Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2024-12-10#U67e5#U9605_uninst.exe

Overview

General Information

Sample name:2024-12-10#U67e5#U9605_uninst.exe
renamed because original name is a hash value
Original sample name:2024-12-10_uninst.exe
Analysis ID:1572748
MD5:0aa972dc4d2fe4c5f9a7a9d26ea3f51f
SHA1:2e141f8072836b479572b1d7fa468727011601eb
SHA256:bb1d91e8f93a1b08b098969e48a12d2f2b8203a30de0c3d85ec8cd36a3fa8049
Tags:exeSilverFoxuser-NDA0E
Infos:

Detection

ValleyRAT
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Benign windows process drops PE files
Yara detected ValleyRAT
AI detected suspicious sample
Allocates memory in foreign processes
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Found direct / indirect Syscall (likely to bypass EDR)
Found evasive API chain checking for user administrative privileges
Hijacks the control flow in another process
Modifies the context of a thread in another process (thread injection)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to communicate with device drivers
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to create new users
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to enumerate network shares
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a process as a different user
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Tries to disable installed Antivirus / HIPS / PFW
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 2024-12-10#U67e5#U9605_uninst.exe (PID: 7324 cmdline: "C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exe" MD5: 0AA972DC4D2FE4C5F9A7A9D26EA3F51F)
    • svchost.exe (PID: 1044 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 7368 cmdline: C:\Windows\system32\svchost.exe -k netsvcs MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • dllhost.exe (PID: 7400 cmdline: C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233} MD5: 08EB78E5BE019DF044C26B14703BD1FA)
      • arphaCrashReport64.exe (PID: 7448 cmdline: "C:\Program Files\Windows Mail\arphaCrashReport64.exe" MD5: 8B5D51DF7BBD67AEB51E9B9DEE6BC84A)
      • svchost.exe (PID: 7500 cmdline: C:\Windows\system32\svchost.exe -k netsvcs MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • dllhost.exe (PID: 7532 cmdline: C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233} MD5: 08EB78E5BE019DF044C26B14703BD1FA)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: svchost.exe PID: 1044JoeSecurity_ValleyRATYara detected ValleyRATJoe Security
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule, CommandLine: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exe", ParentImage: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exe, ParentProcessId: 7324, ParentProcessName: 2024-12-10#U67e5#U9605_uninst.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule, ProcessId: 1044, ProcessName: svchost.exe
    Source: Process startedAuthor: vburov: Data: Command: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule, CommandLine: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exe", ParentImage: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exe, ParentProcessId: 7324, ParentProcessName: 2024-12-10#U67e5#U9605_uninst.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule, ProcessId: 1044, ProcessName: svchost.exe
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
    Source: C:\Windows\System32\svchost.exeDirectory created: C:\Program Files\Windows Mail\arphaCrashReport64.exeJump to behavior
    Source: C:\Windows\System32\svchost.exeDirectory created: C:\Program Files\Windows Mail\arphaDump64.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeDirectory created: C:\Program Files\Windows Mail\arphaDump64.binJump to behavior
    Source: 2024-12-10#U67e5#U9605_uninst.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: Binary string: D:\Build\PX\A\PoisonX\nvsphelperplugin64\x64\Release\arphaDump64.pdb source: 2024-12-10#U67e5#U9605_uninst.exe, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1686726549.000002C44DFF0000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000002.2919665024.0000000180001000.00000020.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2925789716.000001845BF30000.00000004.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe, 00000004.00000002.1695190285.0000000180039000.00000002.00000001.01000000.00000005.sdmp, arphaDump64.dll.1.dr
    Source: Binary string: D:\jenkins\workspace\ci.arphasdk.build\qtc_out\Release_X64\arphaCrashReport64.exe.pdb source: 2024-12-10#U67e5#U9605_uninst.exe, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1686726549.000002C44DFF0000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000002.2919665024.0000000180001000.00000020.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2925789716.000001845BF30000.00000004.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe, 00000004.00000002.1698239793.00007FF7B5E32000.00000002.00000001.01000000.00000004.sdmp, arphaCrashReport64.exe, 00000004.00000000.1687919776.00007FF7B5E32000.00000002.00000001.01000000.00000004.sdmp, arphaCrashReport64.exe.1.dr
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E6810 NetUserEnum,lstrlenW,NetApiBufferFree,malloc,VirtualFree,VirtualFree,free,VirtualFree,VirtualFree,1_2_000001845C4E6810
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180026810 NetUserEnum,lstrlenW,NetApiBufferFree,malloc,VirtualFree,VirtualFree,free,VirtualFree,VirtualFree,2_2_0000000180026810
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_0000000180026810 NetUserEnum,lstrlenW,NetApiBufferFree,malloc,VirtualFree,VirtualFree,free,VirtualFree,VirtualFree,3_2_0000000180026810
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DDDD0 malloc,memset,FindFirstFileW,free,1_2_000001845C4DDDD0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DC850 memset,lstrcatW,lstrcatW,memset,FindFirstFileW,FindNextFileW,FindNextFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,1_2_000001845C4DC850
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DE210 __chkstk,memset,memset,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,memset,lstrcatW,lstrcatW,lstrcatW,Sleep,lstrlenW,wcsstr,GetCurrentThread,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,LeaveCriticalSection,WaitForSingleObject,VirtualFree,VirtualFree,1_2_000001845C4DE210
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DCCF0 memset,memset,memset,memset,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,memset,memset,wsprintfW,wsprintfW,FindFirstFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,memset,memset,wsprintfW,FindFirstFileW,FindNextFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,memset,memset,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,FindNextFileW,FindNextFileW,lstrlenW,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,1_2_000001845C4DCCF0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018001E210 __chkstk,memset,memset,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,memset,lstrcatW,lstrcatW,lstrcatW,Sleep,lstrlenW,wcsstr,GetCurrentThread,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,LeaveCriticalSection,WaitForSingleObject,VirtualFree,VirtualFree,2_2_000000018001E210
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018001C850 memset,lstrcatW,lstrcatW,memset,FindFirstFileW,FindNextFileW,FindNextFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_000000018001C850
