                  • Instruction Fuzzy Hash: ADA19172208AC885E7A6CF29D0507ED37A1F35ABC8F649119EE8D67784DF35CA89C740
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: _errno
                                                                  • String ID: 0
                                                                  • API String ID: 2918714741-4108050209
                                                                  • Opcode ID: 7b167722fbbc0dc4659ea105ef812dc618b6e1e2f6db5385e36cf627f454b43f
                                                                  • Instruction ID: 5d9bdeb246628ad68f02a7b20af31a85a0c89628fb5b38ee8b6c2d68fc60ad04
                                                                  • Opcode Fuzzy Hash: 7b167722fbbc0dc4659ea105ef812dc618b6e1e2f6db5385e36cf627f454b43f
                                                                  • Instruction Fuzzy Hash: C3919D72204AC886EBE6CF24D0407ED77A1F35ABD8F649115EA4D67785DF32CA8AC740
                                                                  APIs
                                                                  • GetProcAddress.KERNEL32(?,?,?,00000001800105EF,?,?,?,?,?,?,?,?,000000018000E1AF), ref: 0000000180010BC4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1277458618.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1277429637.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.0000000180013000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.000000018008E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277499085.00000001800B4000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277745093.0000000180164000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1277790173.0000000180168000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_180000000_360safe.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc
                                                                  • String ID: msvcrt.dll
                                                                  • API String ID: 190572456-370904613
                                                                  • Opcode ID: a01668f4adbfb72dc07825cc0141ff6225fd7b0af2ff7a7115459b4a557bfec6
                                                                  • Instruction ID: 63edd3773b1c2459ec4127de9ad35de3634355506139c96baaa1d733485e0519
                                                                  • Opcode Fuzzy Hash: a01668f4adbfb72dc07825cc0141ff6225fd7b0af2ff7a7115459b4a557bfec6
                                                                  • Instruction Fuzzy Hash: 54118E32306F4885EE968B16BD503956290AB4CBF4F088635AEBE47BD4DF2CC5844300

                                                                  Execution Graph

                                                                  Execution Coverage:1.5%
                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                  Signature Coverage:59%
                                                                  Total number of Nodes:571
                                                                  Total number of Limit Nodes:76
                                                                  execution_graph 51115 2287a7d0345 51116 2287a7d03ff 51115->51116 51118 2287a7d0360 51115->51118 51117 2287a7d0387 VirtualFree 51117->51118 51118->51116 51118->51117 51119 2287a7d0000 51122 2287a7d0a68 51119->51122 51121 2287a7d0019 51123 2287a7d0a84 51122->51123 51125 2287a7d0b0e 51123->51125 51126 2287a7d0768 51123->51126 51125->51121 51129 2287a7d0778 51126->51129 51128 2287a7d0771 51128->51125 51130 2287a7d07a8 51129->51130 51132 2287a7d088a 51130->51132 51133 2287a7d0508 51130->51133 51132->51128 51134 2287a7d052c 51133->51134 51135 2287a7d06fa 51134->51135 51136 2287a7d061d LoadLibraryA 51134->51136 51135->51132 51136->51134 51136->51135 51137 2287b4fff80 CreateProcessW 51138 2287b500026 GetLastError 51137->51138 51139 2287b500057 SuspendThread 51137->51139 51140 2287b500038 CloseHandle 51138->51140 51141 2287b500043 51138->51141 51145 2287b4ffb40 VirtualAllocEx 51139->51145 51140->51141 51143 2287b50004d CloseHandle 51141->51143 51144 2287b500053 51141->51144 51143->51144 51146 2287b4ffbaa VirtualAllocEx 51145->51146 51147 2287b4ffb9f GetLastError 51145->51147 51148 2287b4ffbf9 GetLastError 51146->51148 51149 2287b4ffbd9 WriteProcessMemory 51146->51149 51154 2287b4ffe3b 51147->51154 51148->51154 51149->51148 51150 2287b4ffc04 VirtualAllocEx 51149->51150 51151 2287b4ffe33 GetLastError 51150->51151 51152 2287b4ffc37 WriteProcessMemory 51150->51152 51151->51154 51152->51151 51153 2287b4ffc5c 51152->51153 51163 2287b4ff6c0 51153->51163 51154->51144 51156 2287b4ffc64 WriteProcessMemory 51156->51151 51158 2287b4ffd62 VirtualProtectEx VirtualProtectEx 51156->51158 51159 2287b4ffde8 51158->51159 51160 2287b4ffdad memset GetThreadContext SetThreadContext 51158->51160 51159->51154 51162 2287b4ffded memset Wow64GetThreadContext Wow64SetThreadContext 51159->51162 51161 2287b4ffe26 ResumeThread 51160->51161 51161->51151 51161->51154 51162->51161 51164 2287b4ff851 51163->51164 51165 2287b4ff6d4 51163->51165 51164->51156 51165->51164 51166 2287b4ff6e4 VirtualAlloc 51165->51166 51167 2287b4ff710 memcpy 51166->51167 51168 2287b4ff81a 51166->51168 51169 2287b4ff724 51167->51169 51168->51156 51170 2287b4ff839 VirtualFree 51169->51170 51171 2287b4ff7fa 51169->51171 51170->51168 51172 2287b4ff82f VirtualFree 51171->51172 51173 2287b4ff80f VirtualFree 51171->51173 51172->51168 51173->51168 51178 2287bc26f90 IsBadReadPtr 51179 2287bc26fa8 51178->51179 51180 2287bc27021 51178->51180 51179->51180 51181 2287bc26fad EnterCriticalSection 51179->51181 51182 2287bc26fea LeaveCriticalSection DeleteCriticalSection VirtualFree 51181->51182 51183 2287bc26fc9 51181->51183 51182->51180 51184 2287bc26fd0 VirtualFree 51183->51184 51184->51182 51184->51184 51185 2287ad40000 51188 2287ad40a68 51185->51188 51187 2287ad40019 51189 2287ad40a84 51188->51189 51191 2287ad40b0e 51189->51191 51192 2287ad40768 51189->51192 51191->51187 51195 2287ad40778 51192->51195 51194 2287ad40771 51194->51191 51196 2287ad407a8 51195->51196 51198 2287ad4088a 51196->51198 51199 2287ad40508 51196->51199 51198->51194 51202 2287ad4052c 51199->51202 51200 2287ad4061d LoadLibraryA 51201 2287ad406fa 51200->51201 51200->51202 51201->51198 51202->51200 51202->51201 51203 2287ad406c1 GetProcAddressForCaller 51202->51203 51203->51201 51203->51202 51204 1800019d0 DeleteFileW 51205 1800019e3 SleepEx DeleteFileW 51204->51205 51206 1800019fb 51204->51206 51205->51205 51205->51206 51207 2287b4f23e0 51426 2287b50ba20 8 API calls 51207->51426 51209 2287b4f23f6 51275 2287b50d3d0 GetModuleHandleW 51209->51275 51211 2287b4f23fb WSAStartup 51212 2287b4f2415 51211->51212 51243 2287b4f260b 51211->51243 51285 2287b50d860 CoInitializeEx 51212->51285 51214 2287b4f243a GetCommandLineW CommandLineToArgvW 51427 2287b4fb120 10 API calls 51214->51427 51216 2287b4f2462 VirtualAlloc 51217 2287b4f2494 VirtualAlloc 51216->51217 51218 2287b4f2483 InitializeCriticalSection 51216->51218 51219 2287b4f24cb memset GetCurrentProcessId 51217->51219 51220 2287b4f24ba InitializeCriticalSection 51217->51220 51218->51217 51295 2287b50c9e0 memset CreateToolhelp32Snapshot 51219->51295 51220->51219 51223 2287b4f2513 lstrcmpiW 51225 2287b4f2537 lstrcmpiW 51223->51225 51226 2287b4f2529 51223->51226 51224 2287b4f250e 51224->51223 51228 2287b4f255e lstrcmpiW 51225->51228 51229 2287b4f254d GetCurrentProcess TerminateProcess 51225->51229 51428 2287b4f2990 GetModuleHandleW GetModuleHandleW GetModuleHandleW VirtualProtect VirtualProtect 51226->51428 51231 2287b4f2680 51228->51231 51232 2287b4f2578 51228->51232 51229->51228 51230 2287b4f252e ExitThread 51234 2287b4f271d lstrcmpiW 51231->51234 51235 2287b4f268d memset GetModuleFileNameW wcsstr 51231->51235 51302 2287b50d1d0 OpenSCManagerW 51232->51302 51236 2287b4f2736 51234->51236 51237 2287b4f27ec 51234->51237 51239 2287b4f2713 51235->51239 51240 2287b4f26cf GetNativeSystemInfo 51235->51240 51242 2287b4f2743 lstrcmpiW 51236->51242 51236->51243 51434 2287b4f2000 103 API calls 51237->51434 51431 2287b4f2140 56 API calls 51239->51431 51247 2287b4f26fb 51240->51247 51248 2287b4f2798 51240->51248 51242->51237 51249 2287b4f275c GetNativeSystemInfo 51242->51249 51245 2287b4f2594 51311 2287b50caf0 CreateToolhelp32Snapshot 51245->51311 51246 2287b4f2641 CreateThread 51246->51246 51251 2287b4f2667 WaitForSingleObject CloseHandle 51246->51251 51247->51248 51254 2287b4f2705 51247->51254 51253 2287b50d1d0 10 API calls 51248->51253 51249->51248 51256 2287b4f2784 51249->51256 51251->51246 51258 2287b4f27a4 51253->51258 51430 2287b4f2810 84 API calls 51254->51430 51256->51248 51264 2287b4f278a 51256->51264 51257 2287b4f25a0 51259 2287b4f25a4 OpenProcess 51257->51259 51260 2287b4f25d0 51257->51260 51261 2287b4f27d1 51258->51261 51262 2287b4f27aa 51258->51262 51259->51260 51265 2287b4f25bc TerminateProcess CloseHandle 51259->51265 51273 2287b4f2634 Sleep 51260->51273 51274 2287b4f25dd WaitForSingleObject GetExitCodeProcess 51260->51274 51429 2287b4f2810 84 API calls 51260->51429 51433 2287b4f2810 84 API calls 51261->51433 51322 2287b5007e0 VirtualAlloc 51262->51322 51263 2287b4f270a ExitProcess 51432 2287b4f2810 84 API calls 51264->51432 51265->51260 51271 2287b4f27d6 GetCurrentProcess TerminateProcess 51271->51243 51272 2287b4f278f ExitProcess 51273->51260 51274->51243 51274->51260 51276 2287b50d401 GetCurrentProcess K32GetModuleInformation memset GetSystemDirectoryW 51275->51276 51277 2287b50d620 51275->51277 51278 2287b50d60d 51276->51278 51279 2287b50d455 lstrcatW CreateFileW 51276->51279 51277->51211 51278->51211 51280 2287b50d4a5 CreateFileMappingW 51279->51280 51282 2287b50d5c8 51279->51282 51281 2287b50d4cc MapViewOfFile 51280->51281 51280->51282 51281->51282 51283 2287b50d4f9 51281->51283 51282->51211 51283->51282 51284 2287b50d565 VirtualProtect memcpy VirtualProtect 51283->51284 51284->51283 51286 2287b50d8be CoCreateInstance 51285->51286 51287 2287b50d955 51285->51287 51288 2287b50d8df 51286->51288 51289 2287b50d8fe CoUninitialize 51286->51289 51287->51214 51290 2287b50d90a SysAllocString 51288->51290 51291 2287b50d8f4 51288->51291 51289->51214 51292 2287b50d92d SysFreeString 51290->51292 51291->51289 51293 2287b50d940 CoUninitialize 51292->51293 51293->51287 51296 2287b50ca21 Process32FirstW 51295->51296 51297 2287b4f24f6 lstrcmpiW 51295->51297 51298 2287b50ca3f 51296->51298 51301 2287b50ca58 51296->51301 51297->51223 51297->51224 51300 2287b50ca46 Process32NextW 51298->51300 51298->51301 51299 2287b50cace CloseHandle 51299->51297 51300->51298 51300->51301 51301->51297 51301->51299 51301->51301 51303 2287b50d207 EnumServicesStatusExW malloc 51302->51303 51310 2287b4f2584 GetCurrentProcessId 51302->51310 51304 2287b50d264 memset EnumServicesStatusExW 51303->51304 51303->51310 51305 2287b50d2b8 CloseServiceHandle free 51304->51305 51306 2287b50d2dd CloseServiceHandle 51304->51306 51305->51310 51308 2287b50d2ee 51306->51308 51306->51310 51307 2287b50d2f0 lstrcmpiW 51307->51308 51309 2287b50d316 free 51307->51309 51308->51307 51308->51310 51309->51310 51310->51245 51310->51246 51312 2287b50cb1a 51311->51312 51313 2287b50cb2d GetProcessHeap HeapAlloc 51311->51313 51312->51257 51314 2287b50cb61 Process32FirstW 51313->51314 51315 2287b50cb57 CloseHandle 51313->51315 51317 2287b50cbac GetProcessHeap HeapFree CloseHandle 51314->51317 51318 2287b50cb74 51314->51318 51316 2287b50cbcc 51315->51316 51316->51257 51317->51316 51319 2287b50cb80 lstrcmpiW 51318->51319 51320 2287b50cb91 Process32NextW 51319->51320 51321 2287b50cba1 51319->51321 51320->51319 51320->51321 51321->51317 51323 2287b500809 GetCurrentProcess OpenProcessToken 51322->51323 51324 2287b4f27b6 51322->51324 51325 2287b5008a1 VirtualAlloc 51323->51325 51326 2287b500843 LookupPrivilegeValueW AdjustTokenPrivileges GetLastError 51323->51326 51324->51271 51327 2287b5008c0 InitializeCriticalSection 51325->51327 51328 2287b5008d1 IsBadReadPtr 51325->51328 51326->51325 51329 2287b500891 51326->51329 51327->51328 51330 2287b50093c IsBadReadPtr 51328->51330 51331 2287b5008e7 51328->51331 51329->51325 51332 2287b50089b CloseHandle 51329->51332 51334 2287b500952 51330->51334 51335 2287b5009a7 IsBadReadPtr 51330->51335 51331->51330 51333 2287b5008ec EnterCriticalSection VirtualAlloc 51331->51333 51332->51325 51336 2287b500932 LeaveCriticalSection 51333->51336 51337 2287b500912 51333->51337 51334->51335 51338 2287b500957 EnterCriticalSection VirtualAlloc 51334->51338 51339 2287b5009bd 51335->51339 51340 2287b500a12 IsBadReadPtr 51335->51340 51336->51330 51337->51336 51343 2287b50099d LeaveCriticalSection 51338->51343 51344 2287b50097d 51338->51344 51339->51340 51345 2287b5009c2 EnterCriticalSection VirtualAlloc 51339->51345 51341 2287b500a28 51340->51341 51342 2287b500a7d IsBadReadPtr 51340->51342 51341->51342 51346 2287b500a2d EnterCriticalSection VirtualAlloc 51341->51346 51347 2287b500ae8 IsBadReadPtr 51342->51347 51348 2287b500a93 51342->51348 51343->51335 51344->51343 51349 2287b500a08 LeaveCriticalSection 51345->51349 51350 2287b5009e8 51345->51350 51351 2287b500a73 LeaveCriticalSection 51346->51351 51352 2287b500a53 51346->51352 51354 2287b500afe 51347->51354 51355 2287b500b53 IsBadReadPtr 51347->51355 51348->51347 51353 2287b500a98 EnterCriticalSection VirtualAlloc 51348->51353 51349->51340 51350->51349 51351->51342 51352->51351 51358 2287b500ade LeaveCriticalSection 51353->51358 51359 2287b500abe 51353->51359 51354->51355 51360 2287b500b03 EnterCriticalSection VirtualAlloc 51354->51360 51356 2287b500b69 51355->51356 51357 2287b500bbe IsBadReadPtr 51355->51357 51356->51357 51361 2287b500b6e EnterCriticalSection VirtualAlloc 51356->51361 51362 2287b500c29 IsBadReadPtr 51357->51362 51363 2287b500bd4 51357->51363 51358->51347 51359->51358 51364 2287b500b49 LeaveCriticalSection 51360->51364 51365 2287b500b29 51360->51365 51366 2287b500bb4 LeaveCriticalSection 51361->51366 51367 2287b500b94 51361->51367 51369 2287b500c7c 51362->51369 51370 2287b500c3f 51362->51370 51363->51362 51368 2287b500bd9 EnterCriticalSection VirtualAlloc 51363->51368 51364->51355 51365->51364 51366->51357 51367->51366 51372 2287b500c1f LeaveCriticalSection 51368->51372 51373 2287b500bff 51368->51373 51371 2287b500c7f IsBadReadPtr 51369->51371 51370->51369 51374 2287b500c44 EnterCriticalSection 51370->51374 51375 2287b500c98 51371->51375 51376 2287b500cce 51371->51376 51372->51362 51373->51372 51377 2287b500c59 51374->51377 51378 2287b500c73 LeaveCriticalSection 51374->51378 51375->51376 51379 2287b500c9d EnterCriticalSection 51375->51379 51380 2287b500cd1 IsBadReadPtr 51376->51380 51377->51378 51385 2287b500f01 LeaveCriticalSection 51377->51385 51378->51369 51381 2287b500cb2 51379->51381 51382 2287b500cc5 LeaveCriticalSection 51379->51382 51383 2287b500ceb 51380->51383 51384 2287b500d21 51380->51384 51381->51382 51386 2287b500f13 LeaveCriticalSection 51381->51386 51382->51376 51383->51384 51387 2287b500cf0 EnterCriticalSection 51383->51387 51388 2287b500d24 IsBadReadPtr 51384->51388 51385->51371 51386->51380 51391 2287b500d18 LeaveCriticalSection 51387->51391 51392 2287b500d05 51387->51392 51389 2287b500d7c 51388->51389 51390 2287b500d3e 51388->51390 51394 2287b500d7f IsBadReadPtr 51389->51394 51390->51389 51393 2287b500d43 EnterCriticalSection 51390->51393 51391->51384 51392->51391 51395 2287b500f25 LeaveCriticalSection 51392->51395 51396 2287b500d58 51393->51396 51397 2287b500d73 LeaveCriticalSection 51393->51397 51398 2287b500d99 51394->51398 51399 2287b500dcf 51394->51399 51395->51388 51396->51397 51402 2287b500f37 LeaveCriticalSection 51396->51402 51397->51389 51398->51399 51400 2287b500d9e EnterCriticalSection 51398->51400 51401 2287b500dd2 IsBadReadPtr 51399->51401 51403 2287b500db3 51400->51403 51404 2287b500dc6 LeaveCriticalSection 51400->51404 51405 2287b500dec 51401->51405 51406 2287b500e22 51401->51406 51402->51394 51403->51404 51409 2287b500f49 LeaveCriticalSection 51403->51409 51404->51399 51405->51406 51407 2287b500df1 EnterCriticalSection 51405->51407 51408 2287b500e25 IsBadReadPtr 51406->51408 51410 2287b500e19 LeaveCriticalSection 51407->51410 51411 2287b500e06 51407->51411 51412 2287b500e7c 51408->51412 51413 2287b500e3f 51408->51413 51409->51401 51410->51406 51411->51410 51414 2287b500f5b LeaveCriticalSection 51411->51414 51416 2287b500e7f IsBadReadPtr 51412->51416 51413->51412 51415 2287b500e44 EnterCriticalSection 51413->51415 51414->51408 51417 2287b500e59 51415->51417 51418 2287b500e73 LeaveCriticalSection 51415->51418 51419 2287b500e99 51416->51419 51420 2287b500ecf 51416->51420 51417->51418 51424 2287b500f6d LeaveCriticalSection 51417->51424 51418->51412 51419->51420 51421 2287b500e9e EnterCriticalSection 51419->51421 51420->51324 51422 2287b500eb3 51421->51422 51423 2287b500ec6 LeaveCriticalSection 51421->51423 51422->51423 51425 2287b500f7f LeaveCriticalSection 51422->51425 51423->51420 51424->51416 51425->51420 51426->51209 51427->51216 51428->51230 51429->51260 51430->51263 51431->51243 51432->51272 51433->51271 51435 2287b506f90 IsBadReadPtr 51436 2287b506fa8 51435->51436 51437 2287b507021 51435->51437 51436->51437 51438 2287b506fad EnterCriticalSection 51436->51438 51439 2287b506fc9 51438->51439 51440 2287b506fea LeaveCriticalSection DeleteCriticalSection VirtualFree 51438->51440 51441 2287b506fd0 VirtualFree 51439->51441 51440->51437 51441->51440 51441->51441 51442 2287bc123e0 51661 2287bc2ba20 8 API calls 51442->51661 51444 2287bc123f6 51510 2287bc2d3d0 GetModuleHandleW 51444->51510 51446 2287bc123fb WSAStartup 51447 2287bc12415 51446->51447 51477 2287bc1260b 51446->51477 51520 2287bc2d860 CoInitializeEx 51447->51520 51449 2287bc1243a GetCommandLineW CommandLineToArgvW 51662 2287bc1b120 10 API calls 51449->51662 51451 2287bc12462 VirtualAlloc 51452 2287bc12483 InitializeCriticalSection 51451->51452 51453 2287bc12494 VirtualAlloc 51451->51453 51452->51453 51454 2287bc124cb memset GetCurrentProcessId 51453->51454 51455 2287bc124ba InitializeCriticalSection 51453->51455 51530 2287bc2c9e0 memset CreateToolhelp32Snapshot 51454->51530 51455->51454 51458 2287bc1250e 51459 2287bc12513 lstrcmpiW 51458->51459 51460 2287bc12529 51459->51460 51461 2287bc12537 lstrcmpiW 51459->51461 51663 2287bc12990 GetModuleHandleW GetModuleHandleW GetModuleHandleW VirtualProtect VirtualProtect 51460->51663 51463 2287bc1254d GetCurrentProcess TerminateProcess 51461->51463 51464 2287bc1255e lstrcmpiW 51461->51464 51463->51464 51466 2287bc12578 51464->51466 51467 2287bc12680 51464->51467 51465 2287bc1252e ExitThread 51537 2287bc2d1d0 OpenSCManagerW 51466->51537 51469 2287bc1271d lstrcmpiW 51467->51469 51470 2287bc1268d memset GetModuleFileNameW wcsstr 51467->51470 51471 2287bc127ec 51469->51471 51472 2287bc12736 51469->51472 51474 2287bc126cf GetNativeSystemInfo 51470->51474 51475 2287bc12713 51470->51475 51669 2287bc12000 103 API calls 51471->51669 51472->51477 51478 2287bc12743 lstrcmpiW 51472->51478 51482 2287bc12798 51474->51482 51483 2287bc126fb 51474->51483 51666 2287bc12140 56 API calls 51475->51666 51478->51471 51485 2287bc1275c GetNativeSystemInfo 51478->51485 51480 2287bc12641 CreateThread 51480->51480 51487 2287bc12667 WaitForSingleObject CloseHandle 51480->51487 51481 2287bc12594 51546 2287bc2caf0 CreateToolhelp32Snapshot 51481->51546 51489 2287bc2d1d0 10 API calls 51482->51489 51483->51482 51484 2287bc12705 51483->51484 51665 2287bc12810 84 API calls 51484->51665 51485->51482 51493 2287bc12784 51485->51493 51487->51480 51491 2287bc127a4 51489->51491 51490 2287bc125a0 51494 2287bc125d0 51490->51494 51495 2287bc125a4 OpenProcess 51490->51495 51496 2287bc127aa 51491->51496 51497 2287bc127d1 51491->51497 51493->51482 51499 2287bc1278a 51493->51499 51508 2287bc125dd WaitForSingleObject GetExitCodeProcess 51494->51508 51509 2287bc12634 Sleep 51494->51509 51664 2287bc12810 84 API calls 51494->51664 51495->51494 51500 2287bc125bc TerminateProcess CloseHandle 51495->51500 51557 2287bc207e0 VirtualAlloc 51496->51557 51668 2287bc12810 84 API calls 51497->51668 51498 2287bc1270a ExitProcess 51667 2287bc12810 84 API calls 51499->51667 51500->51494 51506 2287bc127d6 GetCurrentProcess TerminateProcess 51506->51477 51507 2287bc1278f ExitProcess 51508->51477 51508->51494 51509->51494 51511 2287bc2d401 GetCurrentProcess K32GetModuleInformation memset GetSystemDirectoryW 51510->51511 51512 2287bc2d620 51510->51512 51513 2287bc2d60d 51511->51513 51514 2287bc2d455 lstrcatW CreateFileW 51511->51514 51512->51446 51513->51446 51515 2287bc2d4a5 CreateFileMappingW 51514->51515 51517 2287bc2d5c8 51514->51517 51516 2287bc2d4cc MapViewOfFile 51515->51516 51515->51517 51516->51517 51518 2287bc2d4f9 51516->51518 51517->51446 51518->51517 51519 2287bc2d565 VirtualProtect memcpy VirtualProtect 51518->51519 51519->51518 51521 2287bc2d8be CoCreateInstance 51520->51521 51522 2287bc2d955 51520->51522 51523 2287bc2d8fe CoUninitialize 51521->51523 51524 2287bc2d8df 51521->51524 51522->51449 51523->51449 51525 2287bc2d90a SysAllocString 51524->51525 51526 2287bc2d8f4 51524->51526 51527 2287bc2d92d SysFreeString 51525->51527 51526->51523 51528 2287bc2d940 CoUninitialize 51527->51528 51528->51522 51531 2287bc2ca21 Process32FirstW 51530->51531 51532 2287bc124f6 lstrcmpiW 51530->51532 51533 2287bc2ca3f 51531->51533 51535 2287bc2ca58 51531->51535 51532->51458 51532->51459 51533->51535 51536 2287bc2ca46 Process32NextW 51533->51536 51534 2287bc2cace CloseHandle 51534->51532 51535->51532 51535->51534 51536->51533 51536->51535 51538 2287bc12584 GetCurrentProcessId 51537->51538 51539 2287bc2d207 EnumServicesStatusExW malloc 51537->51539 51538->51480 51538->51481 51539->51538 51540 2287bc2d264 memset EnumServicesStatusExW 51539->51540 51541 2287bc2d2b8 CloseServiceHandle free 51540->51541 51542 2287bc2d2dd CloseServiceHandle 51540->51542 51541->51538 51542->51538 51543 2287bc2d2ee 51542->51543 51543->51538 51544 2287bc2d2f0 lstrcmpiW 51543->51544 51544->51543 51545 2287bc2d316 free 51544->51545 51545->51538 51547 2287bc2cb1a 51546->51547 51548 2287bc2cb2d GetProcessHeap HeapAlloc 51546->51548 51547->51490 51549 2287bc2cb61 Process32FirstW 51548->51549 51550 2287bc2cb57 CloseHandle 51548->51550 51552 2287bc2cbac GetProcessHeap HeapFree CloseHandle 51549->51552 51553 2287bc2cb74 51549->51553 51551 2287bc2cbcc 51550->51551 51551->51490 51552->51551 51554 2287bc2cb80 lstrcmpiW 51553->51554 51555 2287bc2cba1 51554->51555 51556 2287bc2cb91 Process32NextW 51554->51556 51555->51552 51556->51554 51556->51555 51558 2287bc127b6 51557->51558 51559 2287bc20809 GetCurrentProcess OpenProcessToken 51557->51559 51558->51506 51560 2287bc20843 LookupPrivilegeValueW AdjustTokenPrivileges GetLastError 51559->51560 51561 2287bc208a1 VirtualAlloc 51559->51561 51560->51561 51562 2287bc20891 51560->51562 51563 2287bc208c0 InitializeCriticalSection 51561->51563 51564 2287bc208d1 IsBadReadPtr 51561->51564 51562->51561 51565 2287bc2089b CloseHandle 51562->51565 51563->51564 51566 2287bc2093c IsBadReadPtr 51564->51566 51567 2287bc208e7 51564->51567 51565->51561 51569 2287bc20952 51566->51569 51570 2287bc209a7 IsBadReadPtr 51566->51570 51567->51566 51568 2287bc208ec EnterCriticalSection VirtualAlloc 51567->51568 51573 2287bc20932 LeaveCriticalSection 51568->51573 51574 2287bc20912 51568->51574 51569->51570 51575 2287bc20957 EnterCriticalSection VirtualAlloc 51569->51575 51571 2287bc209bd 51570->51571 51572 2287bc20a12 IsBadReadPtr 51570->51572 51571->51572 51576 2287bc209c2 EnterCriticalSection VirtualAlloc 51571->51576 51577 2287bc20a28 51572->51577 51578 2287bc20a7d IsBadReadPtr 51572->51578 51573->51566 51574->51573 51579 2287bc2099d LeaveCriticalSection 51575->51579 51580 2287bc2097d 51575->51580 51581 2287bc20a08 LeaveCriticalSection 51576->51581 51582 2287bc209e8 51576->51582 51577->51578 51583 2287bc20a2d EnterCriticalSection VirtualAlloc 51577->51583 51584 2287bc20ae8 IsBadReadPtr 51578->51584 51585 2287bc20a93 51578->51585 51579->51570 51580->51579 51581->51572 51582->51581 51588 2287bc20a73 LeaveCriticalSection 51583->51588 51589 2287bc20a53 51583->51589 51586 2287bc20afe 51584->51586 51587 2287bc20b53 IsBadReadPtr 51584->51587 51585->51584 51590 2287bc20a98 EnterCriticalSection VirtualAlloc 51585->51590 51586->51587 51591 2287bc20b03 EnterCriticalSection VirtualAlloc 51586->51591 51592 2287bc20b69 51587->51592 51593 2287bc20bbe IsBadReadPtr 51587->51593 51588->51578 51589->51588 51594 2287bc20ade LeaveCriticalSection 51590->51594 51595 2287bc20abe 51590->51595 51596 2287bc20b49 LeaveCriticalSection 51591->51596 51597 2287bc20b29 51591->51597 51592->51593 51598 2287bc20b6e EnterCriticalSection VirtualAlloc 51592->51598 51599 2287bc20c29 IsBadReadPtr 51593->51599 51600 2287bc20bd4 51593->51600 51594->51584 51595->51594 51596->51587 51597->51596 51601 2287bc20bb4 LeaveCriticalSection 51598->51601 51602 2287bc20b94 51598->51602 51604 2287bc20c3f 51599->51604 51605 2287bc20c7c 51599->51605 51600->51599 51603 2287bc20bd9 EnterCriticalSection VirtualAlloc 51600->51603 51601->51593 51602->51601 51608 2287bc20c1f LeaveCriticalSection 51603->51608 51609 2287bc20bff 51603->51609 51604->51605 51606 2287bc20c44 EnterCriticalSection 51604->51606 51607 2287bc20c7f IsBadReadPtr 51605->51607 51610 2287bc20c59 51606->51610 51611 2287bc20c73 LeaveCriticalSection 51606->51611 51612 2287bc20c98 51607->51612 51613 2287bc20cce 51607->51613 51608->51599 51609->51608 51610->51611 51616 2287bc20f01 LeaveCriticalSection 51610->51616 51611->51605 51612->51613 51614 2287bc20c9d EnterCriticalSection 51612->51614 51615 2287bc20cd1 IsBadReadPtr 51613->51615 51617 2287bc20cb2 51614->51617 51618 2287bc20cc5 LeaveCriticalSection 51614->51618 51619 2287bc20ceb 51615->51619 51620 2287bc20d21 51615->51620 51616->51607 51617->51618 51622 2287bc20f13 LeaveCriticalSection 51617->51622 51618->51613 51619->51620 51623 2287bc20cf0 EnterCriticalSection 51619->51623 51621 2287bc20d24 IsBadReadPtr 51620->51621 51626 2287bc20d3e 51621->51626 51627 2287bc20d7c 51621->51627 51622->51615 51624 2287bc20d18 LeaveCriticalSection 51623->51624 51625 2287bc20d05 51623->51625 51624->51620 51625->51624 51628 2287bc20f25 LeaveCriticalSection 51625->51628 51626->51627 51629 2287bc20d43 EnterCriticalSection 51626->51629 51630 2287bc20d7f IsBadReadPtr 51627->51630 51628->51621 51631 2287bc20d58 51629->51631 51632 2287bc20d73 LeaveCriticalSection 51629->51632 51633 2287bc20d99 51630->51633 51634 2287bc20dcf 51630->51634 51631->51632 51639 2287bc20f37 LeaveCriticalSection 51631->51639 51632->51627 51633->51634 51636 2287bc20d9e EnterCriticalSection 51633->51636 51635 2287bc20dd2 IsBadReadPtr 51634->51635 51637 2287bc20dec 51635->51637 51638 2287bc20e22 51635->51638 51640 2287bc20db3 51636->51640 51641 2287bc20dc6 LeaveCriticalSection 51636->51641 51637->51638 51643 2287bc20df1 EnterCriticalSection 51637->51643 51644 2287bc20e25 IsBadReadPtr 51638->51644 51639->51630 51640->51641 51642 2287bc20f49 LeaveCriticalSection 51640->51642 51641->51634 51642->51635 51645 2287bc20e19 LeaveCriticalSection 51643->51645 51646 2287bc20e06 51643->51646 51647 2287bc20e3f 51644->51647 51648 2287bc20e7c 51644->51648 51645->51638 51646->51645 51650 2287bc20f5b LeaveCriticalSection 51646->51650 51647->51648 51651 2287bc20e44 EnterCriticalSection 51647->51651 51649 2287bc20e7f IsBadReadPtr 51648->51649 51652 2287bc20e99 51649->51652 51653 2287bc20ecf 51649->51653 51650->51644 51654 2287bc20e59 51651->51654 51655 2287bc20e73 LeaveCriticalSection 51651->51655 51652->51653 51656 2287bc20e9e EnterCriticalSection 51652->51656 51653->51558 51654->51655 51659 2287bc20f6d LeaveCriticalSection 51654->51659 51655->51648 51657 2287bc20eb3 51656->51657 51658 2287bc20ec6 LeaveCriticalSection 51656->51658 51657->51658 51660 2287bc20f7f LeaveCriticalSection 51657->51660 51658->51653 51659->51649 51660->51653 51661->51444 51662->51451 51663->51465 51664->51494 51665->51498 51666->51477 51667->51507 51668->51506 51711 180001920 memset GetModuleFileNameW wcsstr 51712 1800019a8 51711->51712 51713 18000197a IsUserAnAdmin 51711->51713 51723 180001010 malloc 51712->51723 51714 180001984 51713->51714 51715 180001995 51713->51715 51760 1800015b0 28 API calls 51714->51760 51720 18000199f ExitProcess 51715->51720 51719 18000198c ExitProcess 51724 180001568 51723->51724 51729 18000104e 51723->51729 51725 18000cb60 8 API calls 51724->51725 51726 18000159f 51725->51726 51761 18000cb60 51726->51761 51727 1800010c4 malloc 51727->51724 51728 1800010db memcpy memcpy 51727->51728 51730 180001120 51728->51730 51729->51727 51730->51724 51731 180001195 memset wsprintfW CreateFileW 51730->51731 51732 180001212 GetLastError 51731->51732 51733 18000121a WriteFile 51731->51733 51734 18000124c SleepEx memset wsprintfW CreateFileW 51732->51734 51735 180001243 CloseHandle 51733->51735 51736 18000123d GetLastError 51733->51736 51737 1800012c4 GetLastError 51734->51737 51738 1800012cc WriteFile 51734->51738 51735->51734 51736->51735 51739 1800012fe SleepEx memset wsprintfW CreateFileW 51737->51739 51740 1800012f5 CloseHandle 51738->51740 51741 1800012ef GetLastError 51738->51741 51742 180001376 GetLastError 51739->51742 51743 18000137e WriteFile 51739->51743 51740->51739 51741->51740 51744 1800013ac Sleep 51742->51744 51745 1800013a3 CloseHandle 51743->51745 51746 18000139d GetLastError 51743->51746 51744->51724 51747 1800013c1 VirtualAlloc 51744->51747 51745->51744 51746->51745 51747->51724 51748 1800013e6 memcpy CreateThread 51747->51748 51770 180001a10 CoInitializeEx 51748->51770 51751 180001523 memset memcpy CreateThread 51751->51724 51752 180001430 VariantInit 51753 180001498 51752->51753 51754 18000149c SysAllocString 51753->51754 51755 1800014be GetLastError 51753->51755 51757 1800014ba 51754->51757 51756 1800014c4 51755->51756 51756->51751 51758 1800014ca memset wsprintfW 51756->51758 51757->51755 51757->51756 51778 180001d60 51758->51778 51760->51719 51762 18000cb69 51761->51762 51763 1800019c0 51762->51763 51764 18000cf14 IsProcessorFeaturePresent 51762->51764 51765 18000cf2c 51764->51765 51791 18000cfe8 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 51765->51791 51767 18000cf3f 51792 18000cee0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 51767->51792 51771 180001b50 51770->51771 51771->51771 51772 180001cae CLSIDFromString 51771->51772 51773 180001d04 IIDFromString 51772->51773 51774 180001d3b 51772->51774 51773->51774 51775 180001d17 CoCreateInstance 51773->51775 51776 18000cb60 8 API calls 51774->51776 51775->51774 51777 180001423 51776->51777 51777->51751 51777->51752 51779 180001da5 SysAllocString 51778->51779 51790 18000206a 51778->51790 51780 180001dbb 51779->51780 51783 180001dd9 SysAllocString SysAllocString 51780->51783 51780->51790 51781 18000cb60 8 API calls 51782 180002086 51781->51782 51782->51751 51784 180001e08 51783->51784 51785 180001f1f IIDFromString 51784->51785 51784->51790 51786 180001f4c 51785->51786 51787 180001f5e SysAllocString SysAllocString 51786->51787 51786->51790 51788 180001f88 51787->51788 51789 180001fd9 VariantInit SysAllocString 51788->51789 51788->51790 51789->51790 51790->51781 51791->51767