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018001CCF0 memset,memset,memset,memset,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,memset,memset,wsprintfW,wsprintfW,FindFirstFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,memset,memset,wsprintfW,FindFirstFileW,FindNextFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,memset,memset,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,FindNextFileW,FindNextFileW,lstrlenW,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_000000018001CCF0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018001DDD0 malloc,memset,FindFirstFileW,free,2_2_000000018001DDD0
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_000000018001E210 __chkstk,memset,memset,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,memset,lstrcatW,lstrcatW,lstrcatW,Sleep,lstrlenW,wcsstr,GetCurrentThread,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,LeaveCriticalSection,WaitForSingleObject,VirtualFree,VirtualFree,3_2_000000018001E210
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_000000018001C850 memset,lstrcatW,lstrcatW,memset,FindFirstFileW,FindNextFileW,FindNextFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000000018001C850
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_000000018001CCF0 memset,memset,memset,memset,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,memset,memset,wsprintfW,wsprintfW,FindFirstFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,memset,memset,wsprintfW,FindFirstFileW,FindNextFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,memset,memset,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,FindNextFileW,FindNextFileW,lstrlenW,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000000018001CCF0
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_000000018001DDD0 malloc,memset,FindFirstFileW,free,3_2_000000018001DDD0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4ECD30 GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,lstrcpyW,lstrcatW,1_2_000001845C4ECD30
    Source: Joe Sandbox ViewIP Address: 103.235.47.188 103.235.47.188
    Source: Joe Sandbox ViewIP Address: 103.235.47.188 103.235.47.188
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63A83D9D0 WSARecv,WSAGetLastError,0_2_00007FF63A83D9D0
    Source: global trafficDNS traffic detected: DNS query: www.baidu.com
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1686726549.000002C44DFF0000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2919665024.0000000180001000.00000020.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2925789716.000001845BF30000.00000004.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1686726549.000002C44DFF0000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2919665024.0000000180001000.00000020.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2925789716.000001845BF30000.00000004.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1686726549.000002C44DFF0000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2919665024.0000000180001000.00000020.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2925789716.000001845BF30000.00000004.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1686726549.000002C44DFF0000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2919665024.0000000180001000.00000020.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2925789716.000001845BF30000.00000004.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1686726549.000002C44DFF0000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2919665024.0000000180001000.00000020.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2925789716.000001845BF30000.00000004.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1686726549.000002C44DFF0000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2919665024.0000000180001000.00000020.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2925789716.000001845BF30000.00000004.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1686726549.000002C44DFF0000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2919665024.0000000180001000.00000020.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2925789716.000001845BF30000.00000004.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
    Source: arphaCrashReport64.exe.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1686726549.000002C44DFF0000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2919665024.0000000180001000.00000020.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2925789716.000001845BF30000.00000004.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1686726549.000002C44DFF0000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2919665024.0000000180001000.00000020.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2925789716.000001845BF30000.00000004.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe.1.drString found in binary or memory: http://ocsp.digicert.com0
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1686726549.000002C44DFF0000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2919665024.0000000180001000.00000020.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2925789716.000001845BF30000.00000004.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe.1.drString found in binary or memory: http://ocsp.digicert.com0A
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1686726549.000002C44DFF0000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2919665024.0000000180001000.00000020.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2925789716.000001845BF30000.00000004.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe.1.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1686726549.000002C44DFF0000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2919665024.0000000180001000.00000020.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2925789716.000001845BF30000.00000004.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe.1.drString found in binary or memory: http://ocsp.digicert.com0X
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1686726549.000002C44DFF0000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2919665024.0000000180001000.00000020.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2925789716.000001845BF30000.00000004.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe.1.drString found in binary or memory: http://www.digicert.com/CPS0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D97D0 EnterCriticalSection,LeaveCriticalSection,EnterCriticalSection,LeaveCriticalSection,lstrlenW,memcmp,lstrlenW,lstrlenW,lstrlenW,memcpy,OpenClipboard,CloseClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,1_2_000001845C4D97D0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D97D0 EnterCriticalSection,LeaveCriticalSection,EnterCriticalSection,LeaveCriticalSection,lstrlenW,memcmp,lstrlenW,lstrlenW,lstrlenW,memcpy,OpenClipboard,CloseClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,1_2_000001845C4D97D0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D99F0 lstrlenW,WideCharToMultiByte,VirtualAlloc,lstrlenW,lstrlenW,WideCharToMultiByte,VirtualAlloc,lstrlenW,WideCharToMultiByte,WideCharToMultiByte,lstrlenA,memcpy,OpenClipboard,EmptyClipboard,lstrlenA,GlobalAlloc,GlobalLock,lstrlenA,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,VirtualFree,VirtualFree,1_2_000001845C4D99F0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E6200 VirtualFree,VirtualFree,OpenClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,VirtualFree,VirtualFree,1_2_000001845C4E6200