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 115 2287bc207e0-2287bc20803 VirtualAlloc 116 2287bc20efb-2287bc20f00 115->116 117 2287bc20809-2287bc20841 GetCurrentProcess OpenProcessToken 115->117 118 2287bc20843-2287bc2088f LookupPrivilegeValueW AdjustTokenPrivileges GetLastError 117->118 119 2287bc208a1-2287bc208be VirtualAlloc 117->119 118->119 120 2287bc20891-2287bc20899 118->120 121 2287bc208c0-2287bc208cd InitializeCriticalSection 119->121 122 2287bc208d1-2287bc208e5 IsBadReadPtr 119->122 120->119 123 2287bc2089b CloseHandle 120->123 121->122 124 2287bc2093c-2287bc20950 IsBadReadPtr 122->124 125 2287bc208e7-2287bc208ea 122->125 123->119 127 2287bc20952-2287bc20955 124->127 128 2287bc209a7-2287bc209bb IsBadReadPtr 124->128 125->124 126 2287bc208ec-2287bc20910 EnterCriticalSection VirtualAlloc 125->126 131 2287bc20932-2287bc20936 LeaveCriticalSection 126->131 132 2287bc20912-2287bc2092f 126->132 127->128 133 2287bc20957-2287bc2097b EnterCriticalSection VirtualAlloc 127->133 129 2287bc209bd-2287bc209c0 128->129 130 2287bc20a12-2287bc20a26 IsBadReadPtr 128->130 129->130 134 2287bc209c2-2287bc209e6 EnterCriticalSection VirtualAlloc 129->134 135 2287bc20a28-2287bc20a2b 130->135 136 2287bc20a7d-2287bc20a91 IsBadReadPtr 130->136 131->124 132->131 137 2287bc2099d-2287bc209a1 LeaveCriticalSection 133->137 138 2287bc2097d-2287bc2099a 133->138 139 2287bc20a08-2287bc20a0c LeaveCriticalSection 134->139 140 2287bc209e8-2287bc20a05 134->140 135->136 141 2287bc20a2d-2287bc20a51 EnterCriticalSection VirtualAlloc 135->141 142 2287bc20ae8-2287bc20afc IsBadReadPtr 136->142 143 2287bc20a93-2287bc20a96 136->143 137->128 138->137 139->130 140->139 146 2287bc20a73-2287bc20a77 LeaveCriticalSection 141->146 147 2287bc20a53-2287bc20a70 141->147 144 2287bc20afe-2287bc20b01 142->144 145 2287bc20b53-2287bc20b67 IsBadReadPtr 142->145 143->142 148 2287bc20a98-2287bc20abc EnterCriticalSection VirtualAlloc 143->148 144->145 149 2287bc20b03-2287bc20b27 EnterCriticalSection VirtualAlloc 144->149 150 2287bc20b69-2287bc20b6c 145->150 151 2287bc20bbe-2287bc20bd2 IsBadReadPtr 145->151 146->136 147->146 152 2287bc20ade-2287bc20ae2 LeaveCriticalSection 148->152 153 2287bc20abe-2287bc20adb 148->153 154 2287bc20b49-2287bc20b4d LeaveCriticalSection 149->154 155 2287bc20b29-2287bc20b46 149->155 150->151 156 2287bc20b6e-2287bc20b92 EnterCriticalSection VirtualAlloc 150->156 157 2287bc20c29-2287bc20c3d IsBadReadPtr 151->157 158 2287bc20bd4-2287bc20bd7 151->158 152->142 153->152 154->145 155->154 159 2287bc20bb4-2287bc20bb8 LeaveCriticalSection 156->159 160 2287bc20b94-2287bc20bb1 156->160 162 2287bc20c3f-2287bc20c42 157->162 163 2287bc20c7c 157->163 158->157 161 2287bc20bd9-2287bc20bfd EnterCriticalSection VirtualAlloc 158->161 159->151 160->159 166 2287bc20c1f-2287bc20c23 LeaveCriticalSection 161->166 167 2287bc20bff-2287bc20c1c 161->167 162->163 164 2287bc20c44-2287bc20c57 EnterCriticalSection 162->164 165 2287bc20c7f-2287bc20c96 IsBadReadPtr 163->165 168 2287bc20c59 164->168 169 2287bc20c73-2287bc20c76 LeaveCriticalSection 164->169 170 2287bc20c98-2287bc20c9b 165->170 171 2287bc20cce 165->171 166->157 167->166 172 2287bc20c60-2287bc20c64 168->172 169->163 170->171 173 2287bc20c9d-2287bc20cb0 EnterCriticalSection 170->173 174 2287bc20cd1-2287bc20ce9 IsBadReadPtr 171->174 175 2287bc20c6a-2287bc20c71 172->175 176 2287bc20f01-2287bc20f0e LeaveCriticalSection 172->176 177 2287bc20cb2-2287bc20cb6 173->177 178 2287bc20cc5-2287bc20cc8 LeaveCriticalSection 173->178 179 2287bc20ceb-2287bc20cee 174->179 180 2287bc20d21 174->180 175->169 175->172 176->165 182 2287bc20cbc-2287bc20cc3 177->182 183 2287bc20f13-2287bc20f20 LeaveCriticalSection 177->183 178->171 179->180 184 2287bc20cf0-2287bc20d03 EnterCriticalSection 179->184 181 2287bc20d24-2287bc20d3c IsBadReadPtr 180->181 187 2287bc20d3e-2287bc20d41 181->187 188 2287bc20d7c 181->188 182->177 182->178 183->174 185 2287bc20d18-2287bc20d1b LeaveCriticalSection 184->185 186 2287bc20d05-2287bc20d09 184->186 185->180 189 2287bc20d0f-2287bc20d16 186->189 190 2287bc20f25-2287bc20f32 LeaveCriticalSection 186->190 187->188 191 2287bc20d43-2287bc20d56 EnterCriticalSection 187->191 192 2287bc20d7f-2287bc20d97 IsBadReadPtr 188->192 189->185 189->186 190->181 193 2287bc20d58 191->193 194 2287bc20d73-2287bc20d76 LeaveCriticalSection 191->194 195 2287bc20d99-2287bc20d9c 192->195 196 2287bc20dcf 192->196 198 2287bc20d60-2287bc20d64 193->198 194->188 195->196 199 2287bc20d9e-2287bc20db1 EnterCriticalSection 195->199 197 2287bc20dd2-2287bc20dea IsBadReadPtr 196->197 200 2287bc20dec-2287bc20def 197->200 201 2287bc20e22 197->201 202 2287bc20d6a-2287bc20d71 198->202 203 2287bc20f37-2287bc20f44 LeaveCriticalSection 198->203 204 2287bc20db3-2287bc20db7 199->204 205 2287bc20dc6-2287bc20dc9 LeaveCriticalSection 199->205 200->201 208 2287bc20df1-2287bc20e04 EnterCriticalSection 200->208 209 2287bc20e25-2287bc20e3d IsBadReadPtr 201->209 202->194 202->198 203->192 206 2287bc20f49-2287bc20f56 LeaveCriticalSection 204->206 207 2287bc20dbd-2287bc20dc4 204->207 205->196 206->197 207->204 207->205 210 2287bc20e19-2287bc20e1c LeaveCriticalSection 208->210 211 2287bc20e06-2287bc20e0a 208->211 212 2287bc20e3f-2287bc20e42 209->212 213 2287bc20e7c 209->213 210->201 215 2287bc20f5b-2287bc20f68 LeaveCriticalSection 211->215 216 2287bc20e10-2287bc20e17 211->216 212->213 217 2287bc20e44-2287bc20e57 EnterCriticalSection 212->217 214 2287bc20e7f-2287bc20e97 IsBadReadPtr 213->214 218 2287bc20e99-2287bc20e9c 214->218 219 2287bc20ecf-2287bc20ef6 214->219 215->209 216->210 216->211 220 2287bc20e59 217->220 221 2287bc20e73-2287bc20e76 LeaveCriticalSection 217->221 218->219 222 2287bc20e9e-2287bc20eb1 EnterCriticalSection 218->222 219->116 223 2287bc20e60-2287bc20e64 220->223 221->213 224 2287bc20eb3-2287bc20eb7 222->224 225 2287bc20ec6-2287bc20ec9 LeaveCriticalSection 222->225 226 2287bc20e6a-2287bc20e71 223->226 227 2287bc20f6d-2287bc20f7a LeaveCriticalSection 223->227 228 2287bc20f7f-2287bc20f8c LeaveCriticalSection 224->228 229 2287bc20ebd-2287bc20ec4 224->229 225->219 226->221 226->223 227->214 228->219 229->224 229->225
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$Leave$EnterRead$AllocVirtual$ProcessToken$AdjustCloseCurrentErrorHandleInitializeLastLookupOpenPrivilegePrivilegesValue
                                                                  • String ID: SeDebugPrivilege
                                                                  • API String ID: 3221255601-2896544425
                                                                  • Opcode ID: a2b6e7ca68953369f1d1bed8feb1e7e4a33665da8ae3e4e728f5fee4189e6249
                                                                  • Instruction ID: 8d7b536ca44cdc2123039aa07b943505edafa436b1a826934a8589a8e72ec35e
                                                                  • Opcode Fuzzy Hash: a2b6e7ca68953369f1d1bed8feb1e7e4a33665da8ae3e4e728f5fee4189e6249
                                                                  • Instruction Fuzzy Hash: 0A320D39302B40E2FB558F91E65C769A376F785B85F68C026CE5A43BA4DF38D5A6C300

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 0 2287b5007e0-2287b500803 VirtualAlloc 1 2287b500809-2287b500841 GetCurrentProcess OpenProcessToken 0->1 2 2287b500efb-2287b500f00 0->2 3 2287b5008a1-2287b5008be VirtualAlloc 1->3 4 2287b500843-2287b50088f LookupPrivilegeValueW AdjustTokenPrivileges GetLastError 1->4 5 2287b5008c0-2287b5008cd InitializeCriticalSection 3->5 6 2287b5008d1-2287b5008e5 IsBadReadPtr 3->6 4->3 7 2287b500891-2287b500899 4->7 5->6 8 2287b50093c-2287b500950 IsBadReadPtr 6->8 9 2287b5008e7-2287b5008ea 6->9 7->3 10 2287b50089b CloseHandle 7->10 12 2287b500952-2287b500955 8->12 13 2287b5009a7-2287b5009bb IsBadReadPtr 8->13 9->8 11 2287b5008ec-2287b500910 EnterCriticalSection VirtualAlloc 9->11 10->3 14 2287b500932-2287b500936 LeaveCriticalSection 11->14 15 2287b500912-2287b50092f 11->15 12->13 16 2287b500957-2287b50097b EnterCriticalSection VirtualAlloc 12->16 17 2287b5009bd-2287b5009c0 13->17 18 2287b500a12-2287b500a26 IsBadReadPtr 13->18 14->8 15->14 21 2287b50099d-2287b5009a1 LeaveCriticalSection 16->21 22 2287b50097d-2287b50099a 16->22 17->18 23 2287b5009c2-2287b5009e6 EnterCriticalSection VirtualAlloc 17->23 19 2287b500a28-2287b500a2b 18->19 20 2287b500a7d-2287b500a91 IsBadReadPtr 18->20 19->20 24 2287b500a2d-2287b500a51 EnterCriticalSection VirtualAlloc 19->24 25 2287b500ae8-2287b500afc IsBadReadPtr 20->25 26 2287b500a93-2287b500a96 20->26 21->13 22->21 27 2287b500a08-2287b500a0c LeaveCriticalSection 23->27 28 2287b5009e8-2287b500a05 23->28 29 2287b500a73-2287b500a77 LeaveCriticalSection 24->29 30 2287b500a53-2287b500a70 24->30 32 2287b500afe-2287b500b01 25->32 33 2287b500b53-2287b500b67 IsBadReadPtr 25->33 26->25 31 2287b500a98-2287b500abc EnterCriticalSection VirtualAlloc 26->31 27->18 28->27 29->20 30->29 36 2287b500ade-2287b500ae2 LeaveCriticalSection 31->36 37 2287b500abe-2287b500adb 31->37 32->33 38 2287b500b03-2287b500b27 EnterCriticalSection VirtualAlloc 32->38 34 2287b500b69-2287b500b6c 33->34 35 2287b500bbe-2287b500bd2 IsBadReadPtr 33->35 34->35 39 2287b500b6e-2287b500b92 EnterCriticalSection VirtualAlloc 34->39 40 2287b500c29-2287b500c3d IsBadReadPtr 35->40 41 2287b500bd4-2287b500bd7 35->41 36->25 37->36 42 2287b500b49-2287b500b4d LeaveCriticalSection 38->42 43 2287b500b29-2287b500b46 38->43 44 2287b500bb4-2287b500bb8 LeaveCriticalSection 39->44 45 2287b500b94-2287b500bb1 39->45 47 2287b500c7c 40->47 48 2287b500c3f-2287b500c42 40->48 41->40 46 2287b500bd9-2287b500bfd EnterCriticalSection VirtualAlloc 41->46 42->33 43->42 44->35 45->44 50 2287b500c1f-2287b500c23 LeaveCriticalSection 46->50 51 2287b500bff-2287b500c1c 46->51 49 2287b500c7f-2287b500c96 IsBadReadPtr 47->49 48->47 52 2287b500c44-2287b500c57 EnterCriticalSection 48->52 53 2287b500c98-2287b500c9b 49->53 54 2287b500cce 49->54 50->40 51->50 55 2287b500c59 52->55 56 2287b500c73-2287b500c76 LeaveCriticalSection 52->56 53->54 57 2287b500c9d-2287b500cb0 EnterCriticalSection 53->57 58 2287b500cd1-2287b500ce9 IsBadReadPtr 54->58 59 2287b500c60-2287b500c64 55->59 56->47 60 2287b500cb2-2287b500cb6 57->60 61 2287b500cc5-2287b500cc8 LeaveCriticalSection 57->61 62 2287b500ceb-2287b500cee 58->62 63 2287b500d21 58->63 64 2287b500c6a-2287b500c71 59->64 65 2287b500f01-2287b500f0e LeaveCriticalSection 59->65 66 2287b500cbc-2287b500cc3 60->66 67 2287b500f13-2287b500f20 LeaveCriticalSection 60->67 61->54 62->63 68 2287b500cf0-2287b500d03 EnterCriticalSection 62->68 69 2287b500d24-2287b500d3c IsBadReadPtr 63->69 64->56 64->59 65->49 66->60 66->61 67->58 72 2287b500d18-2287b500d1b LeaveCriticalSection 68->72 73 2287b500d05-2287b500d09 68->73 70 2287b500d7c 69->70 71 2287b500d3e-2287b500d41 69->71 75 2287b500d7f-2287b500d97 IsBadReadPtr 70->75 71->70 74 2287b500d43-2287b500d56 EnterCriticalSection 71->74 72->63 76 2287b500d0f-2287b500d16 73->76 77 2287b500f25-2287b500f32 LeaveCriticalSection 73->77 78 2287b500d58 74->78 79 2287b500d73-2287b500d76 LeaveCriticalSection 74->79 80 2287b500d99-2287b500d9c 75->80 81 2287b500dcf 75->81 76->72 76->73 77->69 82 2287b500d60-2287b500d64 78->82 79->70 80->81 83 2287b500d9e-2287b500db1 EnterCriticalSection 80->83 84 2287b500dd2-2287b500dea IsBadReadPtr 81->84 85 2287b500d6a-2287b500d71 82->85 86 2287b500f37-2287b500f44 LeaveCriticalSection 82->86 87 2287b500db3-2287b500db7 83->87 88 2287b500dc6-2287b500dc9 LeaveCriticalSection 83->88 89 2287b500dec-2287b500def 84->89 90 2287b500e22 84->90 85->79 85->82 86->75 93 2287b500f49-2287b500f56 LeaveCriticalSection 87->93 94 2287b500dbd-2287b500dc4 87->94 88->81 89->90 91 2287b500df1-2287b500e04 EnterCriticalSection 89->91 92 2287b500e25-2287b500e3d IsBadReadPtr 90->92 95 2287b500e19-2287b500e1c LeaveCriticalSection 91->95 96 2287b500e06-2287b500e0a 91->96 97 2287b500e7c 92->97 98 2287b500e3f-2287b500e42 92->98 93->84 94->87 94->88 95->90 99 2287b500f5b-2287b500f68 LeaveCriticalSection 96->99 100 2287b500e10-2287b500e17 96->100 102 2287b500e7f-2287b500e97 IsBadReadPtr 97->102 98->97 101 2287b500e44-2287b500e57 EnterCriticalSection 98->101 99->92 100->95 100->96 103 2287b500e59 101->103 104 2287b500e73-2287b500e76 LeaveCriticalSection 101->104 105 2287b500e99-2287b500e9c 102->105 106 2287b500ecf-2287b500ef6 102->106 107 2287b500e60-2287b500e64 103->107 104->97 105->106 108 2287b500e9e-2287b500eb1 EnterCriticalSection 105->108 106->2 111 2287b500e6a-2287b500e71 107->111 112 2287b500f6d-2287b500f7a LeaveCriticalSection 107->112 109 2287b500eb3-2287b500eb7 108->109 110 2287b500ec6-2287b500ec9 LeaveCriticalSection 108->110 113 2287b500ebd-2287b500ec4 109->113 114 2287b500f7f-2287b500f8c LeaveCriticalSection 109->114 110->106 111->104 111->107 112->102 113->109 113->110 114->106
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495198004.000002287B4E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287B4E0000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495164115.000002287B4E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495245950.000002287B548000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495289698.000002287B55C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495324573.000002287B562000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287b4e0000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$Leave$EnterRead$AllocVirtual$ProcessToken$AdjustCloseCurrentErrorHandleInitializeLastLookupOpenPrivilegePrivilegesValue
                                                                  • String ID: SeDebugPrivilege
                                                                  • API String ID: 3221255601-2896544425
                                                                  • Opcode ID: a2b6e7ca68953369f1d1bed8feb1e7e4a33665da8ae3e4e728f5fee4189e6249
                                                                  • Instruction ID: 97ebbe51039ebb56eb49ebdd9221f08829e4e56b866e188957e2305bffe518a3
                                                                  • Opcode Fuzzy Hash: a2b6e7ca68953369f1d1bed8feb1e7e4a33665da8ae3e4e728f5fee4189e6249
                                                                  • Instruction Fuzzy Hash: CC320A39302F44E2EB559F61EA5C369B3B2F744BA0FA84425CE6A43B94DF38D565D300

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 230 180001010-180001048 malloc 231 18000104e-18000107d call 18000d800 230->231 232 180001590-1800015a9 call 18000cb60 230->232 237 180001084-18000108c 231->237 238 18000107f-180001082 231->238 240 180001093-1800010a4 237->240 241 18000108e-180001091 237->241 239 1800010c4-1800010d5 malloc 238->239 242 180001578-180001588 239->242 243 1800010db-180001116 memcpy * 2 239->243 244 1800010a6-1800010a9 240->244 245 1800010ab-1800010be call 18000d836 240->245 241->239 242->232 246 180001120-18000116c 243->246 244->239 245->239 246->246 249 18000116e-18000117a 246->249 250 180001180-18000118b 249->250 250->250 251 18000118d-18000118f 250->251 251->242 252 180001195-180001210 memset wsprintfW CreateFileW 251->252 253 180001212-180001218 GetLastError 252->253 254 18000121a-18000123b WriteFile 252->254 255 18000124c-1800012c2 SleepEx memset wsprintfW CreateFileW 253->255 256 180001243-180001246 CloseHandle 254->256 257 18000123d GetLastError 254->257 258 1800012c4-1800012ca GetLastError 255->258 259 1800012cc-1800012ed WriteFile 255->259 256->255 257->256 260 1800012fe-180001374 SleepEx memset wsprintfW CreateFileW 258->260 261 1800012f5-1800012f8 CloseHandle 259->261 262 1800012ef GetLastError 259->262 263 180001376-18000137c GetLastError 260->263 264 18000137e-18000139b WriteFile 260->264 261->260 262->261 265 1800013ac-1800013bb Sleep 263->265 266 1800013a3-1800013a6 CloseHandle 264->266 267 18000139d GetLastError 264->267 268 1800013c1-1800013e0 VirtualAlloc 265->268 269 180001568-180001570 265->269 266->265 267->266 268->269 270 1800013e6-18000142a memcpy CreateThread call 180001a10 268->270 269->242 273 180001523-180001562 memset memcpy CreateThread 270->273 274 180001430-18000149a VariantInit 270->274 273->269 276 18000149c-1800014bc SysAllocString 274->276 277 1800014be GetLastError 274->277 276->277 278 1800014c4-1800014c8 276->278 277->278 278->273 280 1800014ca-18000151e memset wsprintfW call 180001d60 278->280 280->273
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2485758756.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000003.00000002.2485619743.0000000180000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2485887283.0000000180013000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2485887283.000000018008E000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2485887283.00000001800B4000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2486883489.0000000180164000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2487001400.0000000180168000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_180000000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$File$Creatememset$memcpywsprintf$CloseHandleSleepWrite$AllocThreadmalloc$InitStringVariantVirtual
                                                                  • String ID: %s\%s$\Microsoft\Windows
                                                                  • API String ID: 1085075972-4137575348
                                                                  • Opcode ID: 25a54c13e9a735a875ead524e7afe43dc856ba856741995bc76f1784370f9354
                                                                  • Instruction ID: 8444b12730cc2e4b24a21f92cbaba62370983439c4159096c57ec2b4dd869c75
                                                                  • Opcode Fuzzy Hash: 25a54c13e9a735a875ead524e7afe43dc856ba856741995bc76f1784370f9354
                                                                  • Instruction Fuzzy Hash: 85F17932600B89D5F7A2DF65E8157DD37A0FB8DB98F448215EE9A57A94EF38C209C700

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: AllocErrorLastVirtual$MemoryProcessWrite
                                                                  • String ID: @$h
                                                                  • API String ID: 1382438346-1029331998
                                                                  • Opcode ID: edab0e174b5066205762abb61903cd894a6083d3ffa50cc14d6c6a9f29330064
                                                                  • Instruction ID: c93c6ee6feca37032dc2b88d247ab5066dc23ea09f3e386735c560546aca2f0b
                                                                  • Opcode Fuzzy Hash: edab0e174b5066205762abb61903cd894a6083d3ffa50cc14d6c6a9f29330064
                                                                  • Instruction Fuzzy Hash: 3581F42621AB8086F760CFA9A84875EEB51F7D6788F548119EFC653B89DF3CC506CB00

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495198004.000002287B4E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287B4E0000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495164115.000002287B4E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495245950.000002287B548000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495289698.000002287B55C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495324573.000002287B562000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287b4e0000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: AllocErrorLastVirtual$MemoryProcessWrite
                                                                  • String ID: @$h
                                                                  • API String ID: 1382438346-1029331998
                                                                  • Opcode ID: edab0e174b5066205762abb61903cd894a6083d3ffa50cc14d6c6a9f29330064
                                                                  • Instruction ID: 8783f98b51c53cc014cf7f2c4a75cba8c944f8e0f79cbb8b24ae987bb0e302a8
                                                                  • Opcode Fuzzy Hash: edab0e174b5066205762abb61903cd894a6083d3ffa50cc14d6c6a9f29330064
                                                                  • Instruction Fuzzy Hash: 9B813B2621A7C09AE724CF99B84875EEB92F3A6784F545119FECA43B89DF3CC505CB00

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2485758756.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000003.00000002.2485619743.0000000180000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2485887283.0000000180013000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2485887283.000000018008E000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2485887283.00000001800B4000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2486883489.0000000180164000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2487001400.0000000180168000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_180000000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: FromString$CreateInitializeInstance
                                                                  • String ID: :_:$:Y:$:$A::$X:[:$X:^:$Y::$Y:\:$\:[:$\:^:$^:G:
                                                                  • API String ID: 511945936-2205580742
                                                                  • Opcode ID: 042c554cad8af894e656224a2f31c9785861aedbae0dc43e1f823e5507c20a61
                                                                  • Instruction ID: bb9760e412e0da7a9fa856a0e12bed8815f139b06612a008ac7157658cf1ee11
                                                                  • Opcode Fuzzy Hash: 042c554cad8af894e656224a2f31c9785861aedbae0dc43e1f823e5507c20a61
                                                                  • Instruction Fuzzy Hash: CA91ED73D18BD4CAE311CF7994016ADBB70F799348F14A249EA946A919EB78E684CF00

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 469 180001d60-180001d9f 470 180001da5-180001dd3 SysAllocString 469->470 471 180002078 469->471 470->471 477 180001dd9-180001e0a SysAllocString * 2 470->477 472 18000207a-180002097 call 18000cb60 471->472 477->471 479 180001e10-180001e49 477->479 479->471 484 180001e4f-180001e8c 479->484 484->471 489 180001e92-180001efb 484->489 489->471 497 180001f01-180001f55 IIDFromString 489->497 501 180002075 497->501 502 180001f5b-180001fb4 SysAllocString * 2 497->502 501->471 502->471 508 180001fba-180001fd3 502->508 508->471 510 180001fd9-18000205f VariantInit SysAllocString 508->510 511 18000206a-180002070 510->511 512 180002072 511->512 513 180002098-1800020ad 511->513 512->501 513->472
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2485758756.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000003.00000002.2485619743.0000000180000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2485887283.0000000180013000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2485887283.000000018008E000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2485887283.00000001800B4000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2486883489.0000000180164000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2487001400.0000000180168000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_180000000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: String$Alloc$FromInitVariant
                                                                  • String ID: SYSTEM${4c3d624d-fd6b-49a3-b9b7-09cb3cd3f047}
                                                                  • API String ID: 929278495-107290059
                                                                  • Opcode ID: 614b72df1dcfdb13e6e7e9f40b98ec6a16ace2cc5bef3ea5268e0735b5c70f43
                                                                  • Instruction ID: ea068f2d577331d4d34f7ce72b56dd1e3d0ea9ea0467babe62b28c7e472ad91b
                                                                  • Opcode Fuzzy Hash: 614b72df1dcfdb13e6e7e9f40b98ec6a16ace2cc5bef3ea5268e0735b5c70f43
                                                                  • Instruction Fuzzy Hash: 36B1CF36B00B588AEB40DFAAD88429D77B1FB88F99F558026DE0E57B28DF35C149C300

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CloseEnumHandleServiceServicesStatusfree$ManagerOpenlstrcmpimallocmemset
                                                                  • String ID:
                                                                  • API String ID: 2647132813-0
                                                                  • Opcode ID: 65ea28f1ae8d39c06324f520d284c67a1b426bb17897373f6f46c6dbd1fc0fb8
                                                                  • Instruction ID: 457c90bffb0cd29edf80e9a689d6b0de63c1c69b7c1a4ca5f216ceb047252c18
                                                                  • Opcode Fuzzy Hash: 65ea28f1ae8d39c06324f520d284c67a1b426bb17897373f6f46c6dbd1fc0fb8
                                                                  • Instruction Fuzzy Hash: F2419A36205B40AAF720CFA5F84865AF7A5F7C9744F648425DA8D83B58EF38C946CB00

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495198004.000002287B4E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287B4E0000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495164115.000002287B4E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495245950.000002287B548000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495289698.000002287B55C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495324573.000002287B562000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287b4e0000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CloseEnumHandleServiceServicesStatusfree$ManagerOpenlstrcmpimallocmemset
                                                                  • String ID:
                                                                  • API String ID: 2647132813-0
                                                                  • Opcode ID: 65ea28f1ae8d39c06324f520d284c67a1b426bb17897373f6f46c6dbd1fc0fb8
                                                                  • Instruction ID: e3279086aa6c9f56d72231e5a1a514c880e0fb35d2d7f0ca1a3fd16dda21346d
                                                                  • Opcode Fuzzy Hash: 65ea28f1ae8d39c06324f520d284c67a1b426bb17897373f6f46c6dbd1fc0fb8
                                                                  • Instruction Fuzzy Hash: 5641B73A206B40EAD724CF65F84865AF7A6F7C8B94F644125DE8E43B54EF38C549CB00

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495198004.000002287B4E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287B4E0000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495164115.000002287B4E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495245950.000002287B548000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495289698.000002287B55C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495324573.000002287B562000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287b4e0000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Heap$AllocCloseCreateHandleProcessSnapshotToolhelp32
                                                                  • String ID:
                                                                  • API String ID: 1926892967-0
                                                                  • Opcode ID: 83253a1db69bbe089b2caa0e335e3cddcea3a2af0f53c395e1d6b6084172a312
                                                                  • Instruction ID: 8b31ae112cb564f98b1c8abb2a5e73cf994b32dfd1f0bbd897aa4015980813f9
                                                                  • Opcode Fuzzy Hash: 83253a1db69bbe089b2caa0e335e3cddcea3a2af0f53c395e1d6b6084172a312
                                                                  • Instruction Fuzzy Hash: D5218329315A40D6EB549FB2A84C329F7A2F789FE4F685124DF6A47794DF3CC4858700

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: File$CreateModuleProtectVirtual$CurrentDirectoryHandleInformationMappingProcessSystemViewlstrcatmemcpymemset
                                                                  • String ID: .text$\ntdll.dll$ntdll.dll
                                                                  • API String ID: 992094507-3745270394
                                                                  • Opcode ID: 42c7d1610a26bf8e9f5a24f8acf1d0ddfd7717f4bc4ff8c4f1ddaf0eb027a466
                                                                  • Instruction ID: f0e0e98573805868f52c38209c5807dc512571d6f13f2fbbe5d474f87b257bb2
                                                                  • Opcode Fuzzy Hash: 42c7d1610a26bf8e9f5a24f8acf1d0ddfd7717f4bc4ff8c4f1ddaf0eb027a466
                                                                  • Instruction Fuzzy Hash: 3F518E76315A80D6EB70CFA1E44C79AB3A2F7D9B44F648115DA8E43B58EF38C056CB00

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495198004.000002287B4E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287B4E0000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495164115.000002287B4E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495245950.000002287B548000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495289698.000002287B55C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495324573.000002287B562000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287b4e0000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: File$CreateModuleProtectVirtual$CurrentDirectoryHandleInformationMappingProcessSystemViewlstrcatmemcpymemset
                                                                  • String ID: .text$\ntdll.dll$ntdll.dll
                                                                  • API String ID: 992094507-3745270394
                                                                  • Opcode ID: 42c7d1610a26bf8e9f5a24f8acf1d0ddfd7717f4bc4ff8c4f1ddaf0eb027a466
                                                                  • Instruction ID: 49758b01b897dc62862901d614650b8035c09fcca6c63065ea14fd31c30bdb9a
                                                                  • Opcode Fuzzy Hash: 42c7d1610a26bf8e9f5a24f8acf1d0ddfd7717f4bc4ff8c4f1ddaf0eb027a466
                                                                  • Instruction Fuzzy Hash: 5651AC7A306A80E6EB70DF61F44C79AB7A2F789B44F644115CA9E43B98EF38D155CB00

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2492147322.000002287AD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002287AD40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287ad40000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: AddressCallerLibraryLoadProc
                                                                  • String ID: RtlA$RtlR$ateH$eAll$eHea$eap$l.dl$l.dl$lloc$ntdl$ntdl$ocat
                                                                  • API String ID: 4215043672-3994871222
                                                                  • Opcode ID: 1e80394ff1d37946f5ee3994f364bbb739b556a1a1e79a645345825dff1cf6d4
                                                                  • Instruction ID: a8996d2fec1ef9385d5ab40acaf3a05924d14e2b28a3354f859b714d7fd49550
                                                                  • Opcode Fuzzy Hash: 1e80394ff1d37946f5ee3994f364bbb739b556a1a1e79a645345825dff1cf6d4
                                                                  • Instruction Fuzzy Hash: D371C531614A099FEF98EF98C8497A9BBE1FF94710F254119D80AD7285DF38E8428B85

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2491900595.000002287A7D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002287A7D0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287a7d0000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: LibraryLoad
                                                                  • String ID: RtlA$RtlR$ateH$eAll$eHea$eap$l.dl$l.dl$lloc$ntdl$ntdl$ocat
                                                                  • API String ID: 1029625771-3994871222
                                                                  • Opcode ID: 1e80394ff1d37946f5ee3994f364bbb739b556a1a1e79a645345825dff1cf6d4
                                                                  • Instruction ID: efbd9501a70553fb517be2de5d29759dca93b07878e5e2a2e18b6f62054d071b
                                                                  • Opcode Fuzzy Hash: 1e80394ff1d37946f5ee3994f364bbb739b556a1a1e79a645345825dff1cf6d4
                                                                  • Instruction Fuzzy Hash: 0D71F430608A099FEF58DF98C85A7A9B7E1FF84351F205119D84AC7285DF38D8438B85

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Heap$AllocCloseCreateHandleProcessSnapshotToolhelp32
                                                                  • String ID:
                                                                  • API String ID: 1926892967-0
                                                                  • Opcode ID: 83253a1db69bbe089b2caa0e335e3cddcea3a2af0f53c395e1d6b6084172a312
                                                                  • Instruction ID: f11d4660b7a841ea1593bcee37aa81463f1379fa1f086d6ef3a2f54c24c5b9f2
                                                                  • Opcode Fuzzy Hash: 83253a1db69bbe089b2caa0e335e3cddcea3a2af0f53c395e1d6b6084172a312
                                                                  • Instruction Fuzzy Hash: 9121C429205A40D6FB509FA2A90C72AF3A2F7CAFD5F688121DE5647794DF3CC0868700
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: StringUninitialize$AllocCreateFreeInitializeInstance
                                                                  • String ID: Block All Outbound
                                                                  • API String ID: 4211003860-2946277995
                                                                  • Opcode ID: 37e8deeb53738933e6396a41bf2ce5f7fa4c1b9731e50329b0e805033b26f612
                                                                  • Instruction ID: e2788a2e0d2b1a38a47ff835155059c57d3e5a3863d971863ab702414e912e02
                                                                  • Opcode Fuzzy Hash: 37e8deeb53738933e6396a41bf2ce5f7fa4c1b9731e50329b0e805033b26f612
                                                                  • Instruction Fuzzy Hash: 4E31297AB01B01DAEB00DFB5D84929C7771F794B88B148926DB1D47B28DF34C556CB90
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495198004.000002287B4E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287B4E0000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495164115.000002287B4E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495245950.000002287B548000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495289698.000002287B55C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495324573.000002287B562000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287b4e0000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: StringUninitialize$AllocCreateFreeInitializeInstance
                                                                  • String ID: Block All Outbound
                                                                  • API String ID: 4211003860-2946277995
                                                                  • Opcode ID: 37e8deeb53738933e6396a41bf2ce5f7fa4c1b9731e50329b0e805033b26f612
                                                                  • Instruction ID: 60dd8484a7eb60ad93bfdcef98167938e97e065bcb8d9e00d53dd9ec8dee39f0
                                                                  • Opcode Fuzzy Hash: 37e8deeb53738933e6396a41bf2ce5f7fa4c1b9731e50329b0e805033b26f612
                                                                  • Instruction Fuzzy Hash: 5631057AB01B00DAEB009F75D84829C77B1F794B98F144926DE1E57B28DF38C265CB90
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Free$Allocmemcpy
                                                                  • String ID: M$Z
                                                                  • API String ID: 2981101286-4250246861
                                                                  • Opcode ID: 16e58d14346dcf98e8e2775617a7dec6ccc8f7a4d8fbf8f21ee40814649467c4
                                                                  • Instruction ID: 6ae8518e259507eb0e671ca0e7b0da1e9d49665ae327a95c53f54a8a6b4772a3
                                                                  • Opcode Fuzzy Hash: 16e58d14346dcf98e8e2775617a7dec6ccc8f7a4d8fbf8f21ee40814649467c4
                                                                  • Instruction Fuzzy Hash: AC414366B11BC591FB018F7DD00832EA792A7D6B94F64C325DB9923395EF38C442C300
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495198004.000002287B4E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287B4E0000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495164115.000002287B4E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495245950.000002287B548000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495289698.000002287B55C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495324573.000002287B562000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287b4e0000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Free$Allocmemcpy
                                                                  • String ID: M$Z
                                                                  • API String ID: 2981101286-4250246861
                                                                  • Opcode ID: 16e58d14346dcf98e8e2775617a7dec6ccc8f7a4d8fbf8f21ee40814649467c4
                                                                  • Instruction ID: 288c369d5bee4311b813956c0fdc8e6ea4a688039fef44c7d9147d7f3a3369d4
                                                                  • Opcode Fuzzy Hash: 16e58d14346dcf98e8e2775617a7dec6ccc8f7a4d8fbf8f21ee40814649467c4
                                                                  • Instruction Fuzzy Hash: B1410426B12BC156FF108F7D940836DA7D2A7E5B94F68D329DA9917385EF39C441C300
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandle$CreateErrorLastProcessSuspendThread
                                                                  • String ID: h
                                                                  • API String ID: 2500411409-2439710439
                                                                  • Opcode ID: de6bad129ac4742c05161f156ad63c97b402b49de6b7de1bf9d965a2b328e7fc
                                                                  • Instruction ID: ac17e15626ac74015d5921d02e93b273241b6cc8650af302814b209bacd46f2d
                                                                  • Opcode Fuzzy Hash: de6bad129ac4742c05161f156ad63c97b402b49de6b7de1bf9d965a2b328e7fc
                                                                  • Instruction Fuzzy Hash: 4E319C36A18B8086F7108F91E45875DB3A4F3D8794F21922AEA8C43B14EFB9C4D1CB00
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495198004.000002287B4E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287B4E0000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495164115.000002287B4E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495245950.000002287B548000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495289698.000002287B55C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495324573.000002287B562000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287b4e0000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandle$CreateErrorLastProcessSuspendThread
                                                                  • String ID: h
                                                                  • API String ID: 2500411409-2439710439
                                                                  • Opcode ID: de6bad129ac4742c05161f156ad63c97b402b49de6b7de1bf9d965a2b328e7fc
                                                                  • Instruction ID: 6f35da95719a8c8a2d7f47c9e4596ce13fe7bd7aa42062eb3290877a1d56dd83
                                                                  • Opcode Fuzzy Hash: de6bad129ac4742c05161f156ad63c97b402b49de6b7de1bf9d965a2b328e7fc
                                                                  • Instruction Fuzzy Hash: CC31A136A19B80C6E750CFA1E45835EB3A5F798790F259229EB9C43B14EF79C4D0CB00
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$FreeVirtual$DeleteEnterLeaveRead
                                                                  • String ID:
                                                                  • API String ID: 4123369522-0
                                                                  • Opcode ID: dc521b05a2b1f255d7dad3c1341367fe33828e4c314c95ad538db3ee005c2c52
                                                                  • Instruction ID: 777de6f2a73d53b843d47c77ca32badd0fb58e6e7f089fa99925c517827afe69
                                                                  • Opcode Fuzzy Hash: dc521b05a2b1f255d7dad3c1341367fe33828e4c314c95ad538db3ee005c2c52
                                                                  • Instruction Fuzzy Hash: 4601403A315A40E3FB548F92E69C759A362FBC5B85F58C022DE5A43B54DF38C4968710
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495198004.000002287B4E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287B4E0000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495164115.000002287B4E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495245950.000002287B548000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495289698.000002287B55C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495324573.000002287B562000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287b4e0000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$FreeVirtual$DeleteEnterLeaveRead
                                                                  • String ID:
                                                                  • API String ID: 4123369522-0
                                                                  • Opcode ID: dc521b05a2b1f255d7dad3c1341367fe33828e4c314c95ad538db3ee005c2c52
                                                                  • Instruction ID: 057075e89d22b3b2381241a557f1633094664f74731597caaf3e174fe14e2790
                                                                  • Opcode Fuzzy Hash: dc521b05a2b1f255d7dad3c1341367fe33828e4c314c95ad538db3ee005c2c52
                                                                  • Instruction Fuzzy Hash: 2F01523A315E40E3FB549FA2E55C769E362FB44B94F584420DF6A03B58DF38C0958710
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32memset
                                                                  • String ID:
                                                                  • API String ID: 1267121359-0
                                                                  • Opcode ID: 25689970270811a04f1bb7179e810be154e641483dfeb96a7efa8f40864eac86
                                                                  • Instruction ID: ce644d17388b8031de2d440b614e8884770c5fa039641817210fb2d6d8166290
                                                                  • Opcode Fuzzy Hash: 25689970270811a04f1bb7179e810be154e641483dfeb96a7efa8f40864eac86
                                                                  • Instruction Fuzzy Hash: 1731392AA09B84D2F710CF68D6083ADA3A1F799B98F59D315DF9902256EF34D6C9C700
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495198004.000002287B4E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287B4E0000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495164115.000002287B4E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495245950.000002287B548000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495289698.000002287B55C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495324573.000002287B562000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287b4e0000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32memset
                                                                  • String ID:
                                                                  • API String ID: 1267121359-0
                                                                  • Opcode ID: 25689970270811a04f1bb7179e810be154e641483dfeb96a7efa8f40864eac86
                                                                  • Instruction ID: d4e400f08d3cff3b4ce96c6c7efac241c54216eda5bcd42396bb651a3c602717
                                                                  • Opcode Fuzzy Hash: 25689970270811a04f1bb7179e810be154e641483dfeb96a7efa8f40864eac86
                                                                  • Instruction Fuzzy Hash: 8A316D2AA09B84D2E711CF38D5483ADB3A1F79AB98F19D315DF990225AEF34D684D700
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2485758756.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                  • Associated: 00000003.00000002.2485619743.0000000180000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2485887283.0000000180013000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2485887283.000000018008E000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2485887283.00000001800B4000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2486883489.0000000180164000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2487001400.0000000180168000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_180000000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: DeleteFile$Sleep
                                                                  • String ID:
                                                                  • API String ID: 2100639427-0
                                                                  • Opcode ID: 4bda49fe9f4e016e86280c0e6eaa4ce986c0e500d62fac3d8a335016f1c44b02
                                                                  • Instruction ID: 51a75f447c1f7fd9c29322073db99234aa81590105c98bfd672e3405234c2128
                                                                  • Opcode Fuzzy Hash: 4bda49fe9f4e016e86280c0e6eaa4ce986c0e500d62fac3d8a335016f1c44b02
                                                                  • Instruction Fuzzy Hash: 0BD05E20300A4986FB975BB2E8663E513E06B0DBC2F084024980685280DE18C7CE4300
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2491900595.000002287A7D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002287A7D0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287a7d0000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: FreeVirtual
                                                                  • String ID:
                                                                  • API String ID: 1263568516-0
                                                                  • Opcode ID: 88289986f9ffe6edc648fa77a415d0491739a420f0f8400cd95d764a84c61761
                                                                  • Instruction ID: 964e8646be31001e58704d3ef0f094e919f8cb9693f21dbeba195712fd8d41c6
                                                                  • Opcode Fuzzy Hash: 88289986f9ffe6edc648fa77a415d0491739a420f0f8400cd95d764a84c61761
                                                                  • Instruction Fuzzy Hash: C431F53164D6008BDB1CDA5CF8D2668B3D4F795345B34125DE9C7C7187EE39E8038A89
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2492147322.000002287AD40000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002287AD40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287ad40000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: FreeVirtual
                                                                  • String ID:
                                                                  • API String ID: 1263568516-0
                                                                  • Opcode ID: 88289986f9ffe6edc648fa77a415d0491739a420f0f8400cd95d764a84c61761
                                                                  • Instruction ID: a5ae0ac89267550a9a564b42db3bdc6868bd48b43ae28f0c7d11635472a02656
                                                                  • Opcode Fuzzy Hash: 88289986f9ffe6edc648fa77a415d0491739a420f0f8400cd95d764a84c61761
                                                                  • Instruction Fuzzy Hash: 2D31D1316496008BDB5CEA5CE8C6668B7D0FB95704F30015DE987C7187EE3DE8038A89
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495416719.000002287B860000.00000020.00000400.00020000.00000000.sdmp, Offset: 000002287B860000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287b860000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: FreeVirtual
                                                                  • String ID:
                                                                  • API String ID: 1263568516-0
                                                                  • Opcode ID: 88289986f9ffe6edc648fa77a415d0491739a420f0f8400cd95d764a84c61761
                                                                  • Instruction ID: 3e1b54d9f00cff042556d1fbf36586d5cdc5ff62258f2975ffc8847df12e30fc
                                                                  • Opcode Fuzzy Hash: 88289986f9ffe6edc648fa77a415d0491739a420f0f8400cd95d764a84c61761
                                                                  • Instruction Fuzzy Hash: D831D1316596048BDB1CDE5CF8C2668B3D1F796349B30015DE997C7187EE39E8038A8D
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: ProcessProcess32TerminateThread$CloseCreateCurrentExitFirstHandleNextSleepSnapshotToolhelp32lstrcmpimemset
                                                                  • String ID: %s\%s$.sys$192.197.113.45$C:\Program Files\Windows Mail$HoopCity.exe$HoopCityBase.dll$Inject Test$MicrosoftEdgeUpdate$\drivers\$install.cfg$mimidump.inf$sys$temp.key
                                                                  • API String ID: 946687889-777922760
                                                                  • Opcode ID: 355c9c76efd1d1c9ed74d2e3f5f72c78fba995c53ce3eee6f9b89f0540d70f2c
                                                                  • Instruction ID: 7928263303c6e3eaf0c85237b81ef17d80b307dcf723b5ac10030068430e2c8b
                                                                  • Opcode Fuzzy Hash: 355c9c76efd1d1c9ed74d2e3f5f72c78fba995c53ce3eee6f9b89f0540d70f2c
                                                                  • Instruction Fuzzy Hash: A0C12069212A85E2FB20DFA1E95C7D9B362F7C9B49FA4C012C60A47565EF3CC64BC701
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Freememset$Virtual$Find$File$Nextlstrcatlstrcmpi$FirstHeap$Processwsprintf$CloseProcess32$AllocCreateEnumerateHandleSessionSessionsSnapshotToolhelp32lstrlen
                                                                  • String ID: %s*.*$*.*$All Users$C:\Users\%s\Desktop\$Default$Default User$Public$\Desktop\$explorer.exe
                                                                  • API String ID: 2219514461-2447876743
                                                                  • Opcode ID: f96d0ee469809c6c1c2e0bd3881d1d19bdd5b3c186d6ccdbc88e305581691bcf
                                                                  • Instruction ID: 6ace871222316d2fb07fd3144312da2bb2e9d579b4351fb4fb0961f020cfa185
                                                                  • Opcode Fuzzy Hash: f96d0ee469809c6c1c2e0bd3881d1d19bdd5b3c186d6ccdbc88e305581691bcf
                                                                  • Instruction Fuzzy Hash: E112067A302A45A5FB64DFA2D85C79DB3A2FBC5B98F64C115CD0A57698EF38C14AC300
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Process$Token$CloseHandle$Freememset$LookupOpenVirtuallstrcpy$File$AccountAdjustCreateCurrentErrorGlobalInformationLastPrivilegePrivilegesProcess32Value$AllocClassDeviceDriveEnumFirstImageInfoLogicalMemoryModulesNameNextPriorityQuerySessionSizeSnapshotStringsToolhelp32__chkstklstrcatlstrlenwcsncmp
                                                                  • String ID: H$SeDebugPrivilege$unknown
                                                                  • API String ID: 976869081-3969872153
                                                                  • Opcode ID: dbc98f8ea325e227135fe9df3ef70e19276db119939f4244fda90c59cafe7649
                                                                  • Instruction ID: ffc38c7a2d4101dfd14ffd0a61aacf6035df4decb730c0aaa8884cab45849bc9
                                                                  • Opcode Fuzzy Hash: dbc98f8ea325e227135fe9df3ef70e19276db119939f4244fda90c59cafe7649
                                                                  • Instruction Fuzzy Hash: BF22B63A602B81D6FB60CFA1D94C7DDB3A2F7C9B98F508116DA5947A98DF38C646C700
                                                                  APIs
                                                                    • Part of subcall function 000002287BC2BA20: VirtualAlloc.KERNEL32 ref: 000002287BC2BA49
                                                                    • Part of subcall function 000002287BC2BA20: memcpy.NTDLL ref: 000002287BC2BA6D
                                                                    • Part of subcall function 000002287BC2BA20: VirtualAlloc.KERNEL32 ref: 000002287BC2BA98
                                                                    • Part of subcall function 000002287BC2BA20: memcpy.NTDLL ref: 000002287BC2BACD
                                                                    • Part of subcall function 000002287BC2BA20: memcpy.NTDLL ref: 000002287BC2BB03
                                                                    • Part of subcall function 000002287BC2BA20: memset.NTDLL ref: 000002287BC2BB9C
                                                                    • Part of subcall function 000002287BC2BA20: ExpandEnvironmentStringsW.KERNEL32 ref: 000002287BC2BBB3
                                                                    • Part of subcall function 000002287BC2BA20: memset.NTDLL ref: 000002287BC2BBC8
                                                                    • Part of subcall function 000002287BC2D3D0: GetModuleHandleW.KERNEL32 ref: 000002287BC2D3EF
                                                                    • Part of subcall function 000002287BC2D3D0: GetCurrentProcess.KERNEL32 ref: 000002287BC2D409
                                                                    • Part of subcall function 000002287BC2D3D0: K32GetModuleInformation.KERNEL32 ref: 000002287BC2D420
                                                                    • Part of subcall function 000002287BC2D3D0: memset.NTDLL ref: 000002287BC2D438
                                                                    • Part of subcall function 000002287BC2D3D0: GetSystemDirectoryW.KERNEL32 ref: 000002287BC2D447
                                                                    • Part of subcall function 000002287BC2D3D0: lstrcatW.KERNEL32 ref: 000002287BC2D469
                                                                    • Part of subcall function 000002287BC2D3D0: CreateFileW.KERNEL32 ref: 000002287BC2D496
                                                                    • Part of subcall function 000002287BC2D3D0: CreateFileMappingW.KERNELBASE ref: 000002287BC2D4BD
                                                                    • Part of subcall function 000002287BC2D3D0: MapViewOfFile.KERNEL32 ref: 000002287BC2D4E7
                                                                    • Part of subcall function 000002287BC2D3D0: VirtualProtect.KERNEL32 ref: 000002287BC2D582
                                                                    • Part of subcall function 000002287BC2D3D0: memcpy.NTDLL ref: 000002287BC2D597
                                                                  • WSAStartup.WS2_32 ref: 000002287BC12407
                                                                    • Part of subcall function 000002287BC2D860: CoInitializeEx.OLE32 ref: 000002287BC2D8B0
                                                                    • Part of subcall function 000002287BC2D860: CoCreateInstance.COMBASE ref: 000002287BC2D8D5
                                                                    • Part of subcall function 000002287BC2D860: CoUninitialize.OLE32 ref: 000002287BC2D8FE
                                                                  • GetCommandLineW.KERNEL32 ref: 000002287BC12444
                                                                  • CommandLineToArgvW.SHELL32 ref: 000002287BC12454
                                                                    • Part of subcall function 000002287BC1B120: VirtualAlloc.KERNEL32(?,?,?,000002287BC11E17), ref: 000002287BC1B137
                                                                    • Part of subcall function 000002287BC1B120: CreateEventW.KERNEL32(?,?,?,000002287BC11E17), ref: 000002287BC1B1C1
                                                                    • Part of subcall function 000002287BC1B120: VirtualAlloc.KERNEL32(?,?,?,000002287BC11E17), ref: 000002287BC1B1E6
                                                                    • Part of subcall function 000002287BC1B120: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC11E17), ref: 000002287BC1B1F8
                                                                    • Part of subcall function 000002287BC1B120: VirtualAlloc.KERNEL32(?,?,?,000002287BC11E17), ref: 000002287BC1B21D
                                                                    • Part of subcall function 000002287BC1B120: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC11E17), ref: 000002287BC1B22F
                                                                    • Part of subcall function 000002287BC1B120: VirtualAlloc.KERNEL32(?,?,?,000002287BC11E17), ref: 000002287BC1B254
                                                                    • Part of subcall function 000002287BC1B120: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC11E17), ref: 000002287BC1B266
                                                                    • Part of subcall function 000002287BC1B120: VirtualAlloc.KERNEL32(?,?,?,000002287BC11E17), ref: 000002287BC1B28B
                                                                    • Part of subcall function 000002287BC1B120: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC11E17), ref: 000002287BC1B29D
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC12475
                                                                  • InitializeCriticalSection.KERNEL32 ref: 000002287BC12487
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC124AC
                                                                  • InitializeCriticalSection.KERNEL32 ref: 000002287BC124BE
                                                                  • memset.NTDLL ref: 000002287BC124DF
                                                                  • GetCurrentProcessId.KERNEL32 ref: 000002287BC124E4
                                                                  • lstrcmpiW.KERNEL32 ref: 000002287BC12504
                                                                  • lstrcmpiW.KERNEL32 ref: 000002287BC1251F
                                                                  • ExitThread.KERNEL32 ref: 000002287BC12530
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Alloc$Initialize$CriticalSection$Creatememcpymemset$File$CommandCurrentLineModuleProcesslstrcmpi$ArgvDirectoryEnvironmentEventExitExpandHandleInformationInstanceMappingProtectStartupStringsSystemThreadUninitializeViewlstrcat
                                                                  • String ID: /Processid:{F8284233-48F4-4680-ADDD-F8284233}$C:\Program Files\Windows Mail$HoopCity.exe$Inject Test$Schedule$perfmon.exe$svchost.exe$taskmgr.exe
                                                                  • API String ID: 3540647475-945176800
                                                                  • Opcode ID: 52c341ef86cc80a7abd342705fbefd9b5f0097be15025d5684c8ff902fd2cb03
                                                                  • Instruction ID: 728f72a8396bef29742e6950f33555591ae72e74c6ab11ead7516c0fcdb453fb
                                                                  • Opcode Fuzzy Hash: 52c341ef86cc80a7abd342705fbefd9b5f0097be15025d5684c8ff902fd2cb03
                                                                  • Instruction Fuzzy Hash: 33B1926D202B85E2FB209FA1ED5C799A363FBC5745F64C016D90A576A4EF38C587C700
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: memset$Free$Virtual$CloseHandle$ErrorHeapLast$CreateCriticalFileProcessSection$Process32wsprintf$AllocDeleteDirectoryEnterFirstLeaveNextPathReadRemoveSnapshotSpecToolhelp32WindowsWrite__chkstklstrcatlstrcmpilstrlen
                                                                  • String ID: "tdata\key_datas" "tdata\D877F783D5D3EF8Cs" "tdata\D877F783D5D3EF8C\configs" "tdata\D877F783D5D3EF8C\maps" "tdata\A7FDF864FBC10B77$%s\tdata_%d.rar$Telegram.exe$\rar.exe$rar.exe a "tdata_%d.rar" %s -m5
                                                                  • API String ID: 1825664495-2162963810
                                                                  • Opcode ID: 82cea7463d976c17f81840de5f559da3749c9e29b869f7e27d444af30f97aed6
                                                                  • Instruction ID: 03915326a3972a1e4a093ccaa77abc9d7a73064b0b940239cc45b4f8b78317aa
                                                                  • Opcode Fuzzy Hash: 82cea7463d976c17f81840de5f559da3749c9e29b869f7e27d444af30f97aed6
                                                                  • Instruction Fuzzy Hash: 82E1B43A702B8196FB20DFA1D95C79DA3A6FBC9B88F508115CE4A57B58DF38C256C700
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$Virtual$Alloc$EnterLeaveRead$Process$CreateCurrentErrorLastThreadTokenmemset$AdjustCloseDirectoryFreeHandleInitializeLookupOpenPrivilegePrivilegesSystemValuelstrcatwsprintf
                                                                  • String ID: :G:$:$A:|:$B:_:$I:N:$I:S:$R:U:$U:Y:$V:V:$\\.\Pipe\%d_pipe%d$^:$_:I:$f:^:$j:H:${:~:$~:~:
                                                                  • API String ID: 1888231936-1994672154
                                                                  • Opcode ID: cbf6abfbc033660e843f0a5311465038b5e1e59bb17b533fa7d65659cda686bd
                                                                  • Instruction ID: cb01392dbc2d8ea6f59f1be2ef4df6e88bbcd4258b8f6c3f1ffb207a373eee48
                                                                  • Opcode Fuzzy Hash: cbf6abfbc033660e843f0a5311465038b5e1e59bb17b533fa7d65659cda686bd
                                                                  • Instruction Fuzzy Hash: 88E1BF77606B80DAF7108F71E8087AEB7A1F7C9B48F149216DE9917A58EF38D585CB00
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Freelstrlen$memset$ProcessToken$AdjustCloseCurrentErrorExtendedHandleLastLookupOpenPrivilegePrivilegesTableValuehtonsinet_ntoalstrcpy$Alloc
                                                                  • String ID: SeDebugPrivilege$System$TCP
                                                                  • API String ID: 2139412910-32757284
                                                                  • Opcode ID: a77dbad989e3143b53eb5463b68a4ac7d5beef60ca2f518ecfe8aa5f64c1cf06
                                                                  • Instruction ID: ac6bd9236a5d8a734e7fcb98b48a33d9efd7898dd9ca2272e71a3c168d4b8507
                                                                  • Opcode Fuzzy Hash: a77dbad989e3143b53eb5463b68a4ac7d5beef60ca2f518ecfe8aa5f64c1cf06
                                                                  • Instruction Fuzzy Hash: A2F1927A311B80D6FB20DFA1E858B9EB761F7C9B98F508116CA5A47B58DF38C549CB00
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$lstrcat$AllocCriticalFreeSection$File$CloseHandle$EnterErrorLastProcessReadmemset$CreateLeaveMovememcpy$CurrentDeleteInitializeTerminateWrite
                                                                  • String ID: .bak$192.197.113.45$C:\Program Files\Windows Mail$HoopCity.exe$h$mimidump.inf
                                                                  • API String ID: 2211108363-2944313569
                                                                  • Opcode ID: 4b1dad8eeb07ee2139cf08c80e806bc58869bd98048bae184d219c2ede71a2c0
                                                                  • Instruction ID: 26c6f6b70fcee49bad4cf512cd7b5373e34950993c949993c6adc9acf7d3f56d
                                                                  • Opcode Fuzzy Hash: 4b1dad8eeb07ee2139cf08c80e806bc58869bd98048bae184d219c2ede71a2c0
                                                                  • Instruction Fuzzy Hash: 32D1D436712B8196FB20CFB5D9587A9B362FBC574CF10C226DA8A57A64EF38C156C700
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Free$lstrlen$ProcessTokenmemset$CriticalSection$AdjustCloseCurrentErrorExtendedHandleLastLookupOpenPrivilegePrivilegesTableValue$AllocDeleteEnterLeaveReadhtonsinet_ntoalstrcpy
                                                                  • String ID: 0.0.0.0$SeDebugPrivilege$System$UDP
                                                                  • API String ID: 3759433425-459619966
                                                                  • Opcode ID: 16bc5c60dd7153e9d206d0a92f103a65cf3b9e04207a802a4ba7105ac1c2b3de
                                                                  • Instruction ID: 8c8e439fe694686c6e185f44bd2b2cb01af4315b21216a279d7226ecf122c73b
                                                                  • Opcode Fuzzy Hash: 16bc5c60dd7153e9d206d0a92f103a65cf3b9e04207a802a4ba7105ac1c2b3de
                                                                  • Instruction Fuzzy Hash: 2CF1947A311B40D6F720DF61E85879EB762F7C9B98F508116CA5A47B58DF38C549CB00
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$CriticalSection$Alloc$Freelstrcat$Read$EnterLeave$DirectoryErrorLastmemset$InitializeSystemWindowsmemcpy
                                                                  • String ID: :$B:_:$HTTP$I:N:$R:U:$TCP$UDP$V:V:$\syswow64$f:^:
                                                                  • API String ID: 1846020110-2823427824
                                                                  • Opcode ID: edbfb01272db3de893631aa679e99bae4e572f143876ddc411167b8806cc7192
                                                                  • Instruction ID: 86ad6fb9a7b903f9931a8811f68cdee087bee72fbf09522d0d55e789637c0ba3
                                                                  • Opcode Fuzzy Hash: edbfb01272db3de893631aa679e99bae4e572f143876ddc411167b8806cc7192
                                                                  • Instruction Fuzzy Hash: 39E1A23A716A80D6FB20CFA6D94CBADB362FBC9B84F548115CE4A47A54DF38D586C700
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$AllocCriticalFreeSection$Heaplstrcat$EnterProcessRead$CloseDirectoryErrorHandleLastLeaveProcess32Sessionmemset$ActiveConsoleCreateFirstInitializeNextSnapshotSystemToolhelp32Windowslstrcmpimemcpy
                                                                  • String ID: $@$HTTP$TCP$UDP$\dllhost.exe$\syswow64$explorer.exe
                                                                  • API String ID: 2239626338-2826464075
                                                                  • Opcode ID: f421e5e7cd2067f34048b2c34d3348e2c2e1a5cb60743fcfc2c0d18429ac0c0c
                                                                  • Instruction ID: 15dca2e4313ccf5254747a9c7fb9be607b6f8190ac36b73fed489283bf5f5df9
                                                                  • Opcode Fuzzy Hash: f421e5e7cd2067f34048b2c34d3348e2c2e1a5cb60743fcfc2c0d18429ac0c0c
                                                                  • Instruction Fuzzy Hash: DFB1B86A602B84E6FB14CFB6D95C799A3A2FBC9B84F64C215CA4957A54EF38C147C300
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Free$ErrorLast$lstrcatmemset$AllocProcess$CreateMemoryOpenRemoteThreadWritememcpy
                                                                  • String ID: 192.197.113.45$:$@$Inject Test
                                                                  • API String ID: 1625309433-2623251663
                                                                  • Opcode ID: 3bc136f16f1fcb778956d2e6d73309da67f29c20123973dad4795ba6fd3a8330
                                                                  • Instruction ID: e1abbe8d7041455bf3db8f050cba94e007f8c7b102b69d1f4d116a56a97ec526
                                                                  • Opcode Fuzzy Hash: 3bc136f16f1fcb778956d2e6d73309da67f29c20123973dad4795ba6fd3a8330
                                                                  • Instruction Fuzzy Hash: A9F1C426A02FC186F724CF75D8187ED7362FBDAB88F24D215DA4946A55EF38C286C700
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Process$Handle$AddressCloseFileFreeOpenProcSleepTokenVirtuallstrcpymemset$AdjustCurrentDeleteDeviceDriveEnumErrorImageLastLogicalLookupModuleModulesNamePrivilegePrivilegesQueryStringsTerminateValuelstrcatlstrlenwcsncmp
                                                                  • String ID: NtResumeProcess$NtSuspendProcess$SeDebugPrivilege$ntdll.dll
                                                                  • API String ID: 335747669-263106891
                                                                  • Opcode ID: 739355a01392140f3596ff1d7456f89cfe2b7b127bffbd39350a94e430bf1ca6
                                                                  • Instruction ID: 44731e86943339de871cf5e79e2302e03073ea64a4d9ede27a8ff1e53529df5c
                                                                  • Opcode Fuzzy Hash: 739355a01392140f3596ff1d7456f89cfe2b7b127bffbd39350a94e430bf1ca6
                                                                  • Instruction Fuzzy Hash: D2A1D939212A81E2FB60CFA1D85C7D9B3A2FBC5B58F54C116DA4A47698DF78C547C700
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Free$Alloc$CloseErrorFileHandleLast$Createlstrcatlstrlen$DirectoryPathProcessRemoveSpecWindowsWritememsetwsprintf
                                                                  • String ID: \rar.exe$h$rar.exe a "%s" %s -m5
                                                                  • API String ID: 460989278-1571478729
                                                                  • Opcode ID: 69e24446d7ee9e21851fb7b2c18dab1fce21110ab0cee690b2221f971960732f
                                                                  • Instruction ID: 7a5e60ddb8bb3b13c28da189988075017da559eb6cf7b111a20559eca49bd953
                                                                  • Opcode Fuzzy Hash: 69e24446d7ee9e21851fb7b2c18dab1fce21110ab0cee690b2221f971960732f
                                                                  • Instruction Fuzzy Hash: 94D19076312A4197FB24CF62E95C79DA3A2FB89B88F148125CE4A57B58DF38C146CB04
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: lstrcat$memset
                                                                  • String ID: ::$:U:M:m:S:$:$:$:$H:L:$L:_:$N:[:$T:I:$T:I:$T:^:$T:^:$T:^:$U:M:$U:M:$U:M:$Windows 2003$Windows XP$_:H:$_:H:$_:H:i:_:U:M:m:S:$i:_:$m:S:$m:S:$m:S:
                                                                  • API String ID: 2788080104-1869930141
                                                                  • Opcode ID: 81779fb8ec2fb7844face486dbf9875196088208072ce9a1f42b90166b46e7d7
                                                                  • Instruction ID: 6d0cc76d0e804aae92b63c6cad43c0272c64254fc5d5ba97bf64b7c06324eec7
                                                                  • Opcode Fuzzy Hash: 81779fb8ec2fb7844face486dbf9875196088208072ce9a1f42b90166b46e7d7
                                                                  • Instruction Fuzzy Hash: 564249775197C0CAE331CF64A4402DEBBB1F799748F14920AEBD81AA59DB78E285CF01
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Alloc$CriticalSection$Free$EnterReadServicelstrlenmemcpy$EnumLeaveLocalOpenServicesStatus$CloseConfig2HandleInitializeManagerQuerymemset
                                                                  • String ID:
                                                                  • API String ID: 1976463032-0
                                                                  • Opcode ID: 7b2f46c046eb0df612dace71feae6b13266046c80c2e61bb4cea95ef20f33a6a
                                                                  • Instruction ID: d8ccae86e541dbbf990de4e15f59c8428891a3cd4b4d300e5fd53d7298f298db
                                                                  • Opcode Fuzzy Hash: 7b2f46c046eb0df612dace71feae6b13266046c80c2e61bb4cea95ef20f33a6a
                                                                  • Instruction Fuzzy Hash: 15328E26A15BC592F711CF69D9587AC7361F7AAB88F24E215CF8913A12EF34E2D5C300
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$memcpy$closesocketconnectfreeaddrinfogetsocknamehtonssocketstrncpy
                                                                  • String ID: GET$POST$RAW$Unable to connect$client_connect3$conn fail: %d$conn fail: change pollfd$conn fail: insert fd$conn fail: skt creation: errno %d$conn fail: skt options: errno %d$conn fail: sock accept$conn fail: socket bind$lws_free$waiting for event loop watcher to close
                                                                  • API String ID: 3000816023-458479724
                                                                  • Opcode ID: eb5c3f84558ecdbfd18ac383cc6d319a2892e754ee5c4f588fd732f29735face
                                                                  • Instruction ID: 0d34c3422ebadb23b14ad64907670d37bc00406316c7d1262ce4121d1e906120
                                                                  • Opcode Fuzzy Hash: eb5c3f84558ecdbfd18ac383cc6d319a2892e754ee5c4f588fd732f29735face
                                                                  • Instruction Fuzzy Hash: 5312C72A612781A5FB50DFA2D4083EDA7A2FBD4B98F788032EE0957699DF34C547C710
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$CriticalSection$AllocRead$EnterFileFreeLeave$lstrcat$CloseCreateErrorHandleLastSizememset
                                                                  • String ID: @$C:\Program Files\Windows Mail$\cp.cfg
                                                                  • API String ID: 1502650097-1776503346
                                                                  • Opcode ID: f15dfe6790652864035020a4c4ae5e7f25b6424366a9ee693396d80b06e4d85c
                                                                  • Instruction ID: ed19d00cef9855e1282380b8cc32e57eba2220f4572d3fdd13c5225665ca378a
                                                                  • Opcode Fuzzy Hash: f15dfe6790652864035020a4c4ae5e7f25b6424366a9ee693396d80b06e4d85c
                                                                  • Instruction Fuzzy Hash: FBC1D376306B8492FB248F65D65C769A3A2FBC6B84F68C215CE9A13B94DF38C416C701
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: lstrlen$ByteCharMultiWide$ClipboardVirtual$AllocGlobal$Freememcpy$CloseDataEmptyLockOpenUnlock
                                                                  • String ID: !
                                                                  • API String ID: 17242508-2657877971
                                                                  • Opcode ID: 20bafc32ef5a585f558690f26a764bf30522b84af687a9e6b7f5ff9df58e1b49
                                                                  • Instruction ID: f4709e106b51c48890fe957b740aa21b4b443e4ff52daec8168139da72ffb674
                                                                  • Opcode Fuzzy Hash: 20bafc32ef5a585f558690f26a764bf30522b84af687a9e6b7f5ff9df58e1b49
                                                                  • Instruction Fuzzy Hash: 45717E79202B4092FB14DFA6A99C759B2A3FBC9B85F548025D98B67B64DF3CC1478700
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: lstrcat$CriticalFileFindSectionmemset$FreeLeaveNextVirtual$CurrentEnterFirstObjectReadSingleSleepThreadWait__chkstklstrlenwcsstr
                                                                  • String ID: *.*
                                                                  • API String ID: 491004167-438819550
                                                                  • Opcode ID: 41c60606cf71299194d094ffcb0d79d7accedc4f2f3c97aeda98fc52c43179c5