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4EF1B0 OpenClipboard,Sleep,GetLastError,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,1_2_000001845C4EF1B0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018002F1B0 OpenClipboard,Sleep,GetLastError,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,2_2_000000018002F1B0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180026200 VirtualFree,VirtualFree,OpenClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,VirtualFree,VirtualFree,2_2_0000000180026200
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800197D0 EnterCriticalSection,LeaveCriticalSection,EnterCriticalSection,LeaveCriticalSection,lstrlenW,memcmp,lstrlenW,lstrlenW,lstrlenW,memcpy,OpenClipboard,CloseClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,2_2_00000001800197D0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800199F0 lstrlenW,WideCharToMultiByte,VirtualAlloc,lstrlenW,lstrlenW,WideCharToMultiByte,VirtualAlloc,lstrlenW,WideCharToMultiByte,WideCharToMultiByte,lstrlenA,memcpy,OpenClipboard,EmptyClipboard,lstrlenA,GlobalAlloc,GlobalLock,lstrlenA,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,VirtualFree,VirtualFree,2_2_00000001800199F0
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_000000018002F1B0 OpenClipboard,Sleep,GetLastError,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,3_2_000000018002F1B0
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_0000000180026200 VirtualFree,VirtualFree,OpenClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,VirtualFree,VirtualFree,3_2_0000000180026200
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_00000001800197D0 EnterCriticalSection,LeaveCriticalSection,EnterCriticalSection,LeaveCriticalSection,lstrlenW,memcmp,lstrlenW,lstrlenW,lstrlenW,memcpy,OpenClipboard,CloseClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,3_2_00000001800197D0
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_00000001800199F0 lstrlenW,WideCharToMultiByte,VirtualAlloc,lstrlenW,lstrlenW,WideCharToMultiByte,VirtualAlloc,lstrlenW,WideCharToMultiByte,WideCharToMultiByte,lstrlenA,memcpy,OpenClipboard,EmptyClipboard,lstrlenA,GlobalAlloc,GlobalLock,lstrlenA,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,VirtualFree,VirtualFree,3_2_00000001800199F0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DAC60 DefWindowProcW,SendMessageW,OpenClipboard,GetClipboardData,GlobalLock,lstrlenW,lstrlenW,lstrlenW,GlobalUnlock,CloseClipboard,VirtualFree,VirtualFree,CloseClipboard,SendMessageW,PostQuitMessage,1_2_000001845C4DAC60
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DA410 GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,1_2_000001845C4DA410
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1687293597.000002C44E45D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevicesmemstr_484d75fe-0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800080F2 VirtualAllocEx,WriteProcessMemory,memset,memcpy,NtAlpcConnectPort,0_2_00000001800080F2
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180005824 realloc,NtQuerySystemInformation,0_2_0000000180005824
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D2830 NtQuerySystemInformation,GetModuleHandleW,GetModuleHandleW,GetModuleHandleW,VirtualProtect,VirtualProtect,1_2_000001845C4D2830
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D1AE0 CreateEventW,VirtualAlloc,WaitForSingleObject,NtQuerySystemInformation,VirtualFree,VirtualAlloc,memset,NtQuerySystemInformation,lstrcmpiW,WaitForSingleObject,CloseHandle,1_2_000001845C4D1AE0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D1C70 CreateEventW,VirtualAlloc,WaitForSingleObject,NtQuerySystemInformation,VirtualFree,VirtualAlloc,memset,NtQuerySystemInformation,lstrcmpiW,WaitForSingleObject,CloseHandle,1_2_000001845C4D1C70
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180011AE0 CreateEventW,VirtualAlloc,WaitForSingleObject,NtQuerySystemInformation,VirtualFree,VirtualAlloc,memset,NtQuerySystemInformation,lstrcmpiW,WaitForSingleObject,CloseHandle,2_2_0000000180011AE0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180011C70 CreateEventW,VirtualAlloc,WaitForSingleObject,NtQuerySystemInformation,VirtualFree,VirtualAlloc,memset,NtQuerySystemInformation,lstrcmpiW,WaitForSingleObject,CloseHandle,2_2_0000000180011C70
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180012830 NtQuerySystemInformation,GetModuleHandleW,GetModuleHandleW,GetModuleHandleW,VirtualProtect,VirtualProtect,2_2_0000000180012830
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_0000000180012830 NtQuerySystemInformation,GetModuleHandleW,GetModuleHandleW,GetModuleHandleW,VirtualProtect,VirtualProtect,3_2_0000000180012830
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_0000000180011AE0 CreateEventW,VirtualAlloc,WaitForSingleObject,NtQuerySystemInformation,VirtualFree,VirtualAlloc,memset,NtQuerySystemInformation,lstrcmpiW,WaitForSingleObject,CloseHandle,3_2_0000000180011AE0
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_0000000180011C70 CreateEventW,VirtualAlloc,WaitForSingleObject,NtQuerySystemInformation,VirtualFree,VirtualAlloc,memset,NtQuerySystemInformation,lstrcmpiW,WaitForSingleObject,CloseHandle,3_2_0000000180011C70
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E05A0: CreateFileW,memset,lstrlenA,DeviceIoControl,CloseHandle,1_2_000001845C4E05A0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D5FB0 GetCurrentProcessId,TerminateThread,TerminateProcess,lstrcmpiW,Sleep,ExitThread,memset,lstrcatW,lstrcatW,memset,GetSystemDirectoryW,GetLastError,lstrcatW,lstrcatW,lstrcatW,OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,memset,wsprintfW,memset,wsprintfW,memset,wsprintfW,memset,wsprintfW,memset,wsprintfW,SetFileAttributesW,DeleteFileW,SetFileAttributesW,DeleteFileW,SetFileAttributesW,DeleteFileW,SetFileAttributesW,DeleteFileW,SetFileAttributesW,DeleteFileW,SysAllocString,Sleep,GetCurrentProcess,TerminateProcess,1_2_000001845C4D5FB0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DFF40 WTSQueryUserToken,GetLastError,DuplicateTokenEx,ConvertStringSidToSidW,GetLengthSid,SetTokenInformation,CreateEnvironmentBlock,CreateProcessAsUserW,CreateProcessAsUserW,GetLastError,CloseHandle,CloseHandle,DestroyEnvironmentBlock,CloseHandle,CloseHandle,1_2_000001845C4DFF40
    Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\Microsoft\Windows\MicrosoftEdgeUpdateJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63A9F0A200_2_00007FF63A9F0A20
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63A85ADD00_2_00007FF63A85ADD0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63A8702E60_2_00007FF63A8702E6
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63A87B9220_2_00007FF63A87B922
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63A9EE6800_2_00007FF63A9EE680
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63A8BDC360_2_00007FF63A8BDC36
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63A8C494C0_2_00007FF63A8C494C
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63A9EF9A00_2_00007FF63A9EF9A0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63AA0DE040_2_00007FF63AA0DE04
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63A886D540_2_00007FF63A886D54
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63AA0BD780_2_00007FF63AA0BD78
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63A8BBE7A0_2_00007FF63A8BBE7A
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63A8BD3CC0_2_00007FF63A8BD3CC
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63AA104200_2_00007FF63AA10420
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63A8AC4300_2_00007FF63A8AC430
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63A8A79260_2_00007FF63A8A7926
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63A8C187C0_2_00007FF63A8C187C
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63A8BA5E20_2_00007FF63A8BA5E2
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63A8C76F70_2_00007FF63A8C76F7
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800080F20_2_00000001800080F2
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800054D50_2_00000001800054D5
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800015B00_2_00000001800015B0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180009BC00_2_0000000180009BC0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800010100_2_0000000180001010
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800280380_2_0000000180028038
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018002C0800_2_000000018002C080
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800180EE0_2_00000001800180EE
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800041530_2_0000000180004153
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800021700_2_0000000180002170
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000B1AC0_2_000000018000B1AC
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800151E80_2_00000001800151E8
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800032200_2_0000000180003220
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000225E0_2_000000018000225E
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000B2800_2_000000018000B280
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000C2D00_2_000000018000C2D0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800032200_2_0000000180003220
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000435B0_2_000000018000435B
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000C3700_2_000000018000C370
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800033B80_2_00000001800033B8
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800284640_2_0000000180028464
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800034640_2_0000000180003464
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000947B0_2_000000018000947B
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800044C10_2_00000001800044C1
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800025260_2_0000000180002526
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800035300_2_0000000180003530
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800075500_2_0000000180007550
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800045A90_2_00000001800045A9
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000360B0_2_000000018000360B
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000B6200_2_000000018000B620
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800026660_2_0000000180002666
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000469C0_2_000000018000469C
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000B6C00_2_000000018000B6C0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800096E00_2_00000001800096E0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000C6F00_2_000000018000C6F0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800037170_2_0000000180003717
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800027770_2_0000000180002777
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800038330_2_0000000180003833
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800148480_2_0000000180014848
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000284D0_2_000000018000284D
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800038800_2_0000000180003880
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000290C0_2_000000018000290C
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800069E00_2_00000001800069E0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180002A060_2_0000000180002A06
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180001A100_2_0000000180001A10
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180002A190_2_0000000180002A19
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018001AA6C0_2_000000018001AA6C
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180006AB00_2_0000000180006AB0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180003AE00_2_0000000180003AE0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180023B980_2_0000000180023B98
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018001FC0C0_2_000000018001FC0C
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180002C8A0_2_0000000180002C8A
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180004CB00_2_0000000180004CB0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180003CF20_2_0000000180003CF2
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180001D600_2_0000000180001D60
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180016D880_2_0000000180016D88
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180003DBC0_2_0000000180003DBC
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180002E240_2_0000000180002E24
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180005E580_2_0000000180005E58
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180029E8C0_2_0000000180029E8C
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180024EB00_2_0000000180024EB0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000BEB00_2_000000018000BEB0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180008EC00_2_0000000180008EC0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018001FED80_2_000000018001FED8
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000DEE80_2_000000018000DEE8
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180010F180_2_0000000180010F18
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180021F440_2_0000000180021F44
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180006F700_2_0000000180006F70
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800010101_2_0000000180001010
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180001A101_2_0000000180001A10
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180001D601_2_0000000180001D60
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800038331_2_0000000180003833
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800280381_2_0000000180028038
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800148481_2_0000000180014848
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000000018000284D1_2_000000018000284D
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000000018002C0801_2_000000018002C080
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800038801_2_0000000180003880
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800180EE1_2_00000001800180EE
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800080F21_2_00000001800080F2
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000000018000290C1_2_000000018000290C
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800041531_2_0000000180004153
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800021701_2_0000000180002170
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000000018000B1AC1_2_000000018000B1AC
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800069E01_2_00000001800069E0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800151E81_2_00000001800151E8
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180002A061_2_0000000180002A06
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180002A191_2_0000000180002A19
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800032201_2_0000000180003220