                                                                  • Instruction ID: 25d9e086a9a697236c39c287d57821dce9ed6262cc1de167ff272fd7fc1a2654
                                                                  • Opcode Fuzzy Hash: 41c60606cf71299194d094ffcb0d79d7accedc4f2f3c97aeda98fc52c43179c5
                                                                  • Instruction Fuzzy Hash: 5A91967A302B45E7FB20DFA2D94C799A3A2F7C9B84F548016DE4987A58EF38C556C700
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$Virtual$AllocEnterFileLeaveRead$Freelstrcat$CloseCreateHandlePointerWritememset
                                                                  • String ID: C:\Program Files\Windows Mail$\cp.cfg
                                                                  • API String ID: 1370748441-3904790782
                                                                  • Opcode ID: bca81e2efae6b1571e8d57f22e6010d2909c7d5f413c38ae0f0f4c8813eca49a
                                                                  • Instruction ID: d4c3318b7e12967d9026c6faeae0fe8b3db084a001ec00fab05ce9d69499c4e1
                                                                  • Opcode Fuzzy Hash: bca81e2efae6b1571e8d57f22e6010d2909c7d5f413c38ae0f0f4c8813eca49a
                                                                  • Instruction Fuzzy Hash: CFE1F67A716B8492FB148F65E64C76DA3A2FBC6B84F64C216DE8913B54EF38C146C700
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$CriticalSection$AllocFree$EnterErrorFileLastRead$CreateLeavehtonslstrcatmemset$CloseDirectoryHandleInitializeWindowsWrite
                                                                  • String ID: 192.197.113.45$\\.\{F8284233-48F4-4680-ADDD-F8284233}$\system32\drivers\tpdrivers.sys$tpdrivers
                                                                  • API String ID: 3655753775-3639078956
                                                                  • Opcode ID: 919cc55b61c48cfdaf4edc72b84664017df8a73146a8bb9e500be7668f24e105
                                                                  • Instruction ID: c3c4be10254eebed1e2063b0d99f2a3b9a68946fb01de8cecbfded50b867ac76
                                                                  • Opcode Fuzzy Hash: 919cc55b61c48cfdaf4edc72b84664017df8a73146a8bb9e500be7668f24e105
                                                                  • Instruction Fuzzy Hash: C871A829716A40A2FB64DFA2F55C79AF3A2FBC9B44F14C125DA8A43A94DF3CC0568710
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Free$AllocCriticalSection$EnterRead$Leavememcpy$CreateCurrentErrorInitializeLastMutexProcessSleepfreelstrcatmallocmemsetwsprintf
                                                                  • String ID: %s%d$:$Inject Test
                                                                  • API String ID: 3230380526-1060902658
                                                                  • Opcode ID: c5765972512c8ed66fda6ab9132c5441f00b95d89a35d61cc81ef2c02852fef9
                                                                  • Instruction ID: 513b02a003ba55705f2578a5c3576956dc9109f8e77706b96e9b5cb532337257
                                                                  • Opcode Fuzzy Hash: c5765972512c8ed66fda6ab9132c5441f00b95d89a35d61cc81ef2c02852fef9
                                                                  • Instruction Fuzzy Hash: E5919379706B4592FB14DFA6E458769A3A2FBCAF84F68C225898A53B54DF3CC046C700
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: File$lstrlen$memset$ByteCharMultiVirtualWideWindow$AllocAttributesCreatePointerProcessWritelstrcat$CloseCountForegroundFreeHandleLocalSessionTextThreadTickTime__chkstkwsprintf
                                                                  • String ID: [Keyboard recording content:]$[PROCESS:]%s[USERID:]%d[TITLE:]%s[TIME:]%d-%d-%d %d:%d:%d
                                                                  • API String ID: 599969897-1868071797
                                                                  • Opcode ID: fc949c9e7c180c8da36c131bbee31611ea2d52e97aebed103c6a9c4030655ac8
                                                                  • Instruction ID: c1b7b987851b747bce4650885f397562c9aec96c11c7fd24822d66a5dd7b61a5
                                                                  • Opcode Fuzzy Hash: fc949c9e7c180c8da36c131bbee31611ea2d52e97aebed103c6a9c4030655ac8
                                                                  • Instruction Fuzzy Hash: CB71C639205684E6F720CFA5E8487E9B3A2F7C9B85F548026E94E47A64DF3CC147CB40
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Free$memset$CriticalSection$Alloc$Enum$EnterRead$LeaveValue$CloseInitializeOpen__chkstk
                                                                  • String ID:
                                                                  • API String ID: 2734444383-0
                                                                  • Opcode ID: c0c9833c2f1ec5aa2b8413b7e82f312a022f5a55e2d428ebe758d45864ea3803
                                                                  • Instruction ID: 2aeaa99a79275a61b9a21616042cae7ff3a801f5fefe1f193a7091964369147c
                                                                  • Opcode Fuzzy Hash: c0c9833c2f1ec5aa2b8413b7e82f312a022f5a55e2d428ebe758d45864ea3803
                                                                  • Instruction Fuzzy Hash: 03F17D36301B8196EB74CFA2D998B9EB3A1FB89B85F508015DF5A47B58DF38C156CB00
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$AllocVirtual$EnterLeaveRead$Initialize$CreateEvent$memset
                                                                  • String ID:
                                                                  • API String ID: 1099351009-0
                                                                  • Opcode ID: d76a2c5b0969588b41ef461a21c153d8670cb52fb012b22ca1de8b5fbc59f176
                                                                  • Instruction ID: 1236f22a79dd406d17f0f8b0f1f98dcf24069f8c781b72fcd2b1205804109de4
                                                                  • Opcode Fuzzy Hash: d76a2c5b0969588b41ef461a21c153d8670cb52fb012b22ca1de8b5fbc59f176
                                                                  • Instruction Fuzzy Hash: EAB16F39202F40E2FB458F61EA48799B7A6F785B84FA0C126CB5D43760EF38D566D341
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandle$CreateFreeVirtual$Pipe$InfoProcessStartupThreadlstrcatmemset
                                                                  • String ID:
                                                                  • API String ID: 3234776578-3916222277
                                                                  • Opcode ID: 748075d32db5a7721aa9856b90801b439f4802cfd92a9538f61b3ddd284796bc
                                                                  • Instruction ID: 8d5007b9bc7667cd61e9472fa1d9c7ac7e63eb25d0f96127bfad9b8ec7f0059a
                                                                  • Opcode Fuzzy Hash: 748075d32db5a7721aa9856b90801b439f4802cfd92a9538f61b3ddd284796bc
                                                                  • Instruction Fuzzy Hash: 63915F3A602B40E6FB54CFA2F95875EB3B5FB88B48F148116DE8943A14DF38C1A5D744
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CloseErrorHandleLastmemset$CreateFileVirtual$AllocDirectoryFreeProcessWindowsWritelstrcatwsprintf
                                                                  • String ID: \rar.exe$h$rar.exe x "%s" "%s"
                                                                  • API String ID: 2158214755-1420003661
                                                                  • Opcode ID: 5e9b4a59aed4b4de70113cb02e0e9ef7dc6a8c2b10892aa3f7f01b5f90f20a3d
                                                                  • Instruction ID: 02d220da5f399ac2f42ca45570059ce108483b820b9e23e2c616251720d1d115
                                                                  • Opcode Fuzzy Hash: 5e9b4a59aed4b4de70113cb02e0e9ef7dc6a8c2b10892aa3f7f01b5f90f20a3d
                                                                  • Instruction Fuzzy Hash: 7781BF76615B8197FB20CFB1E84879DB3A2F7C9B88F509225CE4A57A58DF39C145CB00
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$AllocCriticalSection$FreeProcess$Heap$EnterReadSession$CloseCreateHandleLeaveProcess32lstrcat$ActiveConsoleCurrentFirstInitializeNextSnapshotThreadToolhelp32lstrcmpimemcpymemset
                                                                  • String ID: explorer.exe
                                                                  • API String ID: 1072794995-3187896405
                                                                  • Opcode ID: 98c28f7a3e6853c6c1b60e024fe1d0a7cb6813ed080a4efa262067ae284fd3cd
                                                                  • Instruction ID: 6d0862245cdbe1926f940b24b7e7c2f203f2d18f6d87b28df572f4fed05228ce
                                                                  • Opcode Fuzzy Hash: 98c28f7a3e6853c6c1b60e024fe1d0a7cb6813ed080a4efa262067ae284fd3cd
                                                                  • Instruction Fuzzy Hash: 2971B0A9306B80E2FB649FA2E94C769A3A2FBC5F84F64C116DE4653B54DF38C4568700
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Process$Token$CloseHandleOpen$AdjustCurrentErrorLastLookupPrivilegePrivilegesValue$EnumFileImageModulesNamelstrcpymemset
                                                                  • String ID: SeDebugPrivilege$SeTcbPrivilege
                                                                  • API String ID: 4244359295-3171858176
                                                                  • Opcode ID: 51d2edd5c60738ffa5d0fdb0cca7e17e9b36116d7ade6d5bc03d967e336e03f1
                                                                  • Instruction ID: c97523f441dda109c5f9e3632b66334e4d9413fbcbedc7ad87e6d790c77ddb09
                                                                  • Opcode Fuzzy Hash: 51d2edd5c60738ffa5d0fdb0cca7e17e9b36116d7ade6d5bc03d967e336e03f1
                                                                  • Instruction Fuzzy Hash: D751933A216A4091F7608FA1E80C7D9A3A2F7C5B64F50D216D95947AD4DF7CC14BCB40
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: closesocketsetsockopt$ErrorLast$listensocket
                                                                  • String ID: %s: VH %s: iface %s port %d DOESN'T EXIST$%s: VH %s: iface %s port %d NOT USABLE$ERROR opening socket$Out of mem$_lws_vhost_init_server_af$listen failed with error %d$listen|%s|%s|%d$lws_create_vhost$reuseaddr failed
                                                                  • API String ID: 3630065070-1684632830
                                                                  • Opcode ID: 56d6c0d6c2e486f488bfdeb426c9946559a07e7a810c0e6f636a7120c48fabe0
                                                                  • Instruction ID: 81338442a65d56115b56c73635f76b7322deeed03a9db5b8df63a8b432d373b3
                                                                  • Opcode Fuzzy Hash: 56d6c0d6c2e486f488bfdeb426c9946559a07e7a810c0e6f636a7120c48fabe0
                                                                  • Instruction Fuzzy Hash: F9D1D33A202A84A2FB54CF55D44D79DB7A2F788BA8F64C222DE2D477A4DF34C256C740
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CountCursorTickWindowmalloc$ForegroundInfoTextfreelstrlenmemsetwsprintf
                                                                  • String ID: %s|%d
                                                                  • API String ID: 14445030-1229896841
                                                                  • Opcode ID: dcdcf8374226a3ccfbb2827651b01a1de8bcf6c732bb97cedd53e70132965785
                                                                  • Instruction ID: b857e945eca498e6863e31e5857123f8a30540fc6d254d1abfba180304af5968
                                                                  • Opcode Fuzzy Hash: dcdcf8374226a3ccfbb2827651b01a1de8bcf6c732bb97cedd53e70132965785
                                                                  • Instruction Fuzzy Hash: AB818339712B419AFB54DFA6E94C79873A2FBC9B98F148125DE4A47B54DF38C086C700
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Service$ErrorLast$CloseHandle$lstrcatmemset$CreateDirectoryManagerOpenStartWindows
                                                                  • String ID: FSFilter Activity Monitor$FltMgr$\system32\drivers\tpdrivers.sys$tpdrivers
                                                                  • API String ID: 4233479461-606275738
                                                                  • Opcode ID: 7b857e422064ef3de2e2687e52ee3d06e09fa56a0c6970dce3fe4e98a62ea91b
                                                                  • Instruction ID: a2fb261e8394744596e161dc0f7aaa01c51039a46b185a6cba371e9cb9fcecb1
                                                                  • Opcode Fuzzy Hash: 7b857e422064ef3de2e2687e52ee3d06e09fa56a0c6970dce3fe4e98a62ea91b
                                                                  • Instruction Fuzzy Hash: 83316179616B40E2FB108F95F55C79AB3A2FBC9754F648026DA8943B64EF3CC14ACB04
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: FreeVirtual$Servicelstrlenmemcpy$CloseHandlelstrcpy$AllocConfigLocalQuery
                                                                  • String ID: \Pbk
                                                                  • API String ID: 4179252731-1099493443
                                                                  • Opcode ID: b77d51fa12385468c5ee568c32fb12288e0777874571c5e8db0c05f26f135837
                                                                  • Instruction ID: 1ddc5b0b8724d7176b00469a44f845a54d3e8ca9458bedd22b34d3466633e45c
                                                                  • Opcode Fuzzy Hash: b77d51fa12385468c5ee568c32fb12288e0777874571c5e8db0c05f26f135837
                                                                  • Instruction Fuzzy Hash: CFC1BE26A15B8592F711CF79D5187AC6361FBDAB88F24E215CF4913A12EF35E1E6C300
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: FreeVirtual$Servicelstrlenmemcpy$CloseHandlelstrcpy$AllocConfigLocalQuery
                                                                  • String ID: ~~
                                                                  • API String ID: 4179252731-2945576293
                                                                  • Opcode ID: a1b45eeceb69098cce945d41d3140ebbf50484008a946239a46d13f937bb52ff
                                                                  • Instruction ID: 6e9239cd096255358b5af1e1b1fde97ae7f9ae0b1560f91c43158df6c4c76e17
                                                                  • Opcode Fuzzy Hash: a1b45eeceb69098cce945d41d3140ebbf50484008a946239a46d13f937bb52ff
                                                                  • Instruction Fuzzy Hash: D2C1BF26A15B8592F711CF79D5187AC6361FBDAB88F24E215CF4913A12EF35E1E6C300
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: FreeVirtual$Servicelstrlenmemcpy$CloseHandlelstrcpy$AllocConfigLocalQuery
                                                                  • String ID: ck(W
                                                                  • API String ID: 4179252731-3825715661
                                                                  • Opcode ID: a1b45eeceb69098cce945d41d3140ebbf50484008a946239a46d13f937bb52ff
                                                                  • Instruction ID: d4b21c65a7ef8d389424889975383cd7bac7a8210d9fa020d47f92e4b1a50b94
                                                                  • Opcode Fuzzy Hash: a1b45eeceb69098cce945d41d3140ebbf50484008a946239a46d13f937bb52ff
                                                                  • Instruction Fuzzy Hash: EFC1BE26A15B8592F711CF79D5187AC6361FBDAB88F24E215CF4913A12EF35E1E6C300
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: FreeVirtual$Servicelstrlenmemcpy$CloseHandlelstrcpy$AllocConfigLocalQuery
                                                                  • String ID: \Pbk-N
                                                                  • API String ID: 4179252731-2524875733
                                                                  • Opcode ID: a518ca04a80f98a678e0b47f4e262c1edb192ada4c1eaff6745d369851720ab4
                                                                  • Instruction ID: df5e969996d94a2d31b9d0e75d950341d39d5e8ddb0b72d5450f03b89dd73d52
                                                                  • Opcode Fuzzy Hash: a518ca04a80f98a678e0b47f4e262c1edb192ada4c1eaff6745d369851720ab4
                                                                  • Instruction Fuzzy Hash: FCC1BE26A15B8592F711CF79D5187AC6361FBDAB88F24E215CF4913A12EF35E1E6C300
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Message$CreateCriticalErrorHookLastSectionWindowWindows$AllocDevicesDispatchEnterHandleInputLeaveLongModuleReadRegisterThreadTranslateUnhookVirtual
                                                                  • String ID: static
                                                                  • API String ID: 2132721342-2160076837
                                                                  • Opcode ID: 679af59b026f32d1d86beea9d8d419bba1a60b64fbd3c074e0861383a5aaab2b
                                                                  • Instruction ID: c25ab4f47b3294293d315a8f353fc7f3e38d80aa236a8721adc9d6082679a0e9
                                                                  • Opcode Fuzzy Hash: 679af59b026f32d1d86beea9d8d419bba1a60b64fbd3c074e0861383a5aaab2b
                                                                  • Instruction Fuzzy Hash: 7451437A206B80E2F7148FA1F95CB5AB3E6FBC9B44F688016DA4953764DF38C556C700
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Process$CreateProcess32$AllocCloseHandleMemoryNextOpenRemoteThreadVirtualWritelstrcmpi$FirstSnapshotToolhelp32
                                                                  • String ID: @$winlogon.exe
                                                                  • API String ID: 2717908072-2705468112
                                                                  • Opcode ID: 29f8420343cec9b4b21dc1987b7defb73e85e1454b62bebeda566836a203a5ca
                                                                  • Instruction ID: df10a763c80504bf9086b20f5fea637d31759496d7fcd5d4522a32af3f4cd85d
                                                                  • Opcode Fuzzy Hash: 29f8420343cec9b4b21dc1987b7defb73e85e1454b62bebeda566836a203a5ca
                                                                  • Instruction Fuzzy Hash: CE516029306B4196FB648F96F95C756F3A2FBCAB88F588129CA4947754EF3CC1478700
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$AllocCriticalFreeSection$Read$EnterFile$CloseHandleLeavelstrcat$CreateInitializeSizememset
                                                                  • String ID: C:\Program Files\Windows Mail$\temp.key
                                                                  • API String ID: 1994389154-229217837
                                                                  • Opcode ID: e88102d0544aa8df28727628e5808d0055df72ca167b4125772961bf00e46c06
                                                                  • Instruction ID: 0734c9aecead320b97fd15f750236c3268760cb14b1c4aac02c414c2f0c7f68b
                                                                  • Opcode Fuzzy Hash: e88102d0544aa8df28727628e5808d0055df72ca167b4125772961bf00e46c06
                                                                  • Instruction Fuzzy Hash: 0391D336712B8092FB14CFA6E54CB5AB7A2FBC9B80F14C615DE8A47B54DF38C5568B00
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: File$AttributesCreatePointerVirtualWritelstrcat$AllocCloseCountFreeHandleTickmemset
                                                                  • String ID: C:\Program Files\Windows Mail$\temp.key
                                                                  • API String ID: 573267298-229217837
                                                                  • Opcode ID: eb73b11bebb12c59d1c57ca0c2106ab5f1786359d010a4a01a80fbb47712b4fd
                                                                  • Instruction ID: 3058e36e624c1998cb6cca66d47aa151f96f75b68eb5694a3fc09ae1b2342a62
                                                                  • Opcode Fuzzy Hash: eb73b11bebb12c59d1c57ca0c2106ab5f1786359d010a4a01a80fbb47712b4fd
                                                                  • Instruction Fuzzy Hash: 4A610576611B8492FB20CF65E50CB99B762FBC9B98F64D211DA8513B54EF3CC50ACB00
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$CriticalSection$Alloc$Enter$FreeLeaveRead$ByteCharMultiWide$ObjectSingleWait$FileInitializeNamedPeekPipeSleep
                                                                  • String ID:
                                                                  • API String ID: 1492683211-0
                                                                  • Opcode ID: 50f4985042c921f4f2bdaf4587066dceb9afccac07f757d897c59e1bf45b3079
                                                                  • Instruction ID: 32b023b0f2e99e54753fa53da00232581685efbcb4157020b61f56b63fcc8344
                                                                  • Opcode Fuzzy Hash: 50f4985042c921f4f2bdaf4587066dceb9afccac07f757d897c59e1bf45b3079
                                                                  • Instruction Fuzzy Hash: AA819336205A80D6F764CF66E508B5AF7E6FBC9B84F54812ADA4987B64DF39C046CB00
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Alloc$MemoryProcessWrite$Protect$AddressErrorFreeHandleLastModuleProcmemcpy
                                                                  • String ID: @$ZwCreateThreadEx$h$ntdll.dll
                                                                  • API String ID: 2541485474-1855171776
                                                                  • Opcode ID: 7a8311cc7dc6849816555179bd9628da08200b2fd6494e16f475aad11e460869
                                                                  • Instruction ID: 9795c5a2fbc59824722392a98815b9a64ae14c84efcae4590a67b24dff3091f5
                                                                  • Opcode Fuzzy Hash: 7a8311cc7dc6849816555179bd9628da08200b2fd6494e16f475aad11e460869
                                                                  • Instruction Fuzzy Hash: AE813C627057809AF724CFB9A8587AD7B61F796788F148229DE8563B84CF38C207C750
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: FromString$CreateInitializeInstance
                                                                  • String ID: :_:$:Y:$:$:$A::$X:[:$X:^:$Y::$Y:\:$\:[:$\:^:$^:G:
                                                                  • API String ID: 511945936-736265694
                                                                  • Opcode ID: 6f65156dbf696046caf638914e9d193d0eb7e6b3cd83c2f0a31e7d0e7da0aa0e
                                                                  • Instruction ID: 20b4a22b4d1f998a6b623101fc089021a7971585e1727dbe4687e42f0c3b3c94
                                                                  • Opcode Fuzzy Hash: 6f65156dbf696046caf638914e9d193d0eb7e6b3cd83c2f0a31e7d0e7da0aa0e
                                                                  • Instruction Fuzzy Hash: D6910D73919BD5CAE3118F79A4016AABB60F7E5348F10A249EBC466919EB7CE580CF00
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: FreeVirtual$EventEvents$CreateCriticalEnumMultipleNetworkSectionSelectWait$CurrentEnterLeaveReadThread
                                                                  • String ID:
                                                                  • API String ID: 4074094491-0
                                                                  • Opcode ID: 9e91bfc9ef544f9a95d43254c8dff832cda68e6186363fcb9a4b6ce2138c1c54
                                                                  • Instruction ID: e60ca4a273181684cb82f39fff0b6e4accb5ab6a4b0eb08f38c1f533accb1e0f
                                                                  • Opcode Fuzzy Hash: 9e91bfc9ef544f9a95d43254c8dff832cda68e6186363fcb9a4b6ce2138c1c54
                                                                  • Instruction Fuzzy Hash: D6B1933A202B4092FB65DF96E48C799B3A2FBC9B94F248115EE5A43794DF38C496C700
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: FreeVirtual$Servicelstrlenmemcpy$CloseHandlelstrcpy$AllocConfigLocalQuery
                                                                  • String ID:
                                                                  • API String ID: 4179252731-0
                                                                  • Opcode ID: a3856b18d4b71ffe09753b2843bea3402236ed1a4c29b22b69b3066f206c14ee
                                                                  • Instruction ID: e72e8a1140d1f164fc9174a3b10c8849742074417fe26279ebcaee2c915976ea
                                                                  • Opcode Fuzzy Hash: a3856b18d4b71ffe09753b2843bea3402236ed1a4c29b22b69b3066f206c14ee
                                                                  • Instruction Fuzzy Hash: 7DC1BE26A15B8592F711CF79D5187AC6361FBDAB88F24E215CF4913A12EF35E1E6C300
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: FreeVirtual$Servicelstrlenmemcpy$CloseHandlelstrcpy$AllocConfigLocalQuery
                                                                  • String ID:
                                                                  • API String ID: 4179252731-0
                                                                  • Opcode ID: c254307e67488c3623d58bee08e06feaecd280e700d2345b01e4a01756176830
                                                                  • Instruction ID: c552eb847bae7f7da368cd261e14d98a0ac04bc90eb27114fa4e234a890d311a
                                                                  • Opcode Fuzzy Hash: c254307e67488c3623d58bee08e06feaecd280e700d2345b01e4a01756176830
                                                                  • Instruction Fuzzy Hash: 6AC1BE26A15B8592F711CF79D5187AC6361FBDAB88F24E215CF4913A12EF35E1E6C300
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: FreeVirtual$Servicelstrlenmemcpy$CloseHandlelstrcpy$AllocConfigLocalQuery
                                                                  • String ID:
                                                                  • API String ID: 4179252731-0
                                                                  • Opcode ID: d09215ca54577ca17aa5ff3024d3fa94f371ecf659accf61201443d43b535354
                                                                  • Instruction ID: 1891bcd84954314b9e243f0f9a109d3c057f3f0ed10fa5e048e56fde235a90b3
                                                                  • Opcode Fuzzy Hash: d09215ca54577ca17aa5ff3024d3fa94f371ecf659accf61201443d43b535354
                                                                  • Instruction Fuzzy Hash: A4C1BE26A15B8592F711CF79D5187AC6361FBDAB88F24E215CF4913A12EF35E1E6C300
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$AllocCriticalFreeSection$Read$Enter$CloseHandleInitializeLeave$CreateEventMultipleObjectsWait
                                                                  • String ID:
                                                                  • API String ID: 1725847572-0
                                                                  • Opcode ID: f549322a3b5621ab8d80f2d6d8757b4ebdbe63a63a0333a4f599cac5bba947b8
                                                                  • Instruction ID: 3bf7b7de43bd9a5063212241038170865860d5ffe95aebe904f72442e4724719
                                                                  • Opcode Fuzzy Hash: f549322a3b5621ab8d80f2d6d8757b4ebdbe63a63a0333a4f599cac5bba947b8
                                                                  • Instruction Fuzzy Hash: 04A11C3A202B4096FB54CFA2E55876AB3A6FBC9F94F54C125CE4A43B54DF38C496C740
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$AllocCriticalSection$Free$FileRead$EnterErrorLast$Leavefree$CreateInitializePointerSizemallocmemcpy
                                                                  • String ID:
                                                                  • API String ID: 1128571104-0
                                                                  • Opcode ID: 280e83c3d331265542770051d0c8d276843b1b8b5e3364cd17c4caa20576ede8
                                                                  • Instruction ID: 7f35b7077f8da301631d50f5652bc7b370f5f47ca9db57c858c160d8b52d9038
                                                                  • Opcode Fuzzy Hash: 280e83c3d331265542770051d0c8d276843b1b8b5e3364cd17c4caa20576ede8
                                                                  • Instruction Fuzzy Hash: 7571933A306B8096F764CFA2E95C75AB7A2FBC9B94F508115DE8A43B54DF39C046DB00
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CapsDevice$BlockInput$Virtualkeybd_event
                                                                  • String ID:
                                                                  • API String ID: 4019288356-0
                                                                  • Opcode ID: d66eda08ee5622a6591ffe4f6a43e3dc4b0c4fb3f8c5729876a8739658834e50
                                                                  • Instruction ID: 4e7af33cd48b3daf493620b0deed5b28ce90865ac8a5f821b32134e39859deb3
                                                                  • Opcode Fuzzy Hash: d66eda08ee5622a6591ffe4f6a43e3dc4b0c4fb3f8c5729876a8739658834e50
                                                                  • Instruction Fuzzy Hash: 3061273A61568093F3659FB1A80CB9AB3E2FBCE745F64C212DA4613664DF38D486C700
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: strchr
                                                                  • String ID: %s: ended on e %d$%s: malformed ip address$lws_create_vhost$lws_parse_numeric_address
                                                                  • API String ID: 2830005266-2525933588
                                                                  • Opcode ID: f2ddd9f25b7366d5a724c830f8fff6cd8c50e6db8bcb4e026864a35d7b1d132e
                                                                  • Instruction ID: eed3174da902dd9fc516eba1dd01609941674db035a3c4036d1037b8e8f8571d
                                                                  • Opcode Fuzzy Hash: f2ddd9f25b7366d5a724c830f8fff6cd8c50e6db8bcb4e026864a35d7b1d132e
                                                                  • Instruction Fuzzy Hash: 57A1FA1930668075FA20CEB8940C3AAF653AFE17A8F78D231EAA7876D5DF35C4478301
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC17583
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1364B
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1365D
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13670
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13687
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC136B6
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC136C8
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC136DB
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC136F2
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13721
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13733
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13746
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1375D
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1378C
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1379E
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC137B4
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC175AD
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC175FD
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC17627
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1764F
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC17679
                                                                  • DisconnectNamedPipe.KERNEL32 ref: 000002287BC176A6
                                                                  • CloseHandle.KERNEL32 ref: 000002287BC176B5
                                                                  • DeleteCriticalSection.KERNEL32 ref: 000002287BC176C3
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC176D4
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC17775
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1779F
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC177B5
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC177DF
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC177F5
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC137D8
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC137F1
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13807
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1382B
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13844
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1385A
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13886
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1389F
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC138B5
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC138D9
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC138F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13908
                                                                    • Part of subcall function 000002287BC16D20: IsBadReadPtr.KERNEL32 ref: 000002287BC16D43
                                                                    • Part of subcall function 000002287BC16D20: EnterCriticalSection.KERNEL32(?,?,00000038,000002287BC17306), ref: 000002287BC16D5E
                                                                    • Part of subcall function 000002287BC16D20: LeaveCriticalSection.KERNEL32(?,?,00000038,000002287BC17306), ref: 000002287BC16D81
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1781F
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$Virtual$Free$EnterRead$Leave$Alloc$lstrcat$CloseDeleteDisconnectHandleInitializeNamedPipememcpymemset
                                                                  • String ID:
                                                                  • API String ID: 4255235403-0
                                                                  • Opcode ID: e1d690db24f22856ec17527d38dac099748b77a5963b07838ac948ce36aa8f80
                                                                  • Instruction ID: 8915407df39c22206e9da8d0c7dcf2660c77833bdd62b756d4072b39fcdfdd01
                                                                  • Opcode Fuzzy Hash: e1d690db24f22856ec17527d38dac099748b77a5963b07838ac948ce36aa8f80
                                                                  • Instruction Fuzzy Hash: 85918E69702B4096FB64DFA7E558729B3A2FBC9F84F18C125CE8A43B55DF38D4928700
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$CriticalFreeSection$AllocCreateEnterErrorLastLeaveReadThreadbindhtonlhtonsinet_addrlistenmemsetsetsockoptsocket
                                                                  • String ID:
                                                                  • API String ID: 1206800484-0
                                                                  • Opcode ID: 1dc4caeba9d830bc8edcec2d178dadc19b4577220f64b26f3bb4bee7fae4f170
                                                                  • Instruction ID: 77aebc18db9af0b596689b897f7442d54341898d1aa12f03b410f3621d9fe127
                                                                  • Opcode Fuzzy Hash: 1dc4caeba9d830bc8edcec2d178dadc19b4577220f64b26f3bb4bee7fae4f170
                                                                  • Instruction Fuzzy Hash: 2951513A216B50E2FB248FA1E95879DB3A1FBC9F45F548026DB4A43B54DF38C596CB00
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: memsetstrcmp
                                                                  • String ID: %s/%s/%s/%s$MQTT$No vhost in the context$YZ[\X]^_RAW$default$free$lws not configured for tls$lws_client_connect_via_info$lws_free$no vhost$novh$raw-proxy$system$unable to bind to role
                                                                  • API String ID: 195427100-1777779229
                                                                  • Opcode ID: 60066d02c62946ac0b75382c712d1b8b03b8e31035fade1f2dcec241d2fc0af3
                                                                  • Instruction ID: 252dcf31b55913e8f9504fd337668294a44e4f637b198da5aecb17ea9a0eac7f
                                                                  • Opcode Fuzzy Hash: 60066d02c62946ac0b75382c712d1b8b03b8e31035fade1f2dcec241d2fc0af3
                                                                  • Instruction Fuzzy Hash: 5102C43A202B85A2FB95CFA1E4483A9B3A1F789B88F948036DF4D47754DF34D166D311
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: htons$ErrorLast_unlinkbindgetsockname
                                                                  • String ID: "%s" too long for UNIX domain socket$@$ERROR on binding fd %d to "%s" (%d %d)$ERROR on binding fd %d to port %d (%d %d)$lws_create_vhost$lws_socket_bind
                                                                  • API String ID: 4073785539-2597659182
                                                                  • Opcode ID: 5e646ba5ba94863d0a73da8f5214a4b9298205cd5804bd77cd5bf3180035a833
                                                                  • Instruction ID: 9eb50bf8e21373d5d7809c9c064cd0516244fb549758653eb975a6ea8efa7e94
                                                                  • Opcode Fuzzy Hash: 5e646ba5ba94863d0a73da8f5214a4b9298205cd5804bd77cd5bf3180035a833
                                                                  • Instruction Fuzzy Hash: 958107766057C096F720CFA0E8443EDB7A2F7E5798F609626EE8947A59DF38C186C700
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Alloc$CriticalSection$CloseEnterHandleInformationObjectProcessQueryReadSingleSystemTokenWait$AdjustCreateCurrentErrorEventFreeInitializeLastLeaveLookupOpenPrivilegePrivilegesValuelstrcmpimemset
                                                                  • String ID: perfmon.exe
                                                                  • API String ID: 441768363-2343862317
                                                                  • Opcode ID: dfac3d95dafb68267b964dbcae157b1c23b791cd9a1bfc5cf907826d86bec976
                                                                  • Instruction ID: 4284110f3e8ad36c01a2b403e3fd955a666258c0186cb520eabeef9f8da1423c
                                                                  • Opcode Fuzzy Hash: dfac3d95dafb68267b964dbcae157b1c23b791cd9a1bfc5cf907826d86bec976
                                                                  • Instruction Fuzzy Hash: AE419D79316658A2FB249F97A91CB2AF7A3EBC5BD0F24C019DD4653A94DF38C8068740
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Message$RegisterWindow$NotificationSession$ClassCreateDispatchHandleLongModuleShowTranslate
                                                                  • String ID: Session Logon
                                                                  • API String ID: 1979525249-2950959013
                                                                  • Opcode ID: 942ff96f7553420a477438ac6e2418f63b7fa3dd18cc102ed8dea73c53fc66ba
                                                                  • Instruction ID: deec788e3572e4054e3524e2106d7e29d8907fc7a93affc03eb618197d8c8d91
                                                                  • Opcode Fuzzy Hash: 942ff96f7553420a477438ac6e2418f63b7fa3dd18cc102ed8dea73c53fc66ba
                                                                  • Instruction Fuzzy Hash: FD418436619B81D2F710CF65F85C75AF3A2FBDA754F649225EA8947A24DF38C086CB00
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$CriticalSection$Alloc$EnterFreeRead$Leave$Initialize$CreateCurrentEventThread
                                                                  • String ID:
                                                                  • API String ID: 3016386783-0
                                                                  • Opcode ID: e3a285b25eaabced6866736b6333e0fc7fa7b9c2b93cdea91f4aefe8000903a1
                                                                  • Instruction ID: 6ef636c9effe307efddf739d039eff90c71debc3d44ed8185890156cd908741e
                                                                  • Opcode Fuzzy Hash: e3a285b25eaabced6866736b6333e0fc7fa7b9c2b93cdea91f4aefe8000903a1
                                                                  • Instruction Fuzzy Hash: 6771733A202F4096FB24CFA2E94C659B3A6FB88B80F55C125DF8A43B64DF38D556C740
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: FileFreeVirtual$CreateErrorLastPointerSizeWritefreemalloc
                                                                  • String ID:
                                                                  • API String ID: 287149550-0
                                                                  • Opcode ID: 6e8d475b8603f0748b7fbf2bb7a43d35069488cfdf279624691fd4053f346cd2
                                                                  • Instruction ID: 1983167751c711052853524a3b344d7fa68c2bd6d1d16633401927264b0b5694
                                                                  • Opcode Fuzzy Hash: 6e8d475b8603f0748b7fbf2bb7a43d35069488cfdf279624691fd4053f346cd2
                                                                  • Instruction Fuzzy Hash: 32617076312B8096FB24CF62E95875AB3A6FBC9F94F148515CE8A47B54DF38C096CB00
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Message$ClipboardWindow$ChainChangeClassCreateDispatchHandleModuleRegisterShowTranslateViewer
                                                                  • String ID: CutActive
                                                                  • API String ID: 3542119435-15800375
                                                                  • Opcode ID: 92024b0bde8b3bff67f886c4a971c1a60dd38fa2e23f31450fe170ca41bc3e37
                                                                  • Instruction ID: 8df1424bdc2402b4c00e1e8ade8816d8c638e4ee9f0fb0244f1cc4cf02ebfb68
                                                                  • Opcode Fuzzy Hash: 92024b0bde8b3bff67f886c4a971c1a60dd38fa2e23f31450fe170ca41bc3e37
                                                                  • Instruction Fuzzy Hash: E3419576615BC192FB20CF61F59875AB3A2FBD9744F659125EA8943A14DF38C085C700
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLastProcessToken$AdjustAllocCloseCurrentHandleLookupOpenPrivilegePrivilegesValueVirtualmemcpy
                                                                  • String ID: SeDebugPrivilege
                                                                  • API String ID: 941393880-2896544425
                                                                  • Opcode ID: 64d226b9670f49d8a9e0e705f923d0f2e7b35577b626c09a55b078f8c501a6b6
                                                                  • Instruction ID: 6c6f791493302abf325a8a09e62bd9911342f299f5dd8de4e403c6cd3da17504
                                                                  • Opcode Fuzzy Hash: 64d226b9670f49d8a9e0e705f923d0f2e7b35577b626c09a55b078f8c501a6b6
                                                                  • Instruction Fuzzy Hash: C1317175206B41D2F754DFA6B948A8AB7A1F7C4B94F248126AE5A437A4DF38C446CB00
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC13FE6
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC1410D
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC14126
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1413C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC14240