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000000018000225E1_2_000000018000225E
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000000018001AA6C1_2_000000018001AA6C
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000000018000B2801_2_000000018000B280
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180006AB01_2_0000000180006AB0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000000018000C2D01_2_000000018000C2D0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180003AE01_2_0000000180003AE0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800032201_2_0000000180003220
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000000018000435B1_2_000000018000435B
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000000018000C3701_2_000000018000C370
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180023B981_2_0000000180023B98
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800033B81_2_00000001800033B8
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180009BC01_2_0000000180009BC0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000000018001FC0C1_2_000000018001FC0C
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800284641_2_0000000180028464
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800034641_2_0000000180003464
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000000018000947B1_2_000000018000947B
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180002C8A1_2_0000000180002C8A
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180004CB01_2_0000000180004CB0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800044C11_2_00000001800044C1
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800054D51_2_00000001800054D5
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180003CF21_2_0000000180003CF2
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800025261_2_0000000180002526
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800035301_2_0000000180003530
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800075501_2_0000000180007550
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180016D881_2_0000000180016D88
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800045A91_2_00000001800045A9
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800015B01_2_00000001800015B0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180003DBC1_2_0000000180003DBC
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000000018000360B1_2_000000018000360B
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000000018000B6201_2_000000018000B620
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180002E241_2_0000000180002E24
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180005E581_2_0000000180005E58
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800026661_2_0000000180002666
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180029E8C1_2_0000000180029E8C
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000000018000469C1_2_000000018000469C
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180024EB01_2_0000000180024EB0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000000018000BEB01_2_000000018000BEB0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000000018000B6C01_2_000000018000B6C0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180008EC01_2_0000000180008EC0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000000018001FED81_2_000000018001FED8
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800096E01_2_00000001800096E0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000000018000DEE81_2_000000018000DEE8
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000000018000C6F01_2_000000018000C6F0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800037171_2_0000000180003717
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180010F181_2_0000000180010F18
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180021F441_2_0000000180021F44
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180006F701_2_0000000180006F70
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800027771_2_0000000180002777
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF374F21_2_000001845BF374F2
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF474EE1_2_000001845BF474EE
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF5B4801_2_000001845BF5B480
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF32C801_2_000001845BF32C80
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF43C481_2_000001845BF43C48
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF31C4D1_2_000001845BF31C4D
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF574381_2_000001845BF57438
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF32C331_2_000001845BF32C33
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF304101_2_000001845BF30410
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF31B771_2_000001845BF31B77
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF363701_2_000001845BF36370
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF513441_2_000001845BF51344
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF32B171_2_000001845BF32B17
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF403181_2_000001845BF40318
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF3D2E81_2_000001845BF3D2E8
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF3BAF01_2_000001845BF3BAF0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF4F2D81_2_000001845BF4F2D8
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF38AE01_2_000001845BF38AE0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF382C01_2_000001845BF382C0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF3AAC01_2_000001845BF3AAC0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF542B01_2_000001845BF542B0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF3B2B01_2_000001845BF3B2B0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF33A9C1_2_000001845BF33A9C
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF5928C1_2_000001845BF5928C
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF31A661_2_000001845BF31A66
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF352581_2_000001845BF35258
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF322241_2_000001845BF32224
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF3AA201_2_000001845BF3AA20
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF32A0B1_2_000001845BF32A0B
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF331BC1_2_000001845BF331BC
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF339A91_2_000001845BF339A9
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF309B01_2_000001845BF309B0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF461881_2_000001845BF46188
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF311601_2_000001845BF31160
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF369501_2_000001845BF36950
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF319261_2_000001845BF31926
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF329301_2_000001845BF32930
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF330F21_2_000001845BF330F2
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF348D51_2_000001845BF348D5
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF338C11_2_000001845BF338C1
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF340B01_2_000001845BF340B0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF3208A1_2_000001845BF3208A
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF3887B1_2_000001845BF3887B