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1426A
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1427B
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC14166
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1432F
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC14359
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Free$Alloc$CriticalSection$EnterRead$Leave$Initialize_time64randsrand
                                                                  • String ID: :
                                                                  • API String ID: 3336294232-336475711
                                                                  • Opcode ID: 4a1ee15b70e983d72f2b6c8e8c89807c7b3f2bf339b37207a4164e15b2f1c3b3
                                                                  • Instruction ID: a90a99278ee96c7a1bf51705e177d36a790407bd77c36a876869d4d1712c8bf9
                                                                  • Opcode Fuzzy Hash: 4a1ee15b70e983d72f2b6c8e8c89807c7b3f2bf339b37207a4164e15b2f1c3b3
                                                                  • Instruction Fuzzy Hash: 5DB1D366711B8182FB158F7AE408769A7A2FBCAF84F24D225DE8957744EF38C446CB40
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Process$ErrorLastOpenToken$AdjustCloseCurrentHandleLookupPrivilegePrivilegesValue
                                                                  • String ID: SeDebugPrivilege
                                                                  • API String ID: 3627867324-2896544425
                                                                  • Opcode ID: 957489cac4136593f29e2710016b529f371e9bf1ab0a929def486fffce1b8d9d
                                                                  • Instruction ID: 1efa2491ec4f2842813b561088a9878c844b6f31c9ab99e83eb1c9f9f05710ba
                                                                  • Opcode Fuzzy Hash: 957489cac4136593f29e2710016b529f371e9bf1ab0a929def486fffce1b8d9d
                                                                  • Instruction Fuzzy Hash: 3C215E79216B44D1F750CF51F51C74AB2A2FBC5BA4F248216AAAA93BE4DF78C0068B40
                                                                  APIs
                                                                  • memset.NTDLL ref: 000002287BC1D5A9
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1D5E2
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1D60C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1D664
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1D68E
                                                                  • ShellExecuteW.SHELL32 ref: 000002287BC1D6BA
                                                                  • ShellExecuteW.SHELL32 ref: 000002287BC1D6E9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$CriticalSection$Alloc$Free$EnterRead$ExecuteLeaveShell$Initializememset
                                                                  • String ID: open
                                                                  • API String ID: 3986399138-2758837156
                                                                  • Opcode ID: 6d9d256139eb3bc9c2d95be2e2fb8a3d9a934a4e4607d62c8750735d189a9848
                                                                  • Instruction ID: 10dd9319ff0ff2775c541f14a35eca706332c458e330acafd8abfb58664ecabc
                                                                  • Opcode Fuzzy Hash: 6d9d256139eb3bc9c2d95be2e2fb8a3d9a934a4e4607d62c8750735d189a9848
                                                                  • Instruction Fuzzy Hash: 3441BE76306B4496FB24CFA2E58875AB3A2FBC9B84F148015CB8A43F58DF39D056CB00
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: FreeVirtual
                                                                  • String ID:
                                                                  • API String ID: 1263568516-0
                                                                  • Opcode ID: cbc11050a615b560ec0fb16b81fba0894eab893223cedc50fcc949d023bc43e2
                                                                  • Instruction ID: 2eee8fa5dea3f0ae4e20647aa1f4bc24e0bdae295fd1f4388b2e8032d9d244b1
                                                                  • Opcode Fuzzy Hash: cbc11050a615b560ec0fb16b81fba0894eab893223cedc50fcc949d023bc43e2
                                                                  • Instruction Fuzzy Hash: 0051417A302A0097FB14DFA2D658769A3A2FB89F91F148025DE4647B50DF38D1A78700
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • NetUserEnum.NETAPI32 ref: 000002287BC2691C
                                                                  • lstrlenW.KERNEL32 ref: 000002287BC2695E
                                                                  • NetApiBufferFree.NETAPI32 ref: 000002287BC269B9
                                                                  • malloc.MSVCRT ref: 000002287BC269D5
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC26A87
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC26AB1
                                                                  • free.MSVCRT ref: 000002287BC26ABA
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC26AE4
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC26B0E
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$CriticalSection$AllocFree$EnterRead$Leave$BufferEnumInitializeUserfreelstrlenmalloc
                                                                  • String ID:
                                                                  • API String ID: 1638303497-0
                                                                  • Opcode ID: 422d3ffbe3d8cb5f19993c39f39f44159496065362729c67ad13fe53bb009b02
                                                                  • Instruction ID: d5da05fef6dfbec46ca72252bec508f758dee9520289da512438f667982172fb
                                                                  • Opcode Fuzzy Hash: 422d3ffbe3d8cb5f19993c39f39f44159496065362729c67ad13fe53bb009b02
                                                                  • Instruction Fuzzy Hash: FA617236312B8096EB64DFA2E45875EB7A5FBC9F84F148125DE8A43B54DF38C485C700
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: shutdown
                                                                  • String ID: Closed before conn$__lws_close_free_wsi$closed before established$free$general child recurse$lws_free
                                                                  • API String ID: 2510479042-3708836321
                                                                  • Opcode ID: 3e5a43072d973b0e0104fdfc6ddef0d8611c4a43ad48f66a2907ffa38764c6bc
                                                                  • Instruction ID: a398daac7180b35f18426ff5be1127bce7ec3b7605847c4da8964be1031b0c11
                                                                  • Opcode Fuzzy Hash: 3e5a43072d973b0e0104fdfc6ddef0d8611c4a43ad48f66a2907ffa38764c6bc
                                                                  • Instruction Fuzzy Hash: 0812C36A20278092FB558FA5D4583A9BBA2F781B68F68C136DF494B2D9CF34C647C710
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: socket$bindgetsocknamehtonl
                                                                  • String ID: %s: failed$lws_plat_pipe_create
                                                                  • API String ID: 858234250-3012564250
                                                                  • Opcode ID: 3f87ba6ed45bd64227a18573b1ccf183bb6461fb3e8dd54df34caa1bfe4df424
                                                                  • Instruction ID: 025bce082e439024e0181b41b62b2a070808d2fbf48d1438317855d132d48719
                                                                  • Opcode Fuzzy Hash: 3f87ba6ed45bd64227a18573b1ccf183bb6461fb3e8dd54df34caa1bfe4df424
                                                                  • Instruction Fuzzy Hash: 0B21A736311A90A2F7408F64E44C78A7365F785B68F685336DA79473E8DF38C942C745
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Free$InitializeStringVirtual$AllocCreateInitInstanceSecurityVariant
                                                                  • String ID:
                                                                  • API String ID: 1458724981-0
                                                                  • Opcode ID: 91e7c9dbfc30646bc0b29806a77a63c0c93c8328fba435cf8b8a6d760b8d23cc
                                                                  • Instruction ID: 40318e503d1ed7b4ee45a72b27d15787e007347320cd6c6e9d50831257e7a9a0
                                                                  • Opcode Fuzzy Hash: 91e7c9dbfc30646bc0b29806a77a63c0c93c8328fba435cf8b8a6d760b8d23cc
                                                                  • Instruction Fuzzy Hash: 9E816A36615B90D6FB10CFA6E84869DB7B6FBC9B98F118116EE4947B18DF38C146CB00
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1364B
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1365D
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13670
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13687
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC136B6
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC136C8
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC136DB
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC136F2
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13721
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13733
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13746
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1375D
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1378C
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1379E
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC137B4
                                                                  • EnumChildWindows.USER32 ref: 000002287BC35DDA
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC35E93
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC35EC1
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC35ED7
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC35F01
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC35F17
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC35F41
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSectionVirtual$Alloc$EnterRead$FreeLeave$ChildEnumInitializeWindows
                                                                  • String ID:
                                                                  • API String ID: 1372703463-0
                                                                  • Opcode ID: 890bd80eef171c6753082382bea96ea789f709266cadba96a9c55cb09662d23f
                                                                  • Instruction ID: dcd26d2a9556bd1358892a5d9dabe0252b9e7e23bb69bab0edab0bbe4a04604c
                                                                  • Opcode Fuzzy Hash: 890bd80eef171c6753082382bea96ea789f709266cadba96a9c55cb09662d23f
                                                                  • Instruction Fuzzy Hash: A951823A302B4096EB64DF63E85CA5AB7A6FBC9FD4F5280249E4A43704DF38C049DB04
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • EnumWindows.USER32 ref: 000002287BC35B90
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1364B
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1365D
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13670
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13687
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC136B6
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC136C8
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC136DB
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC136F2
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13721
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13733
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13746
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1375D
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1378C
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1379E
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC137B4
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC35C51
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC35C7B
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC35C91
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC35CBB
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC35CD1
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC35CFB
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSectionVirtual$Alloc$EnterRead$FreeLeave$EnumInitializeWindows
                                                                  • String ID:
                                                                  • API String ID: 3069422982-0
                                                                  • Opcode ID: 278c29247941e0e49f0459c8c4c899eab9c06726c83261f9871ab7ff216c4423
                                                                  • Instruction ID: 110b9ca2239bcadc197d4ff4b4a9a0dc5ec4866298f9fc97cdee76cc2b3cee68
                                                                  • Opcode Fuzzy Hash: 278c29247941e0e49f0459c8c4c899eab9c06726c83261f9871ab7ff216c4423
                                                                  • Instruction Fuzzy Hash: 5D418236312B0096FB64DFA3E45C61AB7A6FBC9F84B5AC415DE8A43B14DF39D0858B04
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC258A4
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC258CE
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC258E5
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC259DC
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC25A06
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC25A2B
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC25A55
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC25A7A
                                                                    • Part of subcall function 000002287BC14E80: CloseHandle.KERNEL32 ref: 000002287BC14E9D
                                                                    • Part of subcall function 000002287BC14E80: CloseHandle.KERNEL32 ref: 000002287BC14EB0
                                                                    • Part of subcall function 000002287BC14E80: CloseHandle.KERNEL32 ref: 000002287BC14EC6
                                                                    • Part of subcall function 000002287BC14E80: DeleteCriticalSection.KERNEL32 ref: 000002287BC14EED
                                                                    • Part of subcall function 000002287BC14E80: VirtualFree.KERNEL32 ref: 000002287BC14F1A
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Free$CriticalSection$Alloc$CloseEnterHandleRead$Leave$DeleteInitialize
                                                                  • String ID:
                                                                  • API String ID: 948184506-0
                                                                  • Opcode ID: 56575674953e52446c9c6f2cb0a5475926c8fa99b6cd62e2e2a59526b670af81
                                                                  • Instruction ID: 6ac213f9a92dd4e812461325f6661db8a856bac8ce36c48ce5fdb6a2786dd8c0
                                                                  • Opcode Fuzzy Hash: 56575674953e52446c9c6f2cb0a5475926c8fa99b6cd62e2e2a59526b670af81
                                                                  • Instruction Fuzzy Hash: 6D613039702B4096FB64DFA2E49865AB3A6FB89B40F55C125CF8E43B14EF38D196C740
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC24594
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC245BE
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC245D5
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC246CC
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC246F6
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2471B
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC24745
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2476A
                                                                    • Part of subcall function 000002287BC14E80: CloseHandle.KERNEL32 ref: 000002287BC14E9D
                                                                    • Part of subcall function 000002287BC14E80: CloseHandle.KERNEL32 ref: 000002287BC14EB0
                                                                    • Part of subcall function 000002287BC14E80: CloseHandle.KERNEL32 ref: 000002287BC14EC6
                                                                    • Part of subcall function 000002287BC14E80: DeleteCriticalSection.KERNEL32 ref: 000002287BC14EED
                                                                    • Part of subcall function 000002287BC14E80: VirtualFree.KERNEL32 ref: 000002287BC14F1A
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Free$CriticalSection$Alloc$CloseEnterHandleRead$Leave$DeleteInitialize
                                                                  • String ID:
                                                                  • API String ID: 948184506-0
                                                                  • Opcode ID: 651bcfa8f5b2f8c56ed35097f6478b68f82154c26c75f677c7bf8dc4e9d2a479
                                                                  • Instruction ID: d54796d5706647385d12d25590b1b7595ff5a5015169d7001c6383989d96f1ab
                                                                  • Opcode Fuzzy Hash: 651bcfa8f5b2f8c56ed35097f6478b68f82154c26c75f677c7bf8dc4e9d2a479
                                                                  • Instruction Fuzzy Hash: B661303A602B4096FB64DFA2E45875AB3A6FB89B80F55C125CF8E43B14EF38D195C740
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC25424
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2544E
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC25465
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC25551
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2557B
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC255A0
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC255CA
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC255EF
                                                                    • Part of subcall function 000002287BC14E80: CloseHandle.KERNEL32 ref: 000002287BC14E9D
                                                                    • Part of subcall function 000002287BC14E80: CloseHandle.KERNEL32 ref: 000002287BC14EB0
                                                                    • Part of subcall function 000002287BC14E80: CloseHandle.KERNEL32 ref: 000002287BC14EC6
                                                                    • Part of subcall function 000002287BC14E80: DeleteCriticalSection.KERNEL32 ref: 000002287BC14EED
                                                                    • Part of subcall function 000002287BC14E80: VirtualFree.KERNEL32 ref: 000002287BC14F1A
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Free$CriticalSection$Alloc$CloseEnterHandleRead$Leave$DeleteInitialize
                                                                  • String ID:
                                                                  • API String ID: 948184506-0
                                                                  • Opcode ID: e6ec2c9cfd8c1cfc945c6b42395d5e9725ae1b2f66c0eb6d6dbc601a21de48e7
                                                                  • Instruction ID: b7a19ab9b805ba0ee24999789cc0d61af393ae7e02a480cbf382940f26e76fc4
                                                                  • Opcode Fuzzy Hash: e6ec2c9cfd8c1cfc945c6b42395d5e9725ae1b2f66c0eb6d6dbc601a21de48e7
                                                                  • Instruction Fuzzy Hash: 4B614F39202B4096FB64DFA2E55C65AB3A6FB88B40F15C125CB8A43B14EF38D1958740
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC247E4
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2480E
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC24825
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC248FB
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC24925
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2494A
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC24974
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC24999
                                                                    • Part of subcall function 000002287BC14E80: CloseHandle.KERNEL32 ref: 000002287BC14E9D
                                                                    • Part of subcall function 000002287BC14E80: CloseHandle.KERNEL32 ref: 000002287BC14EB0
                                                                    • Part of subcall function 000002287BC14E80: CloseHandle.KERNEL32 ref: 000002287BC14EC6
                                                                    • Part of subcall function 000002287BC14E80: DeleteCriticalSection.KERNEL32 ref: 000002287BC14EED
                                                                    • Part of subcall function 000002287BC14E80: VirtualFree.KERNEL32 ref: 000002287BC14F1A
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Free$CriticalSection$Alloc$CloseEnterHandleRead$Leave$DeleteInitialize
                                                                  • String ID:
                                                                  • API String ID: 948184506-0
                                                                  • Opcode ID: fd80817d139fa4e2b64631e6e26df79415a8341bdc569966b9b01ccc11376cda
                                                                  • Instruction ID: 7f9f3dac2ad22bb0f571bf03f1e76b3d166015310430a62b0cba4c9dfd1088c5
                                                                  • Opcode Fuzzy Hash: fd80817d139fa4e2b64631e6e26df79415a8341bdc569966b9b01ccc11376cda
                                                                  • Instruction Fuzzy Hash: 9F515F3A302B4096FB64DFA2E45865AB3A6FB89B80F15C125DF8A43B14DF38D195C700
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC24E74
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC24E9E
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC24EB5
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC24F8B
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC24FB5
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC24FDA
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC25004
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC25029
                                                                    • Part of subcall function 000002287BC14E80: CloseHandle.KERNEL32 ref: 000002287BC14E9D
                                                                    • Part of subcall function 000002287BC14E80: CloseHandle.KERNEL32 ref: 000002287BC14EB0
                                                                    • Part of subcall function 000002287BC14E80: CloseHandle.KERNEL32 ref: 000002287BC14EC6
                                                                    • Part of subcall function 000002287BC14E80: DeleteCriticalSection.KERNEL32 ref: 000002287BC14EED
                                                                    • Part of subcall function 000002287BC14E80: VirtualFree.KERNEL32 ref: 000002287BC14F1A
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Free$CriticalSection$Alloc$CloseEnterHandleRead$Leave$DeleteInitialize
                                                                  • String ID:
                                                                  • API String ID: 948184506-0
                                                                  • Opcode ID: 57bd48782e32a08d7b1b1d9009b8d3aa3fc8873e5788f85967af6eb319595940
                                                                  • Instruction ID: f794c535e14eba163fedc5fb54db7e3caf2737a6964f6a954065d74cf6d29034
                                                                  • Opcode Fuzzy Hash: 57bd48782e32a08d7b1b1d9009b8d3aa3fc8873e5788f85967af6eb319595940
                                                                  • Instruction Fuzzy Hash: 05515039302B4096FB64CFA2E45875AB3A6FBC8B80F15C125DF8A43B14DF38D1968740
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC25674
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2569E
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC256B5
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2578B
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC257B5
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC257DA
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC25804
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC25829
                                                                    • Part of subcall function 000002287BC14E80: CloseHandle.KERNEL32 ref: 000002287BC14E9D
                                                                    • Part of subcall function 000002287BC14E80: CloseHandle.KERNEL32 ref: 000002287BC14EB0
                                                                    • Part of subcall function 000002287BC14E80: CloseHandle.KERNEL32 ref: 000002287BC14EC6
                                                                    • Part of subcall function 000002287BC14E80: DeleteCriticalSection.KERNEL32 ref: 000002287BC14EED
                                                                    • Part of subcall function 000002287BC14E80: VirtualFree.KERNEL32 ref: 000002287BC14F1A
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Free$CriticalSection$Alloc$CloseEnterHandleRead$Leave$DeleteInitialize
                                                                  • String ID:
                                                                  • API String ID: 948184506-0
                                                                  • Opcode ID: 2f075d1a1437c4c3a206eadfd76b465537f6e84eaaf7f606776d60a5c38b7f6b
                                                                  • Instruction ID: 356cbaa2c9dca73f2a55d010fe4237352ed5c557757da53bceae6be7e4a236fa
                                                                  • Opcode Fuzzy Hash: 2f075d1a1437c4c3a206eadfd76b465537f6e84eaaf7f606776d60a5c38b7f6b
                                                                  • Instruction Fuzzy Hash: 9851513A712B4096FB64CFA2E45865AB3A6FBC9B80F15C125DF8A43B14EF38D1958740
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC24C44
                                                                    • Part of subcall function 000002287BC14E80: CloseHandle.KERNEL32 ref: 000002287BC14E9D
                                                                    • Part of subcall function 000002287BC14E80: CloseHandle.KERNEL32 ref: 000002287BC14EB0
                                                                    • Part of subcall function 000002287BC14E80: CloseHandle.KERNEL32 ref: 000002287BC14EC6
                                                                    • Part of subcall function 000002287BC14E80: DeleteCriticalSection.KERNEL32 ref: 000002287BC14EED
                                                                    • Part of subcall function 000002287BC14E80: VirtualFree.KERNEL32 ref: 000002287BC14F1A
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC24C6E
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC24C85
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC24D50
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC24D7A
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC24D9F
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC24DC9
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC24DEE
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Free$CriticalSection$Alloc$CloseEnterHandleRead$Leave$DeleteInitialize
                                                                  • String ID:
                                                                  • API String ID: 948184506-0
                                                                  • Opcode ID: 0ac0060dcfd5a306c7b66bef3dfc52a33a24784a9d8ada1fc2c7a0065a5b076b
                                                                  • Instruction ID: 44fa1bfea67dda4aba46f8f1775b61035390f2f4b03e4999ccf311ba37b37d32
                                                                  • Opcode Fuzzy Hash: 0ac0060dcfd5a306c7b66bef3dfc52a33a24784a9d8ada1fc2c7a0065a5b076b
                                                                  • Instruction Fuzzy Hash: 7751603A702B4096FB64DFA2E49875AB3A6FBC8B80F15C125DF8A43B14DF38D5958740
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC25D74
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC25D9E
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC25DB5
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC25E75
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC25E9F
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC25EC4
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC25EEE
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC25F13
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Free$AllocCriticalSection$EnterRead$Leave$Initialize
                                                                  • String ID:
                                                                  • API String ID: 529218107-0
                                                                  • Opcode ID: 32769cce58e56143a75351117c5e5ffe1a32f8741d2f6b57a7632bb4ab8db333
                                                                  • Instruction ID: 6bfb081b7d46aca41e774427f11c3719fe9afaaac511ea72674a55a36484a51b
                                                                  • Opcode Fuzzy Hash: 32769cce58e56143a75351117c5e5ffe1a32f8741d2f6b57a7632bb4ab8db333
                                                                  • Instruction Fuzzy Hash: 83515D3A702B4096FB64DFA2E45875AB3A6FBC9B80F15C1259F8A43B14DF38D4928740
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: header crc mismatch$unknown compression method$unknown header flags set
                                                                  • API String ID: 0-1578397619
                                                                  • Opcode ID: 9b4078bed5bfcd5864b8ebac496d82fc1045e3aef2f02ea94c7145d1e548f647
                                                                  • Instruction ID: 857cf66a74720e488a81dcbdd25969f9bc1a5866f4b043db53cb57650c37f298
                                                                  • Opcode Fuzzy Hash: 9b4078bed5bfcd5864b8ebac496d82fc1045e3aef2f02ea94c7145d1e548f647
                                                                  • Instruction Fuzzy Hash: 3902C12A606350ABF7288FA5C14836CBBB2F384748F668528CF5D93B90DB34D566E741
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$CriticalFreeSection$AllocCreateEnterFileFindFirstLeaveReadThreadfreemallocmemset
                                                                  • String ID:
                                                                  • API String ID: 4255097067-0
                                                                  • Opcode ID: f9bbf5e71686089cafa3498ccc1526af5447c4864708586d0a513123ba2cc5d2
                                                                  • Instruction ID: 4a220c8e95f0c33a6242753f2f35c92fb25538ced58347f8db91631f52f824fd
                                                                  • Opcode Fuzzy Hash: f9bbf5e71686089cafa3498ccc1526af5447c4864708586d0a513123ba2cc5d2
                                                                  • Instruction Fuzzy Hash: 5C21A47630168492EB609F21E44C79DA3A6F789FC4F658131DE9E47748DF39C64AC740
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$Leave$EnterRead$AllocVirtual$Initialize
                                                                  • String ID:
                                                                  • API String ID: 3051317124-0
                                                                  • Opcode ID: 8568f08c7c9be0e6d073f13ea549ebd13c7c208c02a23d5334f29e22a4de9aef
                                                                  • Instruction ID: 761779a3454982858d5f4ae185320ff6cb2dceaa3ec965ed5245de70699bcacb
                                                                  • Opcode Fuzzy Hash: 8568f08c7c9be0e6d073f13ea549ebd13c7c208c02a23d5334f29e22a4de9aef
                                                                  • Instruction Fuzzy Hash: 25F14A79202B44A2FF558F62E958769A3A6F7D5F89F6CC026CE4A133A4DF38C546C310
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Heap$AllocVirtual$CriticalProcessSection$CloseFreeHandleProcess32Session$EnterRead$ActiveConsoleCreateFirstLeaveNextObjectSingleSnapshotToolhelp32Waitlstrcmpi$Initialize
                                                                  • String ID: explorer.exe
                                                                  • API String ID: 2751948232-3187896405
                                                                  • Opcode ID: d2a91ab24c2bf9db6eb1a729d818684c837b503c5b22bd8eeedfdeba2b21ab3c
                                                                  • Instruction ID: 073e23dd6a059e070496afe316be3b9b55320d30e6cbb4e7aa386b4bf122a3ff
                                                                  • Opcode Fuzzy Hash: d2a91ab24c2bf9db6eb1a729d818684c837b503c5b22bd8eeedfdeba2b21ab3c
                                                                  • Instruction Fuzzy Hash: 7A819D69202A44D2FB509FA2E91CB19B3A3FBCAF94F64C225C91A57794EF38C447C710
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$Leave$EnterRead$FreeVirtual$CloseEventHandle$DeleteDisconnectNamedObjectPipeResetSingleSleepWait
                                                                  • String ID:
                                                                  • API String ID: 2612321180-0
                                                                  • Opcode ID: 3aeab687b8a4c2846d007608538cd5cdf3d6eb69ec080773636f944a7d441a24
                                                                  • Instruction ID: e10fcbf9707fcdabf5e869c8d4843a2aea215949600dbd3ef171ea1279912061
                                                                  • Opcode Fuzzy Hash: 3aeab687b8a4c2846d007608538cd5cdf3d6eb69ec080773636f944a7d441a24
                                                                  • Instruction Fuzzy Hash: 2A812DA9203A04E2FF549FA2D55D729A3A2EBC5F89F68C426DE0A57754DF38CC478301
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandle$FreeVirtual$CriticalDeleteSection$Event
                                                                  • String ID:
                                                                  • API String ID: 10935847-0
                                                                  • Opcode ID: 422750834f799e2f9d60e292def9ea666cc0ce8b4960a53ab5d89ffac0fa2ea1
                                                                  • Instruction ID: f35ca4fd710288289c5bb3636111d12257ffc7b4e3382612f234af6a15323a14
                                                                  • Opcode Fuzzy Hash: 422750834f799e2f9d60e292def9ea666cc0ce8b4960a53ab5d89ffac0fa2ea1
                                                                  • Instruction Fuzzy Hash: 77815A29303A40A6FF68DFE2E558729B3A6FBC5F44F288016CB4B97A54DF38D4528750
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$AllocVirtual$EnterLeaveRead$CreateEventInitialize
                                                                  • String ID:
                                                                  • API String ID: 3948381741-0
                                                                  • Opcode ID: e594c7875a29b7cb1e4df31b8ef2daef451c29f3e1b1efe58ba1ebc236cfbe66
                                                                  • Instruction ID: 77086b6f0621f32bdbabf19c33c033df47c868657fb136151fe88ca325e6b9a1
                                                                  • Opcode Fuzzy Hash: e594c7875a29b7cb1e4df31b8ef2daef451c29f3e1b1efe58ba1ebc236cfbe66
                                                                  • Instruction Fuzzy Hash: C8617139302B40E2FB058F61EA58769B3A6F788B85FA4C026CA5E43794DF38C566D341
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CreateTokenUser$CloseErrorHandleLastProcess$BlockConvertDuplicateEnvironmentInformationLengthQueryString
                                                                  • String ID: S-1-16-12288
                                                                  • API String ID: 1141289200-1849704789
                                                                  • Opcode ID: ce80a4befca0d1060b8adb584f239cb62f45bb76b0cab765389f0d9962420255
                                                                  • Instruction ID: 5ea4321d1d1782b2d62d92317c390ce2319278dbe7ce05e60cbd9b9b7aba2fb1
                                                                  • Opcode Fuzzy Hash: ce80a4befca0d1060b8adb584f239cb62f45bb76b0cab765389f0d9962420255
                                                                  • Instruction Fuzzy Hash: 96612E36605B41D6F7508FA5E84869EB7B5F7C9788F208216EE8953F28DF38C196CB40
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Event$ClearCloseOpen
                                                                  • String ID: Application$Security$Setup$System
                                                                  • API String ID: 1391105993-476969907
                                                                  • Opcode ID: a72789b1ddaec7462d6fe802ac6aa3214d1ce91aa2e65104e699e4c2ce61343b
                                                                  • Instruction ID: 83c09a294a1dd322ebfd5cec865f7aa39dea02c9888ceed60cc3cdc8b16bbdab
                                                                  • Opcode Fuzzy Hash: a72789b1ddaec7462d6fe802ac6aa3214d1ce91aa2e65104e699e4c2ce61343b
                                                                  • Instruction Fuzzy Hash: 36119158B43B05E1FE199FB6791C6559693AFCEB55F689929880B4B350EE3CC04B8200
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Startupmemset
                                                                  • String ID: Failed to create default vhost$Failed to init cookiejar$NSC$OOM$OOM allocating %d fds$context$fds table$info->ka_interval can't be 0 if ka_time used$lws_create_context$lws_free$mux$prot_init$system$unknown$wsi$wsicli$wsisrv
                                                                  • API String ID: 1873301828-3289243303
                                                                  • Opcode ID: bf09bbd172752d6f71b80a47266d3d97ca0590e138c6ba5f89c48119b4ff15b5
                                                                  • Instruction ID: 256c4e7df1644aa368b3629286aec01e99c4cb8a8d999b8821866519bfd3d7f3
                                                                  • Opcode Fuzzy Hash: bf09bbd172752d6f71b80a47266d3d97ca0590e138c6ba5f89c48119b4ff15b5
                                                                  • Instruction Fuzzy Hash: FB32903A202B8095FB54CF65E44439AB3E6F784B88F688136DE9D4B398EF38D152D750
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: String$AllocFree$CreateInstanceUninitialize$Initialize
                                                                  • String ID: Block All Outbound$Block all outbound traffic$BlockAllGroup$i33L
                                                                  • API String ID: 2562062002-1644180588
                                                                  • Opcode ID: 6afe0bc108ac2b0036ccd9803eb516903b393beede4406b580188529bc8acd80
                                                                  • Instruction ID: 4c92cedf6ac0493291cb700caeb8c6d961c2be267c8e88b294326da705a6947f
                                                                  • Opcode Fuzzy Hash: 6afe0bc108ac2b0036ccd9803eb516903b393beede4406b580188529bc8acd80
                                                                  • Instruction Fuzzy Hash: 5F51F57A601B44DAEB00CFB5D88829C77B1F788B88F248526DE5A57B28CF38C55AC751
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Clipboard$lstrlen$CloseFreeGlobalMessageVirtual$DataLockOpenPostQuitSendUnlock
                                                                  • String ID: [Clipboard content:]
                                                                  • API String ID: 310769633-2989445775
                                                                  • Opcode ID: 7bca020af3b00c7c1722b78769ec56b2c5507b293bd382309b66642c886802aa
                                                                  • Instruction ID: 55393bbc25382fb6ca442986bcafd6b573e5ee99bdcaa7c3427d85284c188efd
                                                                  • Opcode Fuzzy Hash: 7bca020af3b00c7c1722b78769ec56b2c5507b293bd382309b66642c886802aa
                                                                  • Instruction Fuzzy Hash: B4419468303A00E6FB549FE6E45C769A3A2EFC9F94F28C021E95A57764DE3CC4878700
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$EnterLeave$Readlstrcat$DeleteFileFreeVirtualmemset
                                                                  • String ID: C:\Program Files\Windows Mail$\cp.cfg
                                                                  • API String ID: 560399275-3904790782
                                                                  • Opcode ID: 32691194d63fb457e0283d7f5badc06286c47923e99f3822c2282396363ee7a0
                                                                  • Instruction ID: 6f921264059a4f6f8bdc5f603b6b3e73255be57e991a43c5107470ec4f38c153
                                                                  • Opcode Fuzzy Hash: 32691194d63fb457e0283d7f5badc06286c47923e99f3822c2282396363ee7a0
                                                                  • Instruction Fuzzy Hash: 5641706D307A09A2FE64CF91D69C369A362FBD5B48F688426C61E536A0EF38C557C301
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Process$Current$Terminate$memsetwsprintf$ObjectSessionSingleWait
                                                                  • String ID: \\.\Pipe\%d_Local_%d$\\.\Pipe\%d_pipe%d
                                                                  • API String ID: 1631145905-82101934
                                                                  • Opcode ID: bb6b434c0f2bba9a4d35353d0a33bbc8e9c93f951d0964acc5e522c3c3c5e198
                                                                  • Instruction ID: a086cd3c30d44ffe7b54222ddc4d200a8584650cfe3737b124db01526d2e750e
                                                                  • Opcode Fuzzy Hash: bb6b434c0f2bba9a4d35353d0a33bbc8e9c93f951d0964acc5e522c3c3c5e198
                                                                  • Instruction Fuzzy Hash: 3C314669305641E2FB209FA1E95C75AA373FBC5F89F14C016C94A47658DE3CC547CB21
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSectionVirtual$Alloc$EnterReadsetsockopt$Leave$accept$CancelCreateFreeInitializeIoctlSleepThreadclosesocket
                                                                  • String ID:
                                                                  • API String ID: 241427152-0
                                                                  • Opcode ID: 1c404d5d73e305d8b8ee6673e65e5fb414e44ef9e98f2e73c2721ef1af194596
                                                                  • Instruction ID: 9ffa302cb5f1af5fab4715c46a17bd075f08bdee4d11e4b2f0fa8af8ae267284
                                                                  • Opcode Fuzzy Hash: 1c404d5d73e305d8b8ee6673e65e5fb414e44ef9e98f2e73c2721ef1af194596
                                                                  • Instruction Fuzzy Hash: 03616376206B81D6F7248F51E808B9AB7A6F7C9B88F548125DF8A07B54DF3CC55ACB00
                                                                  APIs
                                                                  • VirtualAlloc.KERNEL32(?,?,00000000,000002287BC351C0,?,?,00000000,000002287BC14C0C), ref: 000002287BC34E47
                                                                  • InitializeCriticalSection.KERNEL32(?,?,00000000,000002287BC351C0,?,?,00000000,000002287BC14C0C), ref: 000002287BC34E7F
                                                                  • CreateEventW.KERNEL32(?,?,00000000,000002287BC351C0,?,?,00000000,000002287BC14C0C), ref: 000002287BC34E91
                                                                  • VirtualAlloc.KERNEL32(?,?,00000000,000002287BC351C0,?,?,00000000,000002287BC14C0C), ref: 000002287BC34EAC
                                                                  • InitializeCriticalSection.KERNEL32(?,?,00000000,000002287BC351C0,?,?,00000000,000002287BC14C0C), ref: 000002287BC34EBE
                                                                  • IsBadReadPtr.KERNEL32 ref: 000002287BC34ED9
                                                                  • EnterCriticalSection.KERNEL32(?,?,00000000,000002287BC351C0,?,?,00000000,000002287BC14C0C), ref: 000002287BC34EEC
                                                                  • VirtualAlloc.KERNEL32(?,?,00000000,000002287BC351C0,?,?,00000000,000002287BC14C0C), ref: 000002287BC34F03
                                                                  • LeaveCriticalSection.KERNEL32(?,?,00000000,000002287BC351C0,?,?,00000000,000002287BC14C0C), ref: 000002287BC34F32
                                                                  • IsBadReadPtr.KERNEL32 ref: 000002287BC34F44
                                                                  • EnterCriticalSection.KERNEL32(?,?,00000000,000002287BC351C0,?,?,00000000,000002287BC14C0C), ref: 000002287BC34F57
                                                                  • VirtualAlloc.KERNEL32(?,?,00000000,000002287BC351C0,?,?,00000000,000002287BC14C0C), ref: 000002287BC34F6E
                                                                  • LeaveCriticalSection.KERNEL32(?,?,00000000,000002287BC351C0,?,?,00000000,000002287BC14C0C), ref: 000002287BC34F9D
                                                                  • IsBadReadPtr.KERNEL32 ref: 000002287BC34FAF
                                                                  • EnterCriticalSection.KERNEL32(?,?,00000000,000002287BC351C0,?,?,00000000,000002287BC14C0C), ref: 000002287BC34FC2
                                                                  • VirtualAlloc.KERNEL32(?,?,00000000,000002287BC351C0,?,?,00000000,000002287BC14C0C), ref: 000002287BC34FD9
                                                                  • LeaveCriticalSection.KERNEL32(?,?,00000000,000002287BC351C0,?,?,00000000,000002287BC14C0C), ref: 000002287BC35008
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$AllocVirtual$EnterLeaveRead$Initialize$CreateEvent
                                                                  • String ID:
                                                                  • API String ID: 3934889794-0
                                                                  • Opcode ID: f72b57c28baa5693b97416f12eef773b3eaba470e72f45982b1511237ecf147c
                                                                  • Instruction ID: acb91769672ca6eca8135b52aafbbc53719c2ce39733c5174acc322fda7e56ff
                                                                  • Opcode Fuzzy Hash: f72b57c28baa5693b97416f12eef773b3eaba470e72f45982b1511237ecf147c
                                                                  • Instruction Fuzzy Hash: 3C51A139312B40E2FB058F61EA48769B3A2F7D9B85FA48126CB4D43794DF38C5A6C340
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandle$DisconnectNamedPipe$Terminate$FreeThreadVirtual$CriticalDeleteProcessSection
                                                                  • String ID:
                                                                  • API String ID: 2021643575-0
                                                                  • Opcode ID: 22f65dbadcf723d4ef9dbca8ef5aeeda7a7c5473f9a03471dc6572031d860353
                                                                  • Instruction ID: 8a13bad1af03b2dfee647e77799ae62fe5f0c8fe1e38f195e8c3e0234ac4f802
                                                                  • Opcode Fuzzy Hash: 22f65dbadcf723d4ef9dbca8ef5aeeda7a7c5473f9a03471dc6572031d860353
                                                                  • Instruction Fuzzy Hash: 5B41F729203A40E5FF58CFA2D568728A366FFC8F88F28C516CE4A43A48DF38C4529751
                                                                  APIs
                                                                  • CLSIDFromString.OLE32(?,?,?,?,?,?,?,?,?,?,?,?,?,000002287BC121C5), ref: 000002287BC21148
                                                                  • IIDFromString.OLE32(?,?,?,?,?,?,?,?,?,?,?,?,?,000002287BC121C5), ref: 000002287BC21159
                                                                  • IIDFromString.OLE32(?,?,?,?,?,?,?,?,?,?,?,?,?,000002287BC121C5), ref: 000002287BC2116A
                                                                  • CoInitializeEx.OLE32(?,?,?,?,?,?,?,?,?,?,?,?,?,000002287BC121C5), ref: 000002287BC21176
                                                                  • CoCreateInstance.OLE32(?,?,?,?,?,?,?,?,?,?,?,?,?,000002287BC121C5), ref: 000002287BC21193
                                                                  • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000002287BC121C5), ref: 000002287BC211C7
                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000002287BC121C5), ref: 000002287BC211D2
                                                                  • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000002287BC121C5), ref: 000002287BC211E7
                                                                  • CoUninitialize.OLE32(?,?,?,?,?,?,?,?,?,?,?,?,?,000002287BC121C5), ref: 000002287BC2126E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: FromString$AddressCreateErrorInitializeInstanceLastLibraryLoadProcUninitialize
                                                                  • String ID: SHCreateItemFromParsingName$shell32.dll${3AD05575-8857-4850-9277-11B85BDB8E09}${43826D1E-E718-42EE-BC55-A1E261C37BFE}${947AAB5F-0A5C-4C13-B4D6-4BF7836FC9F8}
                                                                  • API String ID: 2084278556-3860647673
                                                                  • Opcode ID: 6b365c774cdfe9216a3c30888693587c7e5625406bd06819d41ff6f4b0c32ad6
                                                                  • Instruction ID: 681449413b257630cdfb526ec9beeb9e9e68091bdaa7dd9322e454a8d45b893d
                                                                  • Opcode Fuzzy Hash: 6b365c774cdfe9216a3c30888693587c7e5625406bd06819d41ff6f4b0c32ad6
                                                                  • Instruction Fuzzy Hash: 6F515F2A712B15E6FB00CFB1D84869D77B2FB89B89F648516EE0A53B24DF34C586C350
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: File$AttributesErrorLast$CloseCreateDeleteHandleWritememcpymemsetwsprintf
                                                                  • String ID: %s\%s$192.197.113.45$install.cfg
                                                                  • API String ID: 1383014907-2856810270
                                                                  • Opcode ID: e445fe55c89c3ec01bc9361a1c4306dd17c976a09e4684f286418ac370e38a0c
                                                                  • Instruction ID: 35af13b7885eff303835e64c09247480aa808e9353234f5df4ae10a8a4473182
                                                                  • Opcode Fuzzy Hash: e445fe55c89c3ec01bc9361a1c4306dd17c976a09e4684f286418ac370e38a0c
                                                                  • Instruction Fuzzy Hash: C341813A615B8592F7108F64E84D7AAA761F7DAB84F64C312DB8913754EF3CC546C700
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: memcpy
                                                                  • String ID: %s|%s|%d$OOM$default$ener)$http_proxy$init server failed$lws_create_vhost$lws_free$lws_protocol_init failed$port %u$same vh list$vh plugin table$|%s$|%u
                                                                  • API String ID: 3510742995-1324429581
                                                                  • Opcode ID: 40858c6f65372f23e2bf88e5df12406cb90927b9e36efcc625bb40a598f3a3d8
                                                                  • Instruction ID: 77776424345c952e44f95a99b297e306a995ea546bace69ada04d6b0b7bd38cd
                                                                  • Opcode Fuzzy Hash: 40858c6f65372f23e2bf88e5df12406cb90927b9e36efcc625bb40a598f3a3d8
                                                                  • Instruction Fuzzy Hash: CE02AC3A302B84A6FB44CF65D448799B7A1F789B98F648136DE4D8B795DF38C652C300
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Object$DeleteFreeVirtual$CloseHandleSelect$BlockEventInputReleaseSingleWait
                                                                  • String ID:
                                                                  • API String ID: 3967251967-0
                                                                  • Opcode ID: 3d07de667bdd98724143ada818b03743f8d5fa4bd8fba57485f092a4cb83d6d2
                                                                  • Instruction ID: 14cc510be318927c15f812700cdb636afbc85a00a98c4c60b50ff46b965c1e94
                                                                  • Opcode Fuzzy Hash: 3d07de667bdd98724143ada818b03743f8d5fa4bd8fba57485f092a4cb83d6d2
                                                                  • Instruction Fuzzy Hash: DB411939202B50D2FB44CFA2E558769B366FBC5F88F24C026CE4A43758CF38C4968711
                                                                  APIs
                                                                  • IsBadReadPtr.KERNEL32 ref: 000002287BC173BA
                                                                    • Part of subcall function 000002287BC281B0: VirtualAlloc.KERNEL32(?,?,00000000,000002287BC26DE8), ref: 000002287BC281C7
                                                                    • Part of subcall function 000002287BC281B0: InitializeCriticalSection.KERNEL32(?,?,00000000,000002287BC26DE8), ref: 000002287BC281F5
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • memset.NTDLL ref: 000002287BC173F5
                                                                  • GetCurrentProcessId.KERNEL32 ref: 000002287BC173FA
                                                                  • wsprintfW.USER32 ref: 000002287BC17416
                                                                  • WaitForSingleObject.KERNEL32 ref: 000002287BC17433
                                                                  • WaitForSingleObject.KERNEL32 ref: 000002287BC1747B
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1749A
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC174C4
                                                                  • DisconnectNamedPipe.KERNEL32 ref: 000002287BC174DB
                                                                  • CloseHandle.KERNEL32 ref: 000002287BC174EA
                                                                  • DeleteCriticalSection.KERNEL32 ref: 000002287BC174F8
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC17509
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$CriticalSection$Alloc$Read$EnterFree$InitializeLeaveObjectSingleWait$CloseCurrentDeleteDisconnectHandleNamedPipeProcessmemsetwsprintf
                                                                  • String ID: \\.\Pipe\%d_Local_%d
                                                                  • API String ID: 2297721380-251893267
                                                                  • Opcode ID: cfcf1faea994bcf8fa9046817b97a16237f4d8ae528ee4521bb3e96e9f6a7b18
                                                                  • Instruction ID: 6736abc0154fa5624066bb9bd3db4100b03f3ed21218968b1e3671869e2c647e
                                                                  • Opcode Fuzzy Hash: cfcf1faea994bcf8fa9046817b97a16237f4d8ae528ee4521bb3e96e9f6a7b18
                                                                  • Instruction Fuzzy Hash: 4C418669302A4093FB649FA2E55C75DB3A2FBC5F84F248022CA4A57A94DF3CC8478711
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ac11e50a1e072cac052fa54a0874a076868238301431d97cc763025b4dce1acd
                                                                  • Instruction ID: e87360c3485b13183fca2824576bcbcb2bc5e86906a88c423ddb15c52c28be3b
                                                                  • Opcode Fuzzy Hash: ac11e50a1e072cac052fa54a0874a076868238301431d97cc763025b4dce1acd
                                                                  • Instruction Fuzzy Hash: 08B10869347589E6FB14DFD8F6883E4A3D2F7C4754FA5C12AE19A97690CE2CC8838305
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: lstrlen$ByteCharMultiVirtualWide$CreateDirectoryFreememset$Allocmemcpy
                                                                  • String ID:
                                                                  • API String ID: 2091574596-0
                                                                  • Opcode ID: 1f76454f4776390ab5dbb31d2d125cc19e68bef09b6ddff7a62c5eac63547ca7
                                                                  • Instruction ID: 06fea8cd4890b069fd04cb04d1bc088a8a287f4e2b569a4f43e9bf713f8785ea
                                                                  • Opcode Fuzzy Hash: 1f76454f4776390ab5dbb31d2d125cc19e68bef09b6ddff7a62c5eac63547ca7
                                                                  • Instruction Fuzzy Hash: 6931B629305A8092F754DFA6EA5C7ADA393A7CABC5F148025DB4A83795DF3CC5468700
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Object$Delete$CloseFreeHandleSelectVirtual$BlockEventInputReleaseSingleWait
                                                                  • String ID:
                                                                  • API String ID: 2595850724-0
                                                                  • Opcode ID: 627ade597925c147f7e79ed2012f1fc2a10741f551bbb865f3983e0dd27cbec2
                                                                  • Instruction ID: 9028aff3afd3c0b48febf1862620335344ab9c70d7f1fcccabbf455d8abef632
                                                                  • Opcode Fuzzy Hash: 627ade597925c147f7e79ed2012f1fc2a10741f551bbb865f3983e0dd27cbec2
                                                                  • Instruction Fuzzy Hash: 5931C729202B40D6FB449FA2E95C769A3A6FBC9F89F149026CE4A47768DF34C4868711
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: memset$lstrlen$DeviceDiskDriveFreeInformationQuerySpaceTypeVolume
                                                                  • String ID: :$\
                                                                  • API String ID: 2115141164-1166558509
                                                                  • Opcode ID: 4ba2442a7ee91752d6fddc61f20b6e237e9db8bc712089ce54949415f7008959
                                                                  • Instruction ID: a93e1bba8f263578bc3e20c4b3ede7bf054ca9457f12817f99f1dc7c39575f33
                                                                  • Opcode Fuzzy Hash: 4ba2442a7ee91752d6fddc61f20b6e237e9db8bc712089ce54949415f7008959
                                                                  • Instruction Fuzzy Hash: E5514E76214B80D7FB30CF65E84879EB761F789799F505112EB8947A68DF38C64ACB00
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: memcpy
                                                                  • String ID: ($client stash$free$lws_client_connect_via_info
                                                                  • API String ID: 3510742995-2507652003
                                                                  • Opcode ID: 5f7d5be1eba48fcf2bd420dd049d970cdcae488fcc84e66b9c1d342dd8b8c7a6
                                                                  • Instruction ID: 25beeeb6e8501f0d1c0fa32587e93e6caa16d088032401e46a37f102eb4f9330
                                                                  • Opcode Fuzzy Hash: 5f7d5be1eba48fcf2bd420dd049d970cdcae488fcc84e66b9c1d342dd8b8c7a6
                                                                  • Instruction Fuzzy Hash: A2D10466A01B9952FB458F69D848369A791F385FB4FA89320CE7E037D1DF38C4938312
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$CriticalSection$Alloc$EnterRead$FreeLeavefreemallocmemcpymemset$Initialize
                                                                  • String ID: 1127$192.197.113.45
                                                                  • API String ID: 532055762-2790919393
                                                                  • Opcode ID: 79849f046a066d600e613c408bc8feb084652d5ce1a044d37b8bfa0f3cfb78e2
                                                                  • Instruction ID: 921b8f34424145cbdb8211c522db89e53abeb8d67cdff7efe48ead6f0f2bc0b6
                                                                  • Opcode Fuzzy Hash: 79849f046a066d600e613c408bc8feb084652d5ce1a044d37b8bfa0f3cfb78e2
                                                                  • Instruction Fuzzy Hash: 45519625A16B4493F620DFA6E548269F3A2FBC9B84F64D214DE8A43B55EF3CD1868700
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$getaddrinfosocket
                                                                  • String ID:
                                                                  • API String ID: 2350576183-0
                                                                  • Opcode ID: 1024332d28204c91f51eda4f2f951b5aa5350e0b6716ddada6b503eee5c6e165
                                                                  • Instruction ID: 9483f3fb83d0847a4951e5f80b78a494489601554fa202839c200675f0f1526a
                                                                  • Opcode Fuzzy Hash: 1024332d28204c91f51eda4f2f951b5aa5350e0b6716ddada6b503eee5c6e165
                                                                  • Instruction Fuzzy Hash: BB516B76611A81EAF710CFA0E40879D77B2F78975CF108626EF5963A98CF38C55ACB01
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$EventLeave$CloseEnterHandleObjectReadSingleSleepWait
                                                                  • String ID:
                                                                  • API String ID: 1497552152-0
                                                                  • Opcode ID: 95c85183abd04d487b5653f0d804961ddc88f767ee8db924f83ae14736bb2390
                                                                  • Instruction ID: db1404c22570e81e7cccc69e27fa4282f2216c372a82a9179d9f8e3fa5c9b1ba
                                                                  • Opcode Fuzzy Hash: 95c85183abd04d487b5653f0d804961ddc88f767ee8db924f83ae14736bb2390
                                                                  • Instruction Fuzzy Hash: 75413C79302A44E3FF588FA1D558768A3A1FBC5F49F288421CE0A6B654EF38C4578704
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Create$CompatibleMetricsObjectSectionSelectSystem$AllocDesktopEventVirtualWindow
                                                                  • String ID:
                                                                  • API String ID: 623393097-0
                                                                  • Opcode ID: cfdeb3b7535088351f103230168192949339b1f5207f0bb29049f4a5c5f9c2a0
                                                                  • Instruction ID: fa39b0e9bff636455b993dabc8a26cf01b8c972d3a895b23d46f054ae331d394
                                                                  • Opcode Fuzzy Hash: cfdeb3b7535088351f103230168192949339b1f5207f0bb29049f4a5c5f9c2a0
                                                                  • Instruction Fuzzy Hash: 6941183A611B50E7E718CF65E648A4EB3B5F389B48F10851ADB8943B14DF39E0B6C740
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$sendto
                                                                  • String ID: @$invalid sock$lws_issue_raw
                                                                  • API String ID: 437866842-1634260725
                                                                  • Opcode ID: 965925c8446b3034237eb9b2380abb21a7165ccdb1fba7f1059e45b429bd9e30
                                                                  • Instruction ID: 578f8cdd82da77fb31bfffc20542d68b0cad8c83f09c782ddb050ec35d6afe10
                                                                  • Opcode Fuzzy Hash: 965925c8446b3034237eb9b2380abb21a7165ccdb1fba7f1059e45b429bd9e30
                                                                  • Instruction Fuzzy Hash: 8291083938278196FB548FA5D40C799AB96F7C1BB8F288235AE598B3D5DF34C6438300
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2603F
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC26069
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC260C6
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC260F0
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC26132
                                                                  • CreateFileW.KERNEL32 ref: 000002287BC2615E
                                                                  • DeviceIoControl.KERNEL32 ref: 000002287BC261A5
                                                                  • CloseHandle.KERNEL32 ref: 000002287BC261B3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$CriticalSection$AllocFree$EnterRead$Leave$CloseControlCreateDeviceFileHandleInitialize
                                                                  • String ID: D"$\\.\TrueSight
                                                                  • API String ID: 655973622-2684836731
                                                                  • Opcode ID: aad29225063e317c2a3573ba569ed1ad7c973e8f19d29a31948c40979fe2f404
                                                                  • Instruction ID: 5d3d020ea740239154b018048ff66bf9681f857f31c6e99e9458937cadc0c82f
                                                                  • Opcode Fuzzy Hash: aad29225063e317c2a3573ba569ed1ad7c973e8f19d29a31948c40979fe2f404
                                                                  • Instruction Fuzzy Hash: 5951B136315B8096FB64CFA2E54835AB3A2FBC9B84F54C125DB8A43F54DF38D0968B00
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC23FB3
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC23FDD
                                                                  • SetEvent.KERNEL32 ref: 000002287BC2400D
                                                                  • WaitForSingleObject.KERNEL32 ref: 000002287BC2401F
                                                                  • TerminateThread.KERNEL32 ref: 000002287BC2402A
                                                                  • CloseHandle.KERNEL32 ref: 000002287BC24038
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC24070
                                                                  • WaitForSingleObject.KERNEL32 ref: 000002287BC240A1
                                                                  • TerminateThread.KERNEL32 ref: 000002287BC240AC
                                                                  • CloseHandle.KERNEL32 ref: 000002287BC240BA
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC240E7
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$CriticalSection$Alloc$Free$EnterRead$CloseHandleLeaveObjectSingleTerminateThreadWait$EventInitialize
                                                                  • String ID:
                                                                  • API String ID: 3987515053-0
                                                                  • Opcode ID: d19a18a1fb18c226b587fa31215fab17c2ab26e2c9ffc026edeed4398f67e4f0
                                                                  • Instruction ID: 4099127be69412a15ca37fdf7b96bca555a619cccb22f3519328a02f658178bd
                                                                  • Opcode Fuzzy Hash: d19a18a1fb18c226b587fa31215fab17c2ab26e2c9ffc026edeed4398f67e4f0
                                                                  • Instruction Fuzzy Hash: AD411E29303A4096FB58DFE3A65C769A3A2FBC9F85F28C415CE4A47B55DF38C4928740
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Service$CloseDatabaseFreeHandleOpenVirtual$ChangeConfigLockManagerQuerySleepStatusUnlock
                                                                  • String ID:
                                                                  • API String ID: 3731607402-0
                                                                  • Opcode ID: af251502d29c9c7c90bd3414ecd8e43ff810c8be5039d8a95cde08aac0fb0348
                                                                  • Instruction ID: f3ad56879d140353b8db8e3db6a497a4c2b000680b07cfdc003055c7b63f0fca
                                                                  • Opcode Fuzzy Hash: af251502d29c9c7c90bd3414ecd8e43ff810c8be5039d8a95cde08aac0fb0348
                                                                  • Instruction Fuzzy Hash: 2C416F3A606B4092FB68DF52A858B19B3A6FBC9F94F648025DE9A03B14DF39C446D740
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Process32$CloseHandleNextfreelstrcmpi$CreateFirstSnapshotToolhelp32malloc
                                                                  • String ID:
                                                                  • API String ID: 2997854644-0
                                                                  • Opcode ID: c0e3d4e231a4b577965a3ea000d550504dace39ce01524bf4430d1bb5e102c2b
                                                                  • Instruction ID: a89387ecc92296368913f27b49b63afd5ee5e8bf8189fc07be3ccb2de96882d4
                                                                  • Opcode Fuzzy Hash: c0e3d4e231a4b577965a3ea000d550504dace39ce01524bf4430d1bb5e102c2b
                                                                  • Instruction Fuzzy Hash: 96216569302A41E2FB549FE69A4C76AE3A2F7C9FC4F68C115CD8657754DF38C4468700
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Desktop$Thread$CloseInformationObjectUsermemset$CurrentInputOpenlstrcmpi
                                                                  • String ID:
                                                                  • API String ID: 2480204736-0
                                                                  • Opcode ID: 35742a42ec1bb8b9f7ddbb22bb0d6eeede412635445707ac6bcd940e153e3a1a
                                                                  • Instruction ID: c7440359f7bfec32c4f824a797ebbf5a77e2ce85a63a7425ce089ada1dfd99e1
                                                                  • Opcode Fuzzy Hash: 35742a42ec1bb8b9f7ddbb22bb0d6eeede412635445707ac6bcd940e153e3a1a
                                                                  • Instruction Fuzzy Hash: 14212139315B80E2F724DF51E55CB9AA3A2F7C9B88F948126DA4A47B54DF3CC216C740
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalFreeSectionVirtual$LeaveRead$Enter
                                                                  • String ID:
                                                                  • API String ID: 3895189749-0
                                                                  • Opcode ID: ad2c027d4bce0eda3b197a7ca1e870bc427290db4fc309fc76e4d30eb952749b
                                                                  • Instruction ID: cdcc5ecf1d12892fde234836b808a59450a385be5c593bd2dff16d27a8b0b7e9
                                                                  • Opcode Fuzzy Hash: ad2c027d4bce0eda3b197a7ca1e870bc427290db4fc309fc76e4d30eb952749b
                                                                  • Instruction Fuzzy Hash: 53511D29302A4092FB589FA2D65C769A3A7BFC9F84F28C425DE5A87654DF3DC4868700
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: getaddrinfo
                                                                  • String ID: DNS NXDOMAIN$GET$MQTT$POST$PUT$UDP$YZ[\X]^_RAW$client_connect2
                                                                  • API String ID: 300660673-2214405465
                                                                  • Opcode ID: 2c5305e086da3388b79cc2b3c4c7f9437366b913ef4853aba4d80fe6e6efeebf
                                                                  • Instruction ID: da7ed3b9977730cc25dab6346c832eb4e1dc172a8588002edcfc27eed038c579
                                                                  • Opcode Fuzzy Hash: 2c5305e086da3388b79cc2b3c4c7f9437366b913ef4853aba4d80fe6e6efeebf
                                                                  • Instruction Fuzzy Hash: 7BC10A2A216684B5FB618FA194183BEBFA2F3D2B64F68C132DB46465A5DF34C643C710
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: malloc$free$Timetime
                                                                  • String ID: <$d$d
                                                                  • API String ID: 3424428123-2034941416
                                                                  • Opcode ID: 51bd13c452381c1f51f2b181b107fbd28d03286067c749e65a5f237629124915
                                                                  • Instruction ID: 9bf074710ec703ba0732b0efa5b3328ca0865514811da27291cb2fdf7b6f6403
                                                                  • Opcode Fuzzy Hash: 51bd13c452381c1f51f2b181b107fbd28d03286067c749e65a5f237629124915
                                                                  • Instruction Fuzzy Hash: 84712A76102B80D6EB908F61D58834D7BA9F788B48F58C529CB8C2B754DF79C465DB10
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandle$CreateDirectoryProcessSystemlstrcatmemset
                                                                  • String ID: WinSta0\Winlogon$\cmd.exe$h
                                                                  • API String ID: 3110162951-1128999311
                                                                  • Opcode ID: c966bc5097c694aeafe5a988ec5eaa9773b15d62cb3eaf6412a53ec612da41c5
                                                                  • Instruction ID: 8e3986343eef1b95d754e6364111034a1f2079231b0b1b006a0205ffdd25e406
                                                                  • Opcode Fuzzy Hash: c966bc5097c694aeafe5a988ec5eaa9773b15d62cb3eaf6412a53ec612da41c5
                                                                  • Instruction Fuzzy Hash: D231B127A197C197E7208FA0E4583AAB761F7D5704F98C22697C903A59EF78C196CB00
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: EventEventsFreeInfoParametersSystemVirtual$EnumErrorExecutionLastMultipleNetworkSelectStateThreadWait
                                                                  • String ID:
                                                                  • API String ID: 705661956-0
                                                                  • Opcode ID: 52138d2b800ccf1fb00b413d68f0eaf781df4a799609b85c0360fe5f06656774
                                                                  • Instruction ID: 54b8e9c8d275ceb567606dabbc580a250de798eb493f840e1a37dd53662a289e
                                                                  • Opcode Fuzzy Hash: 52138d2b800ccf1fb00b413d68f0eaf781df4a799609b85c0360fe5f06656774
                                                                  • Instruction Fuzzy Hash: 7F51B07A212B44A2FB64DFA2D55C719B3A2FBC5B88F248025DE4A97B94DF34C853C740
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Event$EventsWait$Multiplememset$CloseCreateEnumNetworkObjectSelectSingle
                                                                  • String ID:
                                                                  • API String ID: 4111286588-0
                                                                  • Opcode ID: 0f81237e6d1da40c68c7b47ea01de113f1d79d87ad4081a33481c3efc863e423
                                                                  • Instruction ID: dba1a6b3abeef2a35819a40df810bd2862512c87c7cc1cb1e465e02be4c0cf8d
                                                                  • Opcode Fuzzy Hash: 0f81237e6d1da40c68c7b47ea01de113f1d79d87ad4081a33481c3efc863e423
                                                                  • Instruction Fuzzy Hash: F261AF36212B809AF720CFA5E84878DB7B6F785798F608215DA5D47B98DF38C192CB01
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalReadSectionVirtual$AllocEnterErrorExitFreeLastLeaveThreadTimesendtime
                                                                  • String ID:
                                                                  • API String ID: 3122330297-0
                                                                  • Opcode ID: f81773ac5293fa06452616b02bcd918e730b8e5a510ab32d6fa37ef6065fc1e2
                                                                  • Instruction ID: 33621308ad5f69256430a08719080b4bee3bf47d8c339121319da220dfc483df
                                                                  • Opcode Fuzzy Hash: f81773ac5293fa06452616b02bcd918e730b8e5a510ab32d6fa37ef6065fc1e2
                                                                  • Instruction Fuzzy Hash: 49415E3A30164097F7548F62E94871DB7A2F78AB88F64C02ACB4A87754DF38D856CB40
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual$CriticalInitializeSection$CreateEvent
                                                                  • String ID:
                                                                  • API String ID: 469433356-0
                                                                  • Opcode ID: 303f8027ff80914df4d43291911db3601dac3562635ff234a1bc3168d7857ae2
                                                                  • Instruction ID: 08a3615119fa6514b4af05dcbe8ef7f04ac1659a0212b213c95b22301cf7c627
                                                                  • Opcode Fuzzy Hash: 303f8027ff80914df4d43291911db3601dac3562635ff234a1bc3168d7857ae2
                                                                  • Instruction Fuzzy Hash: 4041637A213B44E6F705CF50F948749B7EAF788B84F60802ADA8953BA4DF38C566C740
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CreateThread$CloseCriticalHandleSection$AllocEnterInfoLeaveNativeReadSystemVirtual
                                                                  • String ID:
                                                                  • API String ID: 3571750651-0
                                                                  • Opcode ID: 9eb8f0ae13e0ca5a9a76a572d6a5dc9a1759dda7ca47c1172a2a69fee19d4a2c
                                                                  • Instruction ID: 096335f81848e33d2fadace13948588eead088d2a86b87e9260daeb1a7989135
                                                                  • Opcode Fuzzy Hash: 9eb8f0ae13e0ca5a9a76a572d6a5dc9a1759dda7ca47c1172a2a69fee19d4a2c
                                                                  • Instruction Fuzzy Hash: 3B419F7A206B80D2FB20CF61E948799B3A6F785B44F54C12ADE8943754EF38C496C700
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Service$Control$CloseHandleOpen$ManagerQuerySleepStartStatus
                                                                  • String ID:
                                                                  • API String ID: 2453229493-0
                                                                  • Opcode ID: 72676e1cd6c076af8db37262e620a1482012437159b971be25594ca16c3ba576
                                                                  • Instruction ID: 802eeaca7cea54b6e9b0431774e7b84042c50eedc6ac5559dfc8122def993466
                                                                  • Opcode Fuzzy Hash: 72676e1cd6c076af8db37262e620a1482012437159b971be25594ca16c3ba576
                                                                  • Instruction Fuzzy Hash: BC31683A605640D2FB249F96A51C35AE3A3F7C9F94FA4C421DA4E03754CE3CC5469A05
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Process32lstrlen$Next$CloseCreateFirstHandleSnapshotToolhelp32freemalloc
                                                                  • String ID:
                                                                  • API String ID: 4027670598-0
                                                                  • Opcode ID: 9dec531cfe11ca178118eb915f3ad58183cdf8bfa5e8815815d788b5620d7800
                                                                  • Instruction ID: c73f1e287ed59a2696e646d2c30a2c3b5cc1a31ba925b0563eea2a5484a5eea1
                                                                  • Opcode Fuzzy Hash: 9dec531cfe11ca178118eb915f3ad58183cdf8bfa5e8815815d788b5620d7800
                                                                  • Instruction Fuzzy Hash: 74319E69201A00D2FB909F66E55C769A3B1F789FD4F648121DE4B47B64EF3CC14ACB00
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: OpenService$CloseErrorHandleLastManager
                                                                  • String ID:
                                                                  • API String ID: 2659350385-0
                                                                  • Opcode ID: fefd5c4f08cde2a6459c024f055f59b1ae3a232860ca766f9537f5e5db190d1f
                                                                  • Instruction ID: 253f52535d4dc033f3d60304ee1936161cbea1cbc4f4b41c09ff5d2061903140
                                                                  • Opcode Fuzzy Hash: fefd5c4f08cde2a6459c024f055f59b1ae3a232860ca766f9537f5e5db190d1f
                                                                  • Instruction Fuzzy Hash: 9C214829B1AA50D2FB449F96BA5C62993A2F7CDFD4F145422DE0A43B55EE3CC4878B00
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: lstrcmpi$CreateThreadmemset
                                                                  • String ID: HTTP$TCP$UDP
                                                                  • API String ID: 1278753810-3864057669
                                                                  • Opcode ID: cecce4dee20ffc39160aa6f98eed1715bebab95b15cc28f3b4767ff3f246bbc8
                                                                  • Instruction ID: ab11daea1543ec4e7b4004f17afeeef3049b57a23b059aca2adbf928831a726a
                                                                  • Opcode Fuzzy Hash: cecce4dee20ffc39160aa6f98eed1715bebab95b15cc28f3b4767ff3f246bbc8
                                                                  • Instruction Fuzzy Hash: 7E31943A619B85E6F7109FA1F88879AB3A2F7C9744F60D125D94A47664EF3CC186C700
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: lstrcat$memcpymemset
                                                                  • String ID: 192.197.113.45$HTTP$TCP$UDP
                                                                  • API String ID: 133660833-3772999598
                                                                  • Opcode ID: 0a1e7c24dae5f66ab09b2b4f3d8ec40318cae43e4f5206e088fafb2b1591d6a8
                                                                  • Instruction ID: bec0a78139b64bc9270ff829b1d3c359abfaf3a1e174ee32f471e6062c2fd172
                                                                  • Opcode Fuzzy Hash: 0a1e7c24dae5f66ab09b2b4f3d8ec40318cae43e4f5206e088fafb2b1591d6a8
                                                                  • Instruction Fuzzy Hash: 93118869302645B1FB20DFA5E448795B3E3FBC9784FA4C111C94987655EF3DC24AC741
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLastVirtual$AllocCloseCreateEventFreeHandleMultipleObjectsOverlappedRecvResultWait
                                                                  • String ID:
                                                                  • API String ID: 425432780-0
                                                                  • Opcode ID: aed295863097700a3cf2bcb5c606d9995b58dd7d1b26bbd8ef56c9c832293b68
                                                                  • Instruction ID: 83cb9005bfcd7d4e7127db3765f20c412b9029e0cda75501be6c3e9ddd8f0bcb
                                                                  • Opcode Fuzzy Hash: aed295863097700a3cf2bcb5c606d9995b58dd7d1b26bbd8ef56c9c832293b68
                                                                  • Instruction Fuzzy Hash: 4831A836315B9092FB20CF51F948B5AF7A5F7C9B84F618116DA8907B54DF78C446CB01
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • GetCurrentProcessId.KERNEL32 ref: 000002287BC12020
                                                                  • ProcessIdToSessionId.KERNEL32 ref: 000002287BC12030
                                                                    • Part of subcall function 000002287BC26D30: VirtualAlloc.KERNEL32 ref: 000002287BC26D4E
                                                                    • Part of subcall function 000002287BC26D30: GetCurrentProcessId.KERNEL32 ref: 000002287BC26DC9
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC12096
                                                                  • InitializeCriticalSection.KERNEL32 ref: 000002287BC120A8
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC120CD
                                                                  • InitializeCriticalSection.KERNEL32 ref: 000002287BC120DF
                                                                  • CreateThread.KERNEL32 ref: 000002287BC12117
                                                                  • WaitForSingleObject.KERNEL32 ref: 000002287BC1212D
                                                                  • CloseHandle.KERNEL32 ref: 000002287BC12136
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: AllocCriticalSectionVirtual$EnterInitializeProcessRead$CurrentLeave$CloseCreateHandleObjectSessionSingleThreadWait
                                                                  • String ID:
                                                                  • API String ID: 1571644542-0
                                                                  • Opcode ID: 0e9fbdbc5e1bf81c50a061c41d83e27d034a7b8579a8f07f73ad152dbf177c29
                                                                  • Instruction ID: 2aa83673ea972e78cc178a2b6b52312fc4e3f68a70babbceb26b304942073231
                                                                  • Opcode Fuzzy Hash: 0e9fbdbc5e1bf81c50a061c41d83e27d034a7b8579a8f07f73ad152dbf177c29
                                                                  • Instruction Fuzzy Hash: 53316C7A216B80D2F714CF60F90868AF7A6F7C9B84F24811AEA8647B54DF3CC446CB40
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Process32$CloseHandleNextfree$CreateFirstSnapshotToolhelp32malloc
                                                                  • String ID:
                                                                  • API String ID: 141630336-0
                                                                  • Opcode ID: d3eb07f55568ab84808017c9d5b8d4771ccb86291d993e155eb6784a660c0b5b
                                                                  • Instruction ID: bfbf27ae4c42723e8d6a2f9fad01f6752c1428348267d1339ac9e6ef7ca51518
                                                                  • Opcode Fuzzy Hash: d3eb07f55568ab84808017c9d5b8d4771ccb86291d993e155eb6784a660c0b5b
                                                                  • Instruction Fuzzy Hash: 57215429302A40D2FB548F92EA4C72AE7A2F7C5FC5F68C125DD4647754EF38C4868740
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC28713
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC2875F
                                                                  • IsBadReadPtr.KERNEL32 ref: 000002287BC287A1