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF328641_2_000001845BF32864
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF578641_2_000001845BF57864
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF4F00C1_2_000001845BF4F00C
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF327B81_2_000001845BF327B8
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF38FC01_2_000001845BF38FC0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF52F981_2_000001845BF52F98
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF3B7701_2_000001845BF3B770
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF3375B1_2_000001845BF3375B
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF326201_2_000001845BF32620
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF32EE01_2_000001845BF32EE0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF3B6D01_2_000001845BF3B6D0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF35EB01_2_000001845BF35EB0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF3A6801_2_000001845BF3A680
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF49E6C1_2_000001845BF49E6C
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF3165E1_2_000001845BF3165E
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF31E191_2_000001845BF31E19
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF326201_2_000001845BF32620
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF31E061_2_000001845BF31E06
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF30E101_2_000001845BF30E10
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF445E81_2_000001845BF445E8
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF35DE01_2_000001845BF35DE0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF3A5AC1_2_000001845BF3A5AC
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF315701_2_000001845BF31570
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF335531_2_000001845BF33553
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845BF31D0C1_2_000001845BF31D0C
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E06801_2_000001845C4E0680
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D21401_2_000001845C4D2140
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DF9E01_2_000001845C4DF9E0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4CED501_2_000001845C4CED50
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DE5501_2_000001845C4DE550
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C6D441_2_000001845C4C6D44
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C656A1_2_000001845C4C656A
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C1D801_2_000001845C4C1D80
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E65301_2_000001845C4E6530
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4EAD301_2_000001845C4EAD30
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4F8D241_2_000001845C4F8D24
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C75D21_2_000001845C4C75D2
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4CF5E01_2_000001845C4CF5E0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4CC5F01_2_000001845C4CC5F0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4CEDF01_2_000001845C4CEDF0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4FDE001_2_000001845C4FDE00
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E4D901_2_000001845C4E4D90
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E55901_2_000001845C4E5590
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C95881_2_000001845C4C9588
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C2D8A1_2_000001845C4C2D8A
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C7DA11_2_000001845C4C7DA1
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D8DA01_2_000001845C4D8DA0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DB5A01_2_000001845C4DB5A0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4EBDC01_2_000001845C4EBDC0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4F664B1_2_000001845C4F664B
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4F26601_2_000001845C4F2660
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C5166701_2_000001845C516670
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C6E101_2_000001845C4C6E10
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4CCE101_2_000001845C4CCE10
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D3E101_2_000001845C4D3E10
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E9E101_2_000001845C4E9E10
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C5E061_2_000001845C4C5E06
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4CFE201_2_000001845C4CFE20
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C16301_2_000001845C4C1630
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D66301_2_000001845C4D6630
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DAE401_2_000001845C4DAE40
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C3EC71_2_000001845C4C3EC7
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D76E01_2_000001845C4D76E0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C6EEB1_2_000001845C4C6EEB
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E47001_2_000001845C4E4700
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C7E891_2_000001845C4C7E89
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4CA6A01_2_000001845C4CA6A0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C769C1_2_000001845C4C769C
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C519E901_2_000001845C519E90
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D9EC01_2_000001845C4D9EC0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C5F461_2_000001845C4C5F46
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D6F601_2_000001845C4D6F60
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4F37601_2_000001845C4F3760
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4F6F5F1_2_000001845C4F6F5F
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C176F1_2_000001845C4C176F
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D87801_2_000001845C4D8780
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E1F801_2_000001845C4E1F80
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C7F7C1_2_000001845C4C7F7C
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DF7101_2_000001845C4DF710
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C67041_2_000001845C4C6704
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C271A1_2_000001845C4C271A
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4EA7F01_2_000001845C4EA7F0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C6FF71_2_000001845C4C6FF7
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C1F881_2_000001845C4C1F88
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D7FA01_2_000001845C4D7FA0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4F4FA01_2_000001845C4F4FA0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D5FB01_2_000001845C4D5FB0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DEFC01_2_000001845C4DEFC0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E4FC01_2_000001845C4E4FC0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E57C01_2_000001845C4E57C0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4F67B81_2_000001845C4F67B8
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C4FB51_2_000001845C4C4FB5
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DC8501_2_000001845C4DC850
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C60571_2_000001845C4C6057