                                                                  • EnterCriticalSection.KERNEL32 ref: 000002287BC287B9
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC287D0
                                                                  • LeaveCriticalSection.KERNEL32 ref: 000002287BC287F4
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC28819
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC28843
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC28859
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC28883
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$AllocCriticalSection$EnterFreeRead$Leave$Initialize
                                                                  • String ID:
                                                                  • API String ID: 1953590826-0
                                                                  • Opcode ID: 0191b066f4abb38b180e3d42d616056b7f7c3051a82b4bdd04377560fdfa0cea
                                                                  • Instruction ID: 5494c673efac94d00778b58963b13f1bb58690f8981ef0cb60f8b58d77b6d3c1
                                                                  • Opcode Fuzzy Hash: 0191b066f4abb38b180e3d42d616056b7f7c3051a82b4bdd04377560fdfa0cea
                                                                  • Instruction Fuzzy Hash: 4F515035312A0092FB14DF92EA5C769A3A2FBC9F81F58C025DE8A83B54DF38D456C740
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: send
                                                                  • String ID: CONNECT %s:%u HTTP/1.1Host: %s:%uUser-agent: lws$Proxy-authorization: basic %s$RAW$client_connect4$first service failed$proxy write failed
                                                                  • API String ID: 2809346765-3983456341
                                                                  • Opcode ID: 73c775d1c85b94740a4603f15da84a518d6a6521b29e61628622c61784a89cec
                                                                  • Instruction ID: b193a6d2bca6fe3a5435ec75a6092e8c16f4904b39fa9e7d5b6796880b64586b
                                                                  • Opcode Fuzzy Hash: 73c775d1c85b94740a4603f15da84a518d6a6521b29e61628622c61784a89cec
                                                                  • Instruction Fuzzy Hash: E081FE6A202780A1FB50CFA1E4183A8B7A2FBC4B98F7881B2DE4907798DF74C442C740
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: FreeMemory$EnumerateInformationQuerySessionSessionslstrlen
                                                                  • String ID: system
                                                                  • API String ID: 3618899143-3377271179
                                                                  • Opcode ID: c5b338d4ebc20897ab899937c24653b25cbffe5cb9dd32c1f9a8a9f268688e69
                                                                  • Instruction ID: a503517bb9b96ddc59e440dd2a9379082e427c4202e2cfcffd83ca9ae97999b4
                                                                  • Opcode Fuzzy Hash: c5b338d4ebc20897ab899937c24653b25cbffe5cb9dd32c1f9a8a9f268688e69
                                                                  • Instruction Fuzzy Hash: 4941AE7A701A60EBE710DFA5E88869D77B5F388B98F504516EF0A83B18DF34C196CB00
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: lstrcat$DeleteErrorFileLastmemset
                                                                  • String ID: C:\Program Files\Windows Mail$\temp.key
                                                                  • API String ID: 3002015462-229217837
                                                                  • Opcode ID: ff7be70ef30964bc17330d8a44c3dc7bc8f9a366264bc8697cbde6c940821564
                                                                  • Instruction ID: 6cf404876d7db0128b42a930c7ce440d8a77b8ad39918a81c2bf4d75c01a10d4
                                                                  • Opcode Fuzzy Hash: ff7be70ef30964bc17330d8a44c3dc7bc8f9a366264bc8697cbde6c940821564
                                                                  • Instruction Fuzzy Hash: 5F119436609781D2FB20CF55F54835AF7A1F7D9784F648116E68947A58EF7CC189CB00
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Process$CreateToken$User$BlockCurrentDuplicateEnvironmentErrorInformationLastOpen
                                                                  • String ID:
                                                                  • API String ID: 2924300727-0
                                                                  • Opcode ID: 7776120a4cf9eab5bc6d18c251bf41d7d91d6df806284cf8426be864e5e76def
                                                                  • Instruction ID: 4d3fd31dd8356f423c89b3caebfc77978cfc71c84db6d32b643781edcf777b8b
                                                                  • Opcode Fuzzy Hash: 7776120a4cf9eab5bc6d18c251bf41d7d91d6df806284cf8426be864e5e76def
                                                                  • Instruction Fuzzy Hash: 0B517D36B05B819AF750CFA1E48478D73B6F789788F109216AE8C63B18DF38C19AC740
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1E084
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1E0AE
                                                                  • CreateEventW.KERNEL32 ref: 000002287BC1E0C4
                                                                  • CreateThread.KERNEL32 ref: 000002287BC1E0E9
                                                                  • IsBadReadPtr.KERNEL32 ref: 000002287BC1E0FE
                                                                  • EnterCriticalSection.KERNEL32 ref: 000002287BC1E111
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC1E128
                                                                  • LeaveCriticalSection.KERNEL32 ref: 000002287BC1E14C
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSectionVirtual$Alloc$EnterRead$Leave$CreateFree$EventInitializeThread
                                                                  • String ID:
                                                                  • API String ID: 1715669518-0
                                                                  • Opcode ID: efd39a18ab53be254e5ab7e73d045871cc1d92396fd7e0560496da9bb3487c49
                                                                  • Instruction ID: cad8eb76c0e74c73e2b8acc719c804165e8145bdffdc7b217547bff87f2c35a6
                                                                  • Opcode Fuzzy Hash: efd39a18ab53be254e5ab7e73d045871cc1d92396fd7e0560496da9bb3487c49
                                                                  • Instruction Fuzzy Hash: 27316D36302B4096FB54CFA2E958759B7A6FBC9F84F58C02A9E4A43B54DF38C556C700
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$CloseCreateEventHandleMultipleObjectsOverlappedRecvResultWaitmemset
                                                                  • String ID:
                                                                  • API String ID: 3426673637-0
                                                                  • Opcode ID: 52c421c825967520953a5b23246e7a4387fe70eee85a8aaed5ff1caa71a1bc93
                                                                  • Instruction ID: da613c524a320cdfe7d70ca0134967a03d9270486f389b6127db3e102e8daa1e
                                                                  • Opcode Fuzzy Hash: 52c421c825967520953a5b23246e7a4387fe70eee85a8aaed5ff1caa71a1bc93
                                                                  • Instruction Fuzzy Hash: 93317236215B81D6E710CFA1F548B8EB7A5F7C8784FA08126EB8943A14DF79C556CB40
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalReadSection$EnterErrorExitLastLeaveObjectSingleThreadWaitsend
                                                                  • String ID:
                                                                  • API String ID: 152332814-0
                                                                  • Opcode ID: 8d08eea230e4b6f90c829aa98d6795d4b32622fa59929bdfc937a3d05da3df0d
                                                                  • Instruction ID: 99fb50b5143eb18e9804b1c56e57dcd383175db2aea66cdfd5e0ce50f5233912
                                                                  • Opcode Fuzzy Hash: 8d08eea230e4b6f90c829aa98d6795d4b32622fa59929bdfc937a3d05da3df0d
                                                                  • Instruction Fuzzy Hash: F1116635305A00D2FB009FA2ED5C72AE7A6F7DAF88F648016CE0947754DE38C8578741
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: closesocket
                                                                  • String ID: __lws_close_free_wsi_final$client_reset$failed to get ah$free$lws_free
                                                                  • API String ID: 2781271927-1207365477
                                                                  • Opcode ID: d67164782edfafa85efe1b1ad5334ba79289834cad1433db88d2c4e3e7eaf4da
                                                                  • Instruction ID: 826f3512da79414b2105ff109091c04e0720247d2b7a192f4a744180e23092ec
                                                                  • Opcode Fuzzy Hash: d67164782edfafa85efe1b1ad5334ba79289834cad1433db88d2c4e3e7eaf4da
                                                                  • Instruction Fuzzy Hash: F7516176302A80A1FA58DF65D6483ADA7A6F7C5BB4F6482129F78076D5DF34C6638300
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: FreeVirtual$lstrcat
                                                                  • String ID: HTTP$TCP$UDP
                                                                  • API String ID: 1793027038-3864057669
                                                                  • Opcode ID: f8c770e093299375ec3939c6a1ac62dfcec0d984de34bbc823660acc1cfcb956
                                                                  • Instruction ID: 8bbcca5ccc702a333a0130808dcffcbbeddb6d0683c6485c921f57b3599c0ddc
                                                                  • Opcode Fuzzy Hash: f8c770e093299375ec3939c6a1ac62dfcec0d984de34bbc823660acc1cfcb956
                                                                  • Instruction Fuzzy Hash: B6417D66315B4093EB64CFA2E54872DB3A2FBC9BC0F548125DA8A83F54DF38D5968B00
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1D8F0
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1D91A
                                                                  • CreateThread.KERNEL32 ref: 000002287BC1D948
                                                                  • IsBadReadPtr.KERNEL32 ref: 000002287BC1D96C
                                                                  • EnterCriticalSection.KERNEL32 ref: 000002287BC1D97F
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC1D996
                                                                  • LeaveCriticalSection.KERNEL32 ref: 000002287BC1D9BA
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSectionVirtual$Alloc$EnterRead$Leave$Free$CreateInitializeThread
                                                                  • String ID:
                                                                  • API String ID: 1508740679-0
                                                                  • Opcode ID: 1e0f999212c5dae18b05ebfdccd023800d68c8a289210f02f12863f3365b7b20
                                                                  • Instruction ID: b03e939f34f7a8e8976bed95f2be1ac54b05fdd0eedaf0a4d6485035e24b71d1
                                                                  • Opcode Fuzzy Hash: 1e0f999212c5dae18b05ebfdccd023800d68c8a289210f02f12863f3365b7b20
                                                                  • Instruction Fuzzy Hash: CC419236212B8096FB54CF62E54875EB7A5FBC8B94F148025DF4A53B58DF38C456CB40
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1DE4A
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1DE74
                                                                  • CreateThread.KERNEL32 ref: 000002287BC1DEA0
                                                                  • IsBadReadPtr.KERNEL32 ref: 000002287BC1DEC4
                                                                  • EnterCriticalSection.KERNEL32 ref: 000002287BC1DED7
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC1DEEE
                                                                  • LeaveCriticalSection.KERNEL32 ref: 000002287BC1DF12
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSectionVirtual$Alloc$EnterRead$Leave$Free$CreateInitializeThread
                                                                  • String ID:
                                                                  • API String ID: 1508740679-0
                                                                  • Opcode ID: 273e2070679fd9d425f482d2ff087d99ca88f881e3c69df1ba744a5168f544b7
                                                                  • Instruction ID: f3f4c703d45355c6f95aaa494a7c24a5b3f5a08e06e81f013002d5fcffddd09c
                                                                  • Opcode Fuzzy Hash: 273e2070679fd9d425f482d2ff087d99ca88f881e3c69df1ba744a5168f544b7
                                                                  • Instruction Fuzzy Hash: 7A41BA7A302B4096EB54CF62E54835DB7A2FBC8F84F68802ADB4943B18DF38C556CB40
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Library$AddressAllocFreeLoadProcVirtual
                                                                  • String ID: SetProcessDPIAware$user32.dll
                                                                  • API String ID: 3041263384-1137607222
                                                                  • Opcode ID: 9d02f87800e55cbf7a8c42c438b0b17f760479b48bbb6df9485456c9862dbe11
                                                                  • Instruction ID: bbdecf8cf405e1a701e569403e56fe927a4e2995ef528a142a7a63586b3691e5
                                                                  • Opcode Fuzzy Hash: 9d02f87800e55cbf7a8c42c438b0b17f760479b48bbb6df9485456c9862dbe11
                                                                  • Instruction Fuzzy Hash: 71515739203F45E5FB419FA0E8893D973AAFB89B44F688536C95D16368EF38C196C350
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Free$AllocErrorLastWait$CloseCreateEventHandleMultipleObjectObjectsRecvSinglememset
                                                                  • String ID:
                                                                  • API String ID: 970482246-0
                                                                  • Opcode ID: bcfe923bc1964125a088590f5d55776f769510132eb89fe0d0a8e6d172af37a9
                                                                  • Instruction ID: af8e1cef074e57477001685f15058e37bee7130b108c042a83b67ac5432eb7e7
                                                                  • Opcode Fuzzy Hash: bcfe923bc1964125a088590f5d55776f769510132eb89fe0d0a8e6d172af37a9
                                                                  • Instruction Fuzzy Hash: DE31B72930265191FB648FA7ED0CB56E6D2ABCAFD0F6CC0359D4A8B7A4DE39C4435B01
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$ByteCharFreeMultiWide$AllocFileWritelstrlen
                                                                  • String ID:
                                                                  • API String ID: 2835453980-0
                                                                  • Opcode ID: 71f212e19adb1378ffe727bebadbeda59ee68b8536da3b7b422bd183694d57e2
                                                                  • Instruction ID: a84a191335b875f127e2c95cda41f611b4f946ff5ce951682797b991f66fe32a
                                                                  • Opcode Fuzzy Hash: 71f212e19adb1378ffe727bebadbeda59ee68b8536da3b7b422bd183694d57e2
                                                                  • Instruction Fuzzy Hash: 58316036305B4097FB14CF67A65861AA3A2FBC9FC0F148025DE8A53F24DF38C0628B05
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: FreeVirtualmemcpymemset$FileOperation
                                                                  • String ID:
                                                                  • API String ID: 467530429-0
                                                                  • Opcode ID: dffc5ae634dab5e40cba806f4480da46c8e90b6c2f9df2de3ee599a4a81b9e1f
                                                                  • Instruction ID: f2af87485b52c6bbb79d074e5f10352e6d7b91007ae9e522c38903d487332a4a
                                                                  • Opcode Fuzzy Hash: dffc5ae634dab5e40cba806f4480da46c8e90b6c2f9df2de3ee599a4a81b9e1f
                                                                  • Instruction Fuzzy Hash: EA316B36215B8196EB20CF52E48864EF7A5FBC9B84F548525DB9903B28DF39D166CB00
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$CloseCreateEventHandleMultipleObjectsSendWait
                                                                  • String ID:
                                                                  • API String ID: 248740593-0
                                                                  • Opcode ID: 736fedc4c4d23ddd567e7e6bbc7468ae00658e1629175c99a4b37f698f570d50
                                                                  • Instruction ID: d725677ef4e2dc8e5a36b0ee8b4db7d5952be61a92b8e5855f90ccde44144f50
                                                                  • Opcode Fuzzy Hash: 736fedc4c4d23ddd567e7e6bbc7468ae00658e1629175c99a4b37f698f570d50
                                                                  • Instruction Fuzzy Hash: 1A316F36609B809AFB208FA4F44878AF361F7C5794F648126EB8C47B58DF78C586CB01
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFileLastVirtual$AllocBuffersFlushFreeNamedPeekPipeRead
                                                                  • String ID:
                                                                  • API String ID: 1637252459-0
                                                                  • Opcode ID: 4468efe2ac97f06d54e52ac93bf4084700aad4286db5d8e7735387b67f148689
                                                                  • Instruction ID: 50b8d44849f337b31d15ab0372a1d843fc77930d9866c13a239cc3fb7e29d0dc
                                                                  • Opcode Fuzzy Hash: 4468efe2ac97f06d54e52ac93bf4084700aad4286db5d8e7735387b67f148689
                                                                  • Instruction Fuzzy Hash: 0A21923A305A4096F7208FA2F90865AF3A1FBC9BE5F148025DE4D83B54EF38D496CB00
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: lstrcpy$DeviceDriveLogicalQueryStringslstrcatlstrlenwcsncmp
                                                                  • String ID:
                                                                  • API String ID: 1240803607-0
                                                                  • Opcode ID: 9280a457a6313f234a10a2775b094dafe39453bb89c65eff5f156e380ed969df
                                                                  • Instruction ID: 361c42c50d8013c360a7c4d8b634f9a0e93fd4bdccb8036b3118bdadb9501fb2
                                                                  • Opcode Fuzzy Hash: 9280a457a6313f234a10a2775b094dafe39453bb89c65eff5f156e380ed969df
                                                                  • Instruction Fuzzy Hash: 1231866A205A81D5FB708F51E8087EFB362FBC5BC5F5491269E8943654EF3CC556C700
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: FreeMemoryProcessSession$CreateCurrentDirectoryEnumerateErrorInformationLastQuerySessionsSystemThreadlstrcatmemset
                                                                  • String ID:
                                                                  • API String ID: 3188162108-0
                                                                  • Opcode ID: d566a49c519e7465bdeb44e4b25feed635b824216205b27444040cf427fbd1ca
                                                                  • Instruction ID: 6c89a0a2f8f462972cf6cd7e98f2dc7a7d9c94bc781b946f34b1d323382a64ff
                                                                  • Opcode Fuzzy Hash: d566a49c519e7465bdeb44e4b25feed635b824216205b27444040cf427fbd1ca
                                                                  • Instruction Fuzzy Hash: 1B314F7A219B48D7E710CF61E54864EB7A6F3C8784F648116EB8A83B28DF38D546CB00
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandle$CreateErrorLastProcessSuspendThreadTokenWith
                                                                  • String ID: h
                                                                  • API String ID: 1678065097-2439710439
                                                                  • Opcode ID: 3cbc20e78e1eb83783e4a30a281580a657b95db29aa1acf2fc706db10240a998
                                                                  • Instruction ID: eb4aae2c0a9cc3ef3caa50ba580c1642b85879bf8eb984954284244d3f2d1b72
                                                                  • Opcode Fuzzy Hash: 3cbc20e78e1eb83783e4a30a281580a657b95db29aa1acf2fc706db10240a998
                                                                  • Instruction Fuzzy Hash: 3A317076A18B8082F710CF91E58835DB3A5F7D8794F219226EE9843B14DFB8C4D1CB00
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CloseControlCreateDeviceFileHandlelstrlenmemset
                                                                  • String ID: \\.\{F8284233-48F4-4680-ADDD-F8284233}
                                                                  • API String ID: 2589617790-329358119
                                                                  • Opcode ID: ddb270b5adfe0e322802696b8fc744b31215d6184e53b30f0350213f07a3a6f1
                                                                  • Instruction ID: 0ed94398792dc80b3261c7a354add7e98d57b89cf5aec030e2742d85b36ae58c
                                                                  • Opcode Fuzzy Hash: ddb270b5adfe0e322802696b8fc744b31215d6184e53b30f0350213f07a3a6f1
                                                                  • Instruction Fuzzy Hash: F8113A3A219B8092E761CF90F45878AB3A1F7C9744F648126EA8D47B58EF7CC109CB40
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: OpenService$CloseErrorHandleLastManager
                                                                  • String ID:
                                                                  • API String ID: 2659350385-0
                                                                  • Opcode ID: 21d58da2365aae7713df0bba265bb248948e741fa30b49312907162967780c34
                                                                  • Instruction ID: 2f6513d2e1771a089efbef0634dfb427c2e3b8d5bad287016485dfe90e6e6927
                                                                  • Opcode Fuzzy Hash: 21d58da2365aae7713df0bba265bb248948e741fa30b49312907162967780c34
                                                                  • Instruction Fuzzy Hash: 44019629B1A641D2FB044FE6F65C66892A2BBCDBD4F189035DE0A47705EE3CC0868700
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Read$CriticalEnterErrorExitLastSectionThreadsend
                                                                  • String ID:
                                                                  • API String ID: 4016372045-0
                                                                  • Opcode ID: 0cb937844fa9c00b9fa8bea4c611d7e8c3f40beeb7d681a97e4cbd93e78cb1ef
                                                                  • Instruction ID: 8509782d51122f6685e19a5f11edcdf5ce26f1b4ed814f37ec1e8214105267de
                                                                  • Opcode Fuzzy Hash: 0cb937844fa9c00b9fa8bea4c611d7e8c3f40beeb7d681a97e4cbd93e78cb1ef
                                                                  • Instruction Fuzzy Hash: E0016D26715A40D2FB809F62F85869AA361F7C9F88F589026EE4A83754DE38C896C740
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: DirectoryErrorFreeLastSystemVirtuallstrcatmemset
                                                                  • String ID: \svchost.exe -k netsvcs
                                                                  • API String ID: 1196864501-2993138014
                                                                  • Opcode ID: 3c54e76b755668cf6d3f4ee9d45539f6f3659440dcd46cb8989e19fc75b63e78
                                                                  • Instruction ID: e18d199d06b6f4bb8b4486ac3efb2bbd59974f6732c90ed61b15cc6c22e9f71e
                                                                  • Opcode Fuzzy Hash: 3c54e76b755668cf6d3f4ee9d45539f6f3659440dcd46cb8989e19fc75b63e78
                                                                  • Instruction Fuzzy Hash: 7F01B529212A45E2FB30DFA1E85C35AA362F7C5B58F108212C9AD436E4DF3CC24BCB40
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Alloc$CriticalFreeInitializeSection
                                                                  • String ID:
                                                                  • API String ID: 2852478515-0
                                                                  • Opcode ID: c5cfcf3bffb5d7c89580759386092f93148ed843e36550bd311e222fef34503b
                                                                  • Instruction ID: 90e7f19decf347dfefe548c00b887c82710715b14574a478eab284e257777dcf
                                                                  • Opcode Fuzzy Hash: c5cfcf3bffb5d7c89580759386092f93148ed843e36550bd311e222fef34503b
                                                                  • Instruction Fuzzy Hash: 2D61FA79203F44A5F705CF61E488389B3AAFB88B44FA4813ADA8D57768EF38C556C350
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$AllocFree$InfoUserlstrcmpi
                                                                  • String ID:
                                                                  • API String ID: 4244901044-0
                                                                  • Opcode ID: ffb3443bbac70228aa897f474ce45adbdc9e97f2773668571b4a4edc2f42a8ff
                                                                  • Instruction ID: f487916e27493af500ce230b2ee72a20367302e17d03fbdf4382ee665bc7e98c
                                                                  • Opcode Fuzzy Hash: ffb3443bbac70228aa897f474ce45adbdc9e97f2773668571b4a4edc2f42a8ff
                                                                  • Instruction Fuzzy Hash: 2631847931674493FB148FA2E94875AE7A2EB89FD5F148028DD4A47798DF7CC48ACB00
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: ObjectSingleWaitmemcpy$Eventmemset
                                                                  • String ID:
                                                                  • API String ID: 2578485326-0
                                                                  • Opcode ID: 593d3bfb47ea6c412de529a8b649e62841a5da6e6762aa89e932a4b07bb049f8
                                                                  • Instruction ID: e3c16159e714babfe944739665cbb5965a31fd544d8c633ef40c22736871c25d
                                                                  • Opcode Fuzzy Hash: 593d3bfb47ea6c412de529a8b649e62841a5da6e6762aa89e932a4b07bb049f8
                                                                  • Instruction Fuzzy Hash: EF31D62A71560092F730DFB6E44879EEA62FBC57D4FA08411EB9E87A85DE78C4839301
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: AllocBitmapBitsCompatibleCreateDeleteObjectReleaseVirtual
                                                                  • String ID:
                                                                  • API String ID: 1942853633-0
                                                                  • Opcode ID: 13579db701cc3f9648d3d847a457af4c41c6300500b32a6bdf374a6fdac0f19d
                                                                  • Instruction ID: 02b1f79d3fbf455210ec1f9847b84fb6fae3479b569b316bd412632bffe16108
                                                                  • Opcode Fuzzy Hash: 13579db701cc3f9648d3d847a457af4c41c6300500b32a6bdf374a6fdac0f19d
                                                                  • Instruction Fuzzy Hash: AE21DE7621178083EB089F66B91861DBAA1FBC9BD0F55812EDE8653BA0CF38C0428B04
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$CreateEventMultipleObjectsOverlappedResultSendWait
                                                                  • String ID:
                                                                  • API String ID: 2744466595-0
                                                                  • Opcode ID: f4a1bc1cac240b64085eebbab03949733171f532d965439b73487b32c39e4c9c
                                                                  • Instruction ID: fd41a50dc3e14e48316ce5a8e77aa155617a015c7b9c3c37a730af87447bb20b
                                                                  • Opcode Fuzzy Hash: f4a1bc1cac240b64085eebbab03949733171f532d965439b73487b32c39e4c9c
                                                                  • Instruction Fuzzy Hash: 1A215136209B80D7E7208F65F948A4EF7A5F7C9794F508126DA8943F28DF78C55ACB00
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CountCreateFileTick$ErrorLastSleep
                                                                  • String ID:
                                                                  • API String ID: 2478964991-0
                                                                  • Opcode ID: 1fa91be5546011857bb5268aae10dbfd336c52318b51f8d73b8f7a40f7e50af3
                                                                  • Instruction ID: 255dd7772d33f572d8668017f63450d28e991ad7240618890c7ee8b3f3c0ecc0
                                                                  • Opcode Fuzzy Hash: 1fa91be5546011857bb5268aae10dbfd336c52318b51f8d73b8f7a40f7e50af3
                                                                  • Instruction Fuzzy Hash: 8D219535205B4096F3608FA0B95C75AB691F7C87B8F248722D6A583BD4DF38C4468700
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: free
                                                                  • String ID:
                                                                  • API String ID: 1294909896-0
                                                                  • Opcode ID: 00841f5d62244bb9ad7474d482c6f0d074869daa416a1b9df4e920309b030068
                                                                  • Instruction ID: 83dcd7c400e203daca91d04045a4e170eafc7c825e0303ec4e3dcf6cc0b34180
                                                                  • Opcode Fuzzy Hash: 00841f5d62244bb9ad7474d482c6f0d074869daa416a1b9df4e920309b030068
                                                                  • Instruction Fuzzy Hash: 1051BA7A213B48E1FA508F99E588318B3A6E788F98F78D416DA8D63754DF75C4A2C310
                                                                  APIs
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC1DB19
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1DBE6
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1DC10
                                                                  • CloseHandle.KERNEL32 ref: 000002287BC1DC25
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1DC58
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1DC82
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1DC97
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                    • Part of subcall function 000002287BC14570: VirtualAlloc.KERNEL32 ref: 000002287BC1458D
                                                                    • Part of subcall function 000002287BC14570: VirtualAlloc.KERNEL32 ref: 000002287BC145BF
                                                                    • Part of subcall function 000002287BC14570: InitializeCriticalSection.KERNEL32 ref: 000002287BC145D4
                                                                    • Part of subcall function 000002287BC14570: IsBadReadPtr.KERNEL32 ref: 000002287BC145F0
                                                                    • Part of subcall function 000002287BC14570: EnterCriticalSection.KERNEL32 ref: 000002287BC14603
                                                                    • Part of subcall function 000002287BC14570: VirtualAlloc.KERNEL32 ref: 000002287BC1461A
                                                                    • Part of subcall function 000002287BC14570: LeaveCriticalSection.KERNEL32 ref: 000002287BC14649
                                                                    • Part of subcall function 000002287BC14570: IsBadReadPtr.KERNEL32 ref: 000002287BC1465E
                                                                    • Part of subcall function 000002287BC14570: EnterCriticalSection.KERNEL32 ref: 000002287BC14671
                                                                    • Part of subcall function 000002287BC14570: VirtualAlloc.KERNEL32 ref: 000002287BC14688
                                                                    • Part of subcall function 000002287BC14570: LeaveCriticalSection.KERNEL32 ref: 000002287BC146B7
                                                                    • Part of subcall function 000002287BC14570: IsBadReadPtr.KERNEL32 ref: 000002287BC146CC
                                                                    • Part of subcall function 000002287BC14570: EnterCriticalSection.KERNEL32 ref: 000002287BC146DF
                                                                    • Part of subcall function 000002287BC14570: VirtualAlloc.KERNEL32 ref: 000002287BC146F6
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$CriticalSection$Alloc$EnterRead$Free$Leave$Initialize$CloseHandle
                                                                  • String ID:
                                                                  • API String ID: 1803526796-0
                                                                  • Opcode ID: 69801f64ede04bbea7cc69c2b4859a8af001f84668aa4b53a985770f8a0b9a64
                                                                  • Instruction ID: 619dff94445c94ce01d202d1ce236dfcd90b8811b56d5cdd3ea644e65e1e5a3e
                                                                  • Opcode Fuzzy Hash: 69801f64ede04bbea7cc69c2b4859a8af001f84668aa4b53a985770f8a0b9a64
                                                                  • Instruction Fuzzy Hash: 74513F39202B4092FB64CF92F45875AB3A6FBC9B90F54C125CA9E43B64EF38D052C740
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: memcpy
                                                                  • String ID:
                                                                  • API String ID: 3510742995-0
                                                                  • Opcode ID: b724fa2a07575d1f2e0ebca6cf9c5d14953e58695853448362fc9f09176e4fc8
                                                                  • Instruction ID: 8c4503da65eb1f4335b20b1686aaf4540657cad2189c5814fae5715045633e2a
                                                                  • Opcode Fuzzy Hash: b724fa2a07575d1f2e0ebca6cf9c5d14953e58695853448362fc9f09176e4fc8
                                                                  • Instruction Fuzzy Hash: 7A61BE7A206B849AFB20CFA5E44875DB3A6FB88B94F69C025CE5D53B94EF34C442C750
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC24383
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC243AD
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC243C4
                                                                  • InitializeCriticalSection.KERNEL32 ref: 000002287BC2444E
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC244D3
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC244FD
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$CriticalSection$Alloc$Free$EnterRead$InitializeLeave
                                                                  • String ID:
                                                                  • API String ID: 2124124174-0
                                                                  • Opcode ID: 327538bf83d39be03c92c6611fd246348e0e96911acdfefe4918cf67a76a0f69
                                                                  • Instruction ID: a685b6cca487e3299b163fbfbe5807e83498dece01a890fde909b6056d60fe23
                                                                  • Opcode Fuzzy Hash: 327538bf83d39be03c92c6611fd246348e0e96911acdfefe4918cf67a76a0f69
                                                                  • Instruction Fuzzy Hash: 71515C3A202B4096FB60CF92F458B59B3AAFB89B84F558129CE8D43B14EF38D095C740
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                    • Part of subcall function 000002287BC2C7F0: WTSEnumerateSessionsW.WTSAPI32 ref: 000002287BC2C82F
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1364B
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1365D
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13670
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13687
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC136B6
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC136C8
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC136DB
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC136F2
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13721
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13733
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13746
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1375D
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1378C
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1379E
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC137B4
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2F054
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2F07E
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2F0B6
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2F0E0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$Virtual$Alloc$EnterRead$Leave$Free$EnumerateInitializeSessions
                                                                  • String ID: @
                                                                  • API String ID: 3635408051-3454712805
                                                                  • Opcode ID: b0c86a4cab25e2652359a583b6c9b9f4367b00505ec8be9c526b7c58144f271c
                                                                  • Instruction ID: 22bd8706f99605c725943f4ea0c9d294bc67abc07fe4fde1104b14b8130cd5fc
                                                                  • Opcode Fuzzy Hash: b0c86a4cab25e2652359a583b6c9b9f4367b00505ec8be9c526b7c58144f271c
                                                                  • Instruction Fuzzy Hash: 6E314136702B4096EB64DF63E55861EB7A6FBC9B84B148025DF8A53F14DF39C0A68B04
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1592B
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC15955
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC15D08
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC15D32
                                                                    • Part of subcall function 000002287BC2BCB0: memcpy.NTDLL ref: 000002287BC2BCD5
                                                                    • Part of subcall function 000002287BC2BCB0: memset.NTDLL ref: 000002287BC2BD6A
                                                                    • Part of subcall function 000002287BC2BCB0: wsprintfW.USER32 ref: 000002287BC2BD89
                                                                    • Part of subcall function 000002287BC2BCB0: SetFileAttributesW.KERNEL32 ref: 000002287BC2BD99
                                                                    • Part of subcall function 000002287BC2BCB0: DeleteFileW.KERNEL32 ref: 000002287BC2BDA4
                                                                    • Part of subcall function 000002287BC2BCB0: CreateFileW.KERNEL32 ref: 000002287BC2BDD4
                                                                    • Part of subcall function 000002287BC2BCB0: GetLastError.KERNEL32 ref: 000002287BC2BDE3
                                                                    • Part of subcall function 000002287BC2BCB0: SetFileAttributesW.KERNEL32 ref: 000002287BC2BE30
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$CriticalSection$Alloc$FileFree$EnterRead$AttributesLeave$CreateDeleteErrorInitializeLastmemcpymemsetwsprintf
                                                                  • String ID: 192.197.113.45
                                                                  • API String ID: 3047218378-820838125
                                                                  • Opcode ID: 2b6defab8ed644ac50e923dc36a15746bf9641cd2956f56d6c7c39fb03cb3d69
                                                                  • Instruction ID: 065dccf78086f24ed9189b7a9e03a39280d4cb46cf21c8440df59f47842e6632
                                                                  • Opcode Fuzzy Hash: 2b6defab8ed644ac50e923dc36a15746bf9641cd2956f56d6c7c39fb03cb3d69
                                                                  • Instruction Fuzzy Hash: F631A126712A4082FB64DFA7E45C76EA3A6FBC9B90F12C1158F8A43B54DF38C1868700
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC15866
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC15890
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC15D08
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC15D32
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$CriticalSection$Alloc$Free$EnterRead$Leave$Initialize
                                                                  • String ID: 192.197.113.45
                                                                  • API String ID: 696443088-820838125
                                                                  • Opcode ID: 7f8cadc7e285ae11971a4ac663658132d71a4b6ccc16da7a7032d0ef10562ca5
                                                                  • Instruction ID: e3d0958f2883c9962eabb4857ba500ca4b44f9e631fb58d9f18776576dee23a0
                                                                  • Opcode Fuzzy Hash: 7f8cadc7e285ae11971a4ac663658132d71a4b6ccc16da7a7032d0ef10562ca5
                                                                  • Instruction Fuzzy Hash: DD315C3A602B4196FB24DF96E55C71AA3A6FBC5B80F21C0168F8603B64DF39C0868B00
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: memcpy
                                                                  • String ID: %s: OOM$%s: buflist reached sanity limit$%s: corrupt list points to self$lws_buflist_append_segment
                                                                  • API String ID: 3510742995-575834517
                                                                  • Opcode ID: ba9ff21200fa1422aea39c90e6c7c80ef22b648ed25b9cfedbdff520b8680236
                                                                  • Instruction ID: c15604c85300388005b9e92972b4546f0daa40418a6e509d3a938977dfe207bb
                                                                  • Opcode Fuzzy Hash: ba9ff21200fa1422aea39c90e6c7c80ef22b648ed25b9cfedbdff520b8680236
                                                                  • Instruction Fuzzy Hash: D921D13A206B45A0FA148F95E408399BBA6F788BE4FA5C116EA4D037E4DF38C646C340
                                                                  APIs
                                                                  • malloc.MSVCRT ref: 000002287BC1DCE5
                                                                  • lstrcatW.KERNEL32 ref: 000002287BC1DD0C
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                    • Part of subcall function 000002287BC1C9B0: memset.NTDLL ref: 000002287BC1C9F5
                                                                    • Part of subcall function 000002287BC1C9B0: lstrcatW.KERNEL32 ref: 000002287BC1CA04
                                                                    • Part of subcall function 000002287BC1C9B0: lstrcatW.KERNEL32 ref: 000002287BC1CA18
                                                                    • Part of subcall function 000002287BC1C9B0: memset.NTDLL ref: 000002287BC1CA2B
                                                                    • Part of subcall function 000002287BC1C9B0: FindFirstFileW.KERNEL32 ref: 000002287BC1CA3C
                                                                    • Part of subcall function 000002287BC1C9B0: FindNextFileW.KERNEL32 ref: 000002287BC1CA95
                                                                    • Part of subcall function 000002287BC1C9B0: FindNextFileW.KERNEL32 ref: 000002287BC1CAF9
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1DD53
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1DD7D
                                                                  • free.MSVCRT ref: 000002287BC1DD86
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$CriticalSection$Alloc$EnterFileFindReadlstrcat$FreeLeaveNextmemset$FirstInitializefreemalloc
                                                                  • String ID:
                                                                  • API String ID: 2817660952-0
                                                                  • Opcode ID: d7ce884ec659c7e0cc6de19210e011dca56ab10a28334d10c45262fb231a6201
                                                                  • Instruction ID: 1478afd6dd9adc8f0cc3d3587572783bc38c1df3624fd0ea45f5f608a7cce508
                                                                  • Opcode Fuzzy Hash: d7ce884ec659c7e0cc6de19210e011dca56ab10a28334d10c45262fb231a6201
                                                                  • Instruction Fuzzy Hash: 4121F335302A8095FB14DF93E85C75AA7A5F7C9FC4F18C0259E8947B58DE38C1428740
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Process$CloseCreateCurrentHandleObjectSingleTerminateThreadWait
                                                                  • String ID:
                                                                  • API String ID: 603326088-0
                                                                  • Opcode ID: f1eee888be949acee3f31b447f91f8061928013f2e1e1d50efeb43abaeb1e76c
                                                                  • Instruction ID: 8fb3026d2ff48ab9c20c66ff22ac67f68748f74485946dd4d468574d552a8df7
                                                                  • Opcode Fuzzy Hash: f1eee888be949acee3f31b447f91f8061928013f2e1e1d50efeb43abaeb1e76c
                                                                  • Instruction Fuzzy Hash: B9F0546971260096FB148FF1AD0C755A3A2BBC9B58F68852A8C1987350FE3CC0438610
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: memset$_unlink
                                                                  • String ID: lws_free
                                                                  • API String ID: 1884818752-2419506585
                                                                  • Opcode ID: 2b4d076a4aee2642aadf0ee658338696a0446662a2dd93154b02c4e920f709c8
                                                                  • Instruction ID: 3722b066a55df1de7737014dbae6f1886a9b52f8a9a04596f0fee2275f65d838
                                                                  • Opcode Fuzzy Hash: 2b4d076a4aee2642aadf0ee658338696a0446662a2dd93154b02c4e920f709c8
                                                                  • Instruction Fuzzy Hash: 62815D3A212B85A4FB648F55D4493ADABA2F7D4B98F688435CE4D4B394DF34C652C310
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: _time64memset
                                                                  • String ID: %s: calling service$__lws_header_table_reset
                                                                  • API String ID: 899224009-1639372703
                                                                  • Opcode ID: 3f6baea8b054f78f6fa319b1d3ed3b6a3e783d16ad0033a8b6aaf7f4e8f9a2f0
                                                                  • Instruction ID: 372d8e93bb27677d287387941470f2981fee7ee7e18b9fea640963b9eef451f5
                                                                  • Opcode Fuzzy Hash: 3f6baea8b054f78f6fa319b1d3ed3b6a3e783d16ad0033a8b6aaf7f4e8f9a2f0
                                                                  • Instruction Fuzzy Hash: 1531AF22A05BC092E745CF61D5843ECBB65F799F58F289236DF584B29ADF34C2A2C310
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: AllocErrorInitLastStringVariant
                                                                  • String ID: \Microsoft\Windows
                                                                  • API String ID: 3210815728-1732172413
                                                                  • Opcode ID: 004125f1d84ecdb5e7494dadc9ab5b49c7bed4fc4b6bdfb48350d005c5d9828e
                                                                  • Instruction ID: 6b1b072be70a2baafb77d9502bc9e94023f2456d826ddcf0b24bd7aab344a62c
                                                                  • Opcode Fuzzy Hash: 004125f1d84ecdb5e7494dadc9ab5b49c7bed4fc4b6bdfb48350d005c5d9828e
                                                                  • Instruction Fuzzy Hash: D5215026A18EC5D2E7218F64F4043DAB371FBD9B84F149212EB8952619EF3DC186CB00
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: FreeVirtual$Message
                                                                  • String ID: boom...
                                                                  • API String ID: 3815264287-1338744694
                                                                  • Opcode ID: c9ebd0a2e4eeb3f5d586c4b2e0509e2165f08feab2920f0ec1c204795427f359
                                                                  • Instruction ID: 86a6fbbe12c05f3333ccfca12d939a56dfcf33e8da162f91e128b2d7bcaf4062
                                                                  • Opcode Fuzzy Hash: c9ebd0a2e4eeb3f5d586c4b2e0509e2165f08feab2920f0ec1c204795427f359
                                                                  • Instruction Fuzzy Hash: 8D11C825712B4082FB54DFB2E51835AB3A1FBDDF48F14D215998A46654EF3CC1C5C700
                                                                  APIs
                                                                  • memcpy.NTDLL(?,?,00000000,000002287BC394E8,?,00000000,?,000002287BC36596), ref: 000002287BC3811C
                                                                  • memcpy.NTDLL ref: 000002287BC381A1
                                                                  • memcpy.NTDLL(?,?,00000000,000002287BC394E8,?,00000000,?,000002287BC36596), ref: 000002287BC381DD
                                                                  • memcpy.NTDLL(?,?,00000000,000002287BC394E8,?,00000000,?,000002287BC36596), ref: 000002287BC38219
                                                                  • memcpy.NTDLL(?,?,00000000,000002287BC394E8,?,00000000,?,000002287BC36596), ref: 000002287BC382CD
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: memcpy
                                                                  • String ID:
                                                                  • API String ID: 3510742995-0
                                                                  • Opcode ID: 966f0709295554856f31a4ecd688e8bb2fc6d7ab78357df849f83103014d210d
                                                                  • Instruction ID: fc3534aed9154fc3a043b7f3f63d51bc55b68bf2d556349b8c7d5d1869f27250
                                                                  • Opcode Fuzzy Hash: 966f0709295554856f31a4ecd688e8bb2fc6d7ab78357df849f83103014d210d
                                                                  • Instruction Fuzzy Hash: D0D14A76705650ABEB18CE69C38839DB7A2F788B80F608119DB1E83750DF31E872DB41
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1B60B
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1B635
                                                                  • memset.NTDLL ref: 000002287BC1B656
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1B6A6
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1B6D0
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$CriticalSection$Alloc$Free$EnterRead$Leave$Initializememset
                                                                  • String ID:
                                                                  • API String ID: 3460648485-0
                                                                  • Opcode ID: b1e2dd2b0cc1a51acca87de263e3f1097b3bea1bd002cb5d7cfe503a6461ace1
                                                                  • Instruction ID: 10b7574bfadf2291a6161cf2e68f5ee7cb286ed3029c74f4d6b5c472d9bb34b1
                                                                  • Opcode Fuzzy Hash: b1e2dd2b0cc1a51acca87de263e3f1097b3bea1bd002cb5d7cfe503a6461ace1
                                                                  • Instruction Fuzzy Hash: 23316336301A9096FB24DF93E558399A3A2FBCDB81F5480248F8A47F54DF38D1568B00
                                                                  APIs
                                                                  • memset.NTDLL ref: 000002287BC1CD5A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1CD95
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1CDBF
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1CDE9
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1CE13
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$CriticalSection$Alloc$Free$EnterRead$Leave$Initializememset
                                                                  • String ID:
                                                                  • API String ID: 3460648485-0
                                                                  • Opcode ID: 2f1d990fb7f5200c509fea68be84fd40bc5b4beb197a41457c29c039dd3f6c4c
                                                                  • Instruction ID: b88998b7334d450f36bd527372ffecdba5ec4ce2fdf7503c15f9fc90ef8344ff
                                                                  • Opcode Fuzzy Hash: 2f1d990fb7f5200c509fea68be84fd40bc5b4beb197a41457c29c039dd3f6c4c
                                                                  • Instruction Fuzzy Hash: 00315026302B4096FB64DFA3E55875AA7A2FBC9B80F14C0259F8A43F54DF38D1568740
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ctx destroy$free$lws_free
                                                                  • API String ID: 0-48050916
                                                                  • Opcode ID: 7fa3de8879873fad443575716613c66aa7123479f2bfe21c7ca70ad3f37d6207
                                                                  • Instruction ID: 6da2347e839f71abbe0839dd8f25c00cd118b69456a78bc8059261a92f034ba9
                                                                  • Opcode Fuzzy Hash: 7fa3de8879873fad443575716613c66aa7123479f2bfe21c7ca70ad3f37d6207
                                                                  • Instruction Fuzzy Hash: 83D1D02A302680A2FA5D9FA185483EDB7A2F785B84FA4C021CF5D07399DF38D567D741
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: atoi
                                                                  • String ID: http$https$wss
                                                                  • API String ID: 657269090-1519134247
                                                                  • Opcode ID: 9eeca8da3c80b5b96a7f61831c2102cba9482959941df2d328073ffda5aa503d
                                                                  • Instruction ID: 1ecaa81f9625789bd54d98bf455515f01b7266070fc7727c42f4fec337dde0e6
                                                                  • Opcode Fuzzy Hash: 9eeca8da3c80b5b96a7f61831c2102cba9482959941df2d328073ffda5aa503d
                                                                  • Instruction Fuzzy Hash: DC51B75A10A6C464FF624FA59418378BBFA9396748FECC452C2C9472E1CE68C897A713
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • WaitForMultipleObjects.KERNEL32 ref: 000002287BC2DF51
                                                                  • WaitForMultipleObjects.KERNEL32 ref: 000002287BC2E01D
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2E05C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2E086
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$CriticalSection$Alloc$EnterRead$FreeLeaveMultipleObjectsWait$Initialize
                                                                  • String ID:
                                                                  • API String ID: 1197094596-0
                                                                  • Opcode ID: 671951f809ac83284af79a78fb7cb8fe62f641a4fc956cbe7a2945372862514e
                                                                  • Instruction ID: d8525cc5d33f39a5a2dc5980d64c8e9970a8e641406fc7991442cdb92dd7bebe
                                                                  • Opcode Fuzzy Hash: 671951f809ac83284af79a78fb7cb8fe62f641a4fc956cbe7a2945372862514e
                                                                  • Instruction Fuzzy Hash: 5641C276701B8182EB64CF62E44875EB3A1FBC9F84F549125CE8A53B48DF39C486CB00
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: memcpy
                                                                  • String ID: Unable to connect$lws_conmon_append_copy_new_dns_results
                                                                  • API String ID: 3510742995-4193639203
                                                                  • Opcode ID: 5b6b6604168f5fbc7e77e4d139dea46a732115e70d7a857e129689a9258bb8a8
                                                                  • Instruction ID: 110350aa1ecd519ad5c2a7f394ea01a1293268657ab8ab381aa379a8be36161a
                                                                  • Opcode Fuzzy Hash: 5b6b6604168f5fbc7e77e4d139dea46a732115e70d7a857e129689a9258bb8a8
                                                                  • Instruction Fuzzy Hash: ED41B076602B8092FB64CF55D1402A8B7A2FBA8B88F79C235DB5D47799DF30C892C340
                                                                  APIs
                                                                  • GetCurrentProcessId.KERNEL32 ref: 000002287BC2F134
                                                                  • ProcessIdToSessionId.KERNEL32 ref: 000002287BC2F141
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2F1F4
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2F21E
                                                                    • Part of subcall function 000002287BC170C0: GetCurrentProcessId.KERNEL32 ref: 000002287BC1713B
                                                                    • Part of subcall function 000002287BC170C0: ProcessIdToSessionId.KERNEL32 ref: 000002287BC1714B
                                                                    • Part of subcall function 000002287BC170C0: CreateToolhelp32Snapshot.KERNEL32 ref: 000002287BC17174
                                                                    • Part of subcall function 000002287BC170C0: GetProcessHeap.KERNEL32 ref: 000002287BC17183
                                                                    • Part of subcall function 000002287BC170C0: HeapAlloc.KERNEL32 ref: 000002287BC17196
                                                                    • Part of subcall function 000002287BC170C0: CloseHandle.KERNEL32 ref: 000002287BC171A7
                                                                    • Part of subcall function 000002287BC170C0: WTSGetActiveConsoleSessionId.KERNEL32 ref: 000002287BC171B6
                                                                    • Part of subcall function 000002287BC170C0: VirtualFree.KERNEL32 ref: 000002287BC17316
                                                                    • Part of subcall function 000002287BC170C0: VirtualFree.KERNEL32 ref: 000002287BC17340
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$AllocCriticalSection$Process$Free$EnterReadSession$CurrentHeapLeave$ActiveCloseConsoleCreateHandleInitializeSnapshotToolhelp32
                                                                  • String ID:
                                                                  • API String ID: 1320018004-0
                                                                  • Opcode ID: e59b582023561e424faacd75e761e69e18ae19866826c206d5164854da140dd4
                                                                  • Instruction ID: df26da33805c36c00b107b629c375f8e668f3d76d343d81f723ab34e6ac5bec7
                                                                  • Opcode Fuzzy Hash: e59b582023561e424faacd75e761e69e18ae19866826c206d5164854da140dd4
                                                                  • Instruction Fuzzy Hash: D731707A31265092FB64DF92E54865DB3A6FBC9F84F649026EA4643B48DF38C885CB00
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Free$AllocEvent
                                                                  • String ID:
                                                                  • API String ID: 2763048252-0
                                                                  • Opcode ID: 3aff6a2bc12951325e0be6d6246298fd01b4affd9be8b45f9f688c5d9c2fce65
                                                                  • Instruction ID: 2970a82a1b01d78778365b907d88c69e99798b28f34f576648fef9057ea90334
                                                                  • Opcode Fuzzy Hash: 3aff6a2bc12951325e0be6d6246298fd01b4affd9be8b45f9f688c5d9c2fce65
                                                                  • Instruction Fuzzy Hash: 2B31B639705A4091F7649F639D0C76DD2A2EBC6FD4F68C121DE1E8B794DE34C4829741
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$AllocFreeceilmemcpy
                                                                  • String ID:
                                                                  • API String ID: 941304502-0
                                                                  • Opcode ID: aa02d3703279443325f506a1bf07665e7c387f2924f8bb4d9bc78ef500e723e2
                                                                  • Instruction ID: c5092675512d2b297da0eb4c05c5f0a515d0d07046a7fe2af5cdb76a1cf2cee6
                                                                  • Opcode Fuzzy Hash: aa02d3703279443325f506a1bf07665e7c387f2924f8bb4d9bc78ef500e723e2
                                                                  • Instruction Fuzzy Hash: E021D876716A409AFB55DF7AF444259E362E7C8F88F398121EA49A7748DE34C8838B40
                                                                  APIs
                                                                  • GetCurrentProcessId.KERNEL32 ref: 000002287BC2366D
                                                                  • ProcessIdToSessionId.KERNEL32 ref: 000002287BC2367A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2370E
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC23738
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$CriticalSection$Alloc$EnterRead$FreeLeaveProcess$CurrentInitializeSession
                                                                  • String ID:
                                                                  • API String ID: 3327369976-0
                                                                  • Opcode ID: 8fe99082cdae3a9e30e841bfdc69ee1846fc745c304454db74bd1759a6bbbd42
                                                                  • Instruction ID: f51f3bb4a1ebd64c3cbc41c203f06b5d1fb4d3cbf2d9a6b5ce5e3e2d3f38c05c
                                                                  • Opcode Fuzzy Hash: 8fe99082cdae3a9e30e841bfdc69ee1846fc745c304454db74bd1759a6bbbd42
                                                                  • Instruction Fuzzy Hash: D7315A36615B409BEB24DF66E44860AB3A1F7C8B84F148126EB8A43F18DF3CD586CB00
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • CreateThread.KERNEL32 ref: 000002287BC2A812
                                                                  • CloseHandle.KERNEL32 ref: 000002287BC2A820
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2A83C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2A866
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$CriticalSection$Alloc$EnterRead$FreeLeave$CloseCreateHandleInitializeThread
                                                                  • String ID:
                                                                  • API String ID: 4031785131-0
                                                                  • Opcode ID: 104d806567fdcd85642fefcdb739ee4b48d93606346f75523f9cac813997760f
                                                                  • Instruction ID: 05d98b3bebf9e63d8130233bd060742ebe9daec8bacc78b03432664c117939de
                                                                  • Opcode Fuzzy Hash: 104d806567fdcd85642fefcdb739ee4b48d93606346f75523f9cac813997760f
                                                                  • Instruction Fuzzy Hash: A2213D65705A5082FB24CF93A55821AE7A2FBCEFD0F588029DF8A43B54DF38C1968B40
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Event$ObjectSingleWait
                                                                  • String ID:
                                                                  • API String ID: 2127046782-0
                                                                  • Opcode ID: d9cee7e685b0bc662f9006c456bafce61a487c53f32dd4a5ca0d5d6ca8d50314
                                                                  • Instruction ID: bb577847279faafab24663a60044126d338f8ac8d8fecdfc25bb8d20bb84d606
                                                                  • Opcode Fuzzy Hash: d9cee7e685b0bc662f9006c456bafce61a487c53f32dd4a5ca0d5d6ca8d50314
                                                                  • Instruction Fuzzy Hash: 7B01842671554092FBE58FAAF94C51DA7A2F7C8FD4F648012CB0E47768DE28C8869701
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Cursor$CountInfoOpenProcessTick
                                                                  • String ID:
                                                                  • API String ID: 1051838312-0
                                                                  • Opcode ID: c02446f8e49884ebd47f9a3d382b2d07e3b67b817a508dd3f35da843066d32bd
                                                                  • Instruction ID: 2da3004a99791af23041b5d351e61d6d22a1cc3f4d3255ff376f8250f18f9ed6
                                                                  • Opcode Fuzzy Hash: c02446f8e49884ebd47f9a3d382b2d07e3b67b817a508dd3f35da843066d32bd
                                                                  • Instruction Fuzzy Hash: E6F08172612A41D3F7049FB1E90C269B3A2FBD9B4DF548226D64A43254EF3CC596C740
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CancelEventReadclosesocket
                                                                  • String ID:
                                                                  • API String ID: 2025173275-0
                                                                  • Opcode ID: a39ff010f733aba4229b8f91559e7ac0612ab47a0097d267e08433f80249d3af
                                                                  • Instruction ID: f04c25fe4d3faf899549cabb22c341fe2dea13a9c255668b7e1ee0280b473d6c
                                                                  • Opcode Fuzzy Hash: a39ff010f733aba4229b8f91559e7ac0612ab47a0097d267e08433f80249d3af
                                                                  • Instruction Fuzzy Hash: 1EE0C029203A01D1FF155FF1D46C724A391ABC5F79F6887158A7A472D4DE28C4879311
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Windowlstrlen$memset$Process$ByteCharDataForegroundInputLocalMultiProcSessionTextThreadTimeWide__chkstkwsprintf
                                                                  • String ID: 0
                                                                  • API String ID: 780575994-4108050209
                                                                  • Opcode ID: 8944017d7ed3806bb4b05e2da9ce243fefa61d03cda730b77ebf3acd0b51178a
                                                                  • Instruction ID: 3059a309df146918301d6950c6b31ccb1f86aac622b3a3d423d8b02ef2d069b5
                                                                  • Opcode Fuzzy Hash: 8944017d7ed3806bb4b05e2da9ce243fefa61d03cda730b77ebf3acd0b51178a
                                                                  • Instruction Fuzzy Hash: EE21C27560668492F7108FA5F5483A9B3A2F7D9BE0F68C125EA5453698CF3CC482CB00
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLastgetpeername
                                                                  • String ID: getpeername: %s
                                                                  • API String ID: 2962421750-464625284
                                                                  • Opcode ID: 70492f69daa5a89d0d3f06da4cbe523ed641418cf23a1151e85d09f26d425933
                                                                  • Instruction ID: 449caf9024c984adb83b06987af97c3716dd5f402624ede2b1b76bf074fbc40f
                                                                  • Opcode Fuzzy Hash: 70492f69daa5a89d0d3f06da4cbe523ed641418cf23a1151e85d09f26d425933
                                                                  • Instruction Fuzzy Hash: 65F0D169305740A2FA009F96F54C2DAE362BBC9BC8FA88532DF5C47756CF38C1428A00
                                                                  APIs
                                                                    • Part of subcall function 000002287BC14570: VirtualAlloc.KERNEL32 ref: 000002287BC1458D
                                                                    • Part of subcall function 000002287BC14570: VirtualAlloc.KERNEL32 ref: 000002287BC145BF
                                                                    • Part of subcall function 000002287BC14570: InitializeCriticalSection.KERNEL32 ref: 000002287BC145D4
                                                                    • Part of subcall function 000002287BC14570: IsBadReadPtr.KERNEL32 ref: 000002287BC145F0
                                                                    • Part of subcall function 000002287BC14570: EnterCriticalSection.KERNEL32 ref: 000002287BC14603
                                                                    • Part of subcall function 000002287BC14570: VirtualAlloc.KERNEL32 ref: 000002287BC1461A
                                                                    • Part of subcall function 000002287BC14570: LeaveCriticalSection.KERNEL32 ref: 000002287BC14649
                                                                    • Part of subcall function 000002287BC14570: IsBadReadPtr.KERNEL32 ref: 000002287BC1465E
                                                                    • Part of subcall function 000002287BC14570: EnterCriticalSection.KERNEL32 ref: 000002287BC14671
                                                                    • Part of subcall function 000002287BC14570: VirtualAlloc.KERNEL32 ref: 000002287BC14688
                                                                    • Part of subcall function 000002287BC14570: LeaveCriticalSection.KERNEL32 ref: 000002287BC146B7
                                                                    • Part of subcall function 000002287BC14570: IsBadReadPtr.KERNEL32 ref: 000002287BC146CC
                                                                    • Part of subcall function 000002287BC14570: EnterCriticalSection.KERNEL32 ref: 000002287BC146DF
                                                                    • Part of subcall function 000002287BC14570: VirtualAlloc.KERNEL32 ref: 000002287BC146F6
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC23593
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC235D8
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2360E
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2361F
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$CriticalSection$Alloc$EnterRead$Leave$Free$Initialize
                                                                  • String ID:
                                                                  • API String ID: 4189992183-0
                                                                  • Opcode ID: 46fbae9de68203493fbee3f2530e2a4658fefb7301e89e69ecf3f114e9b588e7
                                                                  • Instruction ID: 940abb6ce27db7c6c896c9257734679118efa68d1c50c46631cb6ff64e69cbde
                                                                  • Opcode Fuzzy Hash: 46fbae9de68203493fbee3f2530e2a4658fefb7301e89e69ecf3f114e9b588e7
                                                                  • Instruction Fuzzy Hash: 4231B576306A405AFB558FA2E558399B7A2FBC9FC4F188025CE4647B85EF38C4928700
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1364B
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1365D
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13670
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13687
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC136B6
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC136C8
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC136DB
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC136F2
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13721
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13733
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13746
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1375D
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1378C
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1379E
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC137B4
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1C915
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1C93F
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1C955
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC1C97F
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$Virtual$Alloc$EnterRead$Leave$Free$Initialize
                                                                  • String ID:
                                                                  • API String ID: 3420869360-0
                                                                  • Opcode ID: 185be2c0cbfc7c22b00fbf48d92649722d549f69ec3c3164fd9105fdedd5f745
                                                                  • Instruction ID: 1e2f465b383302e7ffa4be84fa892de7f16278c7535cdf72da95695167c2e127
                                                                  • Opcode Fuzzy Hash: 185be2c0cbfc7c22b00fbf48d92649722d549f69ec3c3164fd9105fdedd5f745
                                                                  • Instruction Fuzzy Hash: 44417F76312B4086EB64CF63E45861AB7E5FBC9F90F158425DF8A43B14DF39C4468B00
                                                                  APIs
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1364B
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1365D
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13670
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13687
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC136B6
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC136C8
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC136DB
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC136F2
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13721
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13733
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13746
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1375D
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1378C
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1379E
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC137B4
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2862B
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC28655
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2866B
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC28695
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$Virtual$Alloc$EnterRead$Leave$Free$Initialize
                                                                  • String ID:
                                                                  • API String ID: 3420869360-0
                                                                  • Opcode ID: 149310322293b3fe42c6b3ff7dbfaeabd4d338ddb3b0be91a009c36db8032caa
                                                                  • Instruction ID: 5cda0f05f360a736b31e4d0a74c874ebbf897ca13548bc35463beacb89a31184
                                                                  • Opcode Fuzzy Hash: 149310322293b3fe42c6b3ff7dbfaeabd4d338ddb3b0be91a009c36db8032caa
                                                                  • Instruction Fuzzy Hash: DC416D36712B4086EB64DFA3E45C61AB3A5FBC9F80B598025DF8A43B14DF39D0858B04
                                                                  APIs
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC33124
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC33169
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC3319F
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC331B0
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$AllocCriticalSection$EnterFreeRead$Leave$Initialize
                                                                  • String ID:
                                                                  • API String ID: 1953590826-0
                                                                  • Opcode ID: 2d81ea38706c048f2e5f4f4a5d446c9e9cc6be0654373f3db5453061353b3bdb
                                                                  • Instruction ID: c3a01dbcfb6a38036268c8e06f4dc427e4fa5df7618343e52709add958a619ac
                                                                  • Opcode Fuzzy Hash: 2d81ea38706c048f2e5f4f4a5d446c9e9cc6be0654373f3db5453061353b3bdb
                                                                  • Instruction Fuzzy Hash: 8B319139312A4091FB54CFA3E558719B3A2EBC9FD4F588025DE1A47B58DF38C4968701
                                                                  APIs
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC27094
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC270D9
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2710F
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC27120
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$AllocCriticalSection$EnterFreeRead$Leave$Initialize
                                                                  • String ID:
                                                                  • API String ID: 1953590826-0
                                                                  • Opcode ID: 0b5870ebc01e7a7c0e19c12364db0ab6471d599442f1e369a7ada7ab57e35a22
                                                                  • Instruction ID: 0bf502fdf3489b14eaec9a16087b3a7f78fe878b0cf0519b55b2e2ae6be30544
                                                                  • Opcode Fuzzy Hash: 0b5870ebc01e7a7c0e19c12364db0ab6471d599442f1e369a7ada7ab57e35a22
                                                                  • Instruction Fuzzy Hash: 2C31A735312A4091FB54CFA7E599759A3A2EFC9FD4F18C125CE1A47B44DF38C8968740
                                                                  APIs
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC31F94
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC31FD9
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC3200F
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC32020
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$AllocCriticalSection$EnterFreeRead$Leave$Initialize
                                                                  • String ID:
                                                                  • API String ID: 1953590826-0
                                                                  • Opcode ID: c70ce8835c5477f1a9819fe4b722eec9c04bc43118f105ea714f34c0733d2822
                                                                  • Instruction ID: 510e05d4b61a6e295e5a4d48d62410b2f2af8977337c8ba81b2e756083e677e1
                                                                  • Opcode Fuzzy Hash: c70ce8835c5477f1a9819fe4b722eec9c04bc43118f105ea714f34c0733d2822
                                                                  • Instruction Fuzzy Hash: B2318D39302A4092FF548FA3E558719A3A2ABC9FD4F588125CE1A4BB88DF39C4968741
                                                                  APIs
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC305EB
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC30630
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC30666
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC30677
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$AllocCriticalSection$EnterFreeRead$Leave$Initialize
                                                                  • String ID:
                                                                  • API String ID: 1953590826-0
                                                                  • Opcode ID: 57fc5c954fd539dfa39d1df089443c9945ee205ac194f12c17d099d83254ae1e
                                                                  • Instruction ID: 24972fbb2dcb43d18aac38f2e467c64e9269bf9cd53b1b249684dccbaf6665a1
                                                                  • Opcode Fuzzy Hash: 57fc5c954fd539dfa39d1df089443c9945ee205ac194f12c17d099d83254ae1e
                                                                  • Instruction Fuzzy Hash: E131823A302A4091FB54CFA3E558729A3A2EBC9FD4F58C125CE1E47B98DF39C4968741
                                                                  APIs
                                                                  • VirtualAlloc.KERNEL32 ref: 000002287BC2A514
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134A7
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC134EF
                                                                    • Part of subcall function 000002287BC13490: InitializeCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13503
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC1351C
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1352F
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13546
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13575
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC13587
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1359A
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135B1
                                                                    • Part of subcall function 000002287BC13490: LeaveCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC135E0
                                                                    • Part of subcall function 000002287BC13490: IsBadReadPtr.KERNEL32 ref: 000002287BC135F2
                                                                    • Part of subcall function 000002287BC13490: EnterCriticalSection.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC13605
                                                                    • Part of subcall function 000002287BC13490: VirtualAlloc.KERNEL32(?,?,?,000002287BC12014), ref: 000002287BC1361C
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2A559
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2A58F
                                                                  • VirtualFree.KERNEL32 ref: 000002287BC2A5A0
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$AllocCriticalSection$EnterFreeRead$Leave$Initialize
                                                                  • String ID:
                                                                  • API String ID: 1953590826-0
                                                                  • Opcode ID: d71c6923a865d40c7d6e2f294f2fd7b1a7cdeb36ff7e7a59477494c99de26ade
                                                                  • Instruction ID: 0ba0ce91195c44d5619d68659c3d42306cf660ab48cfb80ffedb35f799f2b68b
                                                                  • Opcode Fuzzy Hash: d71c6923a865d40c7d6e2f294f2fd7b1a7cdeb36ff7e7a59477494c99de26ade
                                                                  • Instruction Fuzzy Hash: EB319535302A4192FB54CFA7E55875AA3A2EBC9FD4F188025DE1A47B58DF38C4968B40
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: Virtual$Free$lstrlen$Alloc$ByteCharMultiWidememset
                                                                  • String ID:
                                                                  • API String ID: 2589853381-0
                                                                  • Opcode ID: 9611ec3cb70565aed01a1dbbd046ff915021df47ce3a78d6dbe9877fcbb48a4b
                                                                  • Instruction ID: f01ce32342ba23bd0f3bc5439d0f372e7051856914017e2e57c3bf451c761e53
                                                                  • Opcode Fuzzy Hash: 9611ec3cb70565aed01a1dbbd046ff915021df47ce3a78d6dbe9877fcbb48a4b
                                                                  • Instruction Fuzzy Hash: 14118629312A4191FB58DFB7E55C769A392EFCDFC8F18C0259D4647B58DE39C0468B01
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$Leave$EnterRead
                                                                  • String ID:
                                                                  • API String ID: 2917996470-0
                                                                  • Opcode ID: 5fe44f807c3c7cb4d1e0cf3bd03fcfc977882a79a0ed3f1eb1ea4ee1d0148d3e
                                                                  • Instruction ID: ed618f4fad69ecbc2d5087dfa7f9a87483f4cde1dc6c6bbaeac385bb8939661e
                                                                  • Opcode Fuzzy Hash: 5fe44f807c3c7cb4d1e0cf3bd03fcfc977882a79a0ed3f1eb1ea4ee1d0148d3e
                                                                  • Instruction Fuzzy Hash: 8B113066206A40D2FF54AF62E548369B3A1FBC9F88F1D8421DF4987758CF38C4529740
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.2495709321.000002287BC01000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002287BC00000, based on PE: true
                                                                  • Associated: 00000003.00000002.2495682977.000002287BC00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495754911.000002287BC68000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495786207.000002287BC7C000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000003.00000002.2495818196.000002287BC82000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_2287bc00000_svchost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$EnterLeave
                                                                  • String ID:
                                                                  • API String ID: 3168844106-0
                                                                  • Opcode ID: 3439a903757724df9fa438759aecd9a6de92a885809b20b72485234d84bc4409
                                                                  • Instruction ID: 7872b6f954c3f352adea4d805bdbbfb891c7768d04fc0ea46cd392e72d5e4043
                                                                  • Opcode Fuzzy Hash: 3439a903757724df9fa438759aecd9a6de92a885809b20b72485234d84bc4409
                                                                  • Instruction Fuzzy Hash: FB11E929305B40D2EB149F62AD9C25DA326F7C9FD9F584021EF5A17B68CF3CC4468300