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C10701_2_000001845C4C1070
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E78701_2_000001845C4E7870
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E88801_2_000001845C4E8880
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4EE0101_2_000001845C4EE010
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4F08101_2_000001845C4F0810
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4CB8221_2_000001845C4CB822
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D38D01_2_000001845C4D38D0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C20C71_2_000001845C4C20C7
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4CE8DC1_2_000001845C4CE8DC
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4EF8901_2_000001845C4EF890
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4FA8BC1_2_000001845C4FA8BC
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D51501_2_000001845C4D5150
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C71601_2_000001845C4C7160
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C29711_2_000001845C4C2971
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D11801_2_000001845C4D1180
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C517C1_2_000001845C4C517C
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C517A1_2_000001845C4C517A
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4CA1101_2_000001845C4CA110
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C71131_2_000001845C4C7113
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E49301_2_000001845C4E4930
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C612D1_2_000001845C4C612D
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C5041401_2_000001845C504140
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4CA1E01_2_000001845C4CA1E0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D99F01_2_000001845C4D99F0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C61EC1_2_000001845C4C61EC
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4CFA001_2_000001845C4CFA00
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D91901_2_000001845C4D9190
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DA1901_2_000001845C4DA190
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C219F1_2_000001845C4C219F
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4CE9B01_2_000001845C4CE9B0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C5A501_2_000001845C4C5A50
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4F12701_2_000001845C4F1270
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C12641_2_000001845C4C1264
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C227C1_2_000001845C4C227C
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E1A101_2_000001845C4E1A10
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E5A101_2_000001845C4E5A10
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D82301_2_000001845C4D8230
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C3A321_2_000001845C4C3A32
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4EAA301_2_000001845C4EAA30
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C7A331_2_000001845C4C7A33
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DEA401_2_000001845C4DEA40
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DAAD01_2_000001845C4DAAD0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4EB2D01_2_000001845C4EB2D0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4F5AD01_2_000001845C4F5AD0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4CD2F01_2_000001845C4CD2F0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C62E61_2_000001845C4C62E6
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C33001_2_000001845C4C3300
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C6B001_2_000001845C4C6B00
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E93001_2_000001845C4E9300
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C62F91_2_000001845C4C62F9
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E72901_2_000001845C4E7290
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4CFAA01_2_000001845C4CFAA0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C4A981_2_000001845C4C4A98
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D2B501_2_000001845C4D2B50
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E4B601_2_000001845C4E4B60
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E53401_2_000001845C4E5340
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C5B3E1_2_000001845C4C5B3E
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D73D01_2_000001845C4D73D0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C83E01_2_000001845C4C83E0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C2BD61_2_000001845C4C2BD6
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C13F71_2_000001845C4C13F7
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4CCBAB1_2_000001845C4CCBAB
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C73C01_2_000001845C4C73C0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E3BC01_2_000001845C4E3BC0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4EFC4B1_2_000001845C4EFC4B
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4EFC5D1_2_000001845C4EFC5D
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4EFC541_2_000001845C4EFC54
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C34701_2_000001845C4C3470
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E34641_2_000001845C4E3464
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4CAC801_2_000001845C4CAC80
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D44101_2_000001845C4D4410
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C8C051_2_000001845C4C8C05
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C6B001_2_000001845C4C6B00
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DD4201_2_000001845C4DD420
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4F0C201_2_000001845C4F0C20
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4EFC301_2_000001845C4EFC30
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4EFC271_2_000001845C4EFC27
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4EFC421_2_000001845C4EFC42
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4EFC391_2_000001845C4EFC39
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C7C3B1_2_000001845C4C7C3B
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C2CD21_2_000001845C4C2CD2
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C54E01_2_000001845C4C54E0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E24E01_2_000001845C4E24E0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DCCF01_2_000001845C4DCCF0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4F34F01_2_000001845C4F34F0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E5C901_2_000001845C4E5C90
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4F5C901_2_000001845C4F5C90
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4F6C9E1_2_000001845C4F6C9E
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C6C981_2_000001845C4C6C98
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D9CB01_2_000001845C4D9CB0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E44B01_2_000001845C4E44B0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4C3CA61_2_000001845C4C3CA6
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800121402_2_0000000180012140
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800151502_2_0000000180015150
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800224E02_2_00000001800224E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800206802_2_0000000180020680
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800176E02_2_00000001800176E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018001F9E02_2_000000018001F9E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018001AAD02_2_000000018001AAD0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180013E102_2_0000000180013E10
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180006FF72_2_0000000180006FF7
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018002E0102_2_000000018002E010
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800060572_2_0000000180006057
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800010702_2_0000000180001070
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800020C72_2_00000001800020C7
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000A1102_2_000000018000A110
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800071132_2_0000000180007113
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000612D2_2_000000018000612D
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800441402_2_0000000180044140
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800071602_2_0000000180007160
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000517A2_2_000000018000517A
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000517C2_2_000000018000517C
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800111802_2_0000000180011180
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018001A1902_2_000000018001A190
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800191902_2_0000000180019190
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000219F2_2_000000018000219F
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000A1E02_2_000000018000A1E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800061EC2_2_00000001800061EC
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800182302_2_0000000180018230
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800012642_2_0000000180001264
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800312702_2_0000000180031270
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000227C2_2_000000018000227C
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800272902_2_0000000180027290
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018002B2D02_2_000000018002B2D0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800642E02_2_00000001800642E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800062E62_2_00000001800062E6
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000D2F02_2_000000018000D2F0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800062F92_2_00000001800062F9
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800293002_2_0000000180029300
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800033002_2_0000000180003300
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800623272_2_0000000180062327
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800253402_2_0000000180025340
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018005B3802_2_000000018005B380
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800073C02_2_00000001800073C0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800173D02_2_00000001800173D0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800083E02_2_00000001800083E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800013F72_2_00000001800013F7
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018004C4102_2_000000018004C410
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800144102_2_0000000180014410
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018001D4202_2_000000018001D420
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800234642_2_0000000180023464
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800034702_2_0000000180003470
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800244B02_2_00000001800244B0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800054E02_2_00000001800054E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800334F02_2_00000001800334F0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800265302_2_0000000180026530
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018001E5502_2_000000018001E550
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000656A2_2_000000018000656A
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800095882_2_0000000180009588
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800255902_2_0000000180025590
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018001B5A02_2_000000018001B5A0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800075D22_2_00000001800075D2
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000F5E02_2_000000018000F5E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000C5F02_2_000000018000C5F0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800166302_2_0000000180016630
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800016302_2_0000000180001630
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018003664B2_2_000000018003664B
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800326602_2_0000000180032660
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800566702_2_0000000180056670
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000769C2_2_000000018000769C
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000A6A02_2_000000018000A6A0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800486E02_2_00000001800486E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800247002_2_0000000180024700
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800067042_2_0000000180006704
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018001F7102_2_000000018001F710
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000271A2_2_000000018000271A
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800337602_2_0000000180033760
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800637702_2_0000000180063770
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000176F2_2_000000018000176F
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800187802_2_0000000180018780
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800527902_2_0000000180052790
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800367B82_2_00000001800367B8
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800257C02_2_00000001800257C0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018002A7F02_2_000000018002A7F0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800308102_2_0000000180030810
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000B8222_2_000000018000B822
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018001C8502_2_000000018001C850
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800278702_2_0000000180027870
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800288802_2_0000000180028880
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018002F8902_2_000000018002F890
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018003A8BC2_2_000000018003A8BC
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800138D02_2_00000001800138D0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000E8DC2_2_000000018000E8DC
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800249302_2_0000000180024930
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800029712_2_0000000180002971
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000E9B02_2_000000018000E9B0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800199F02_2_00000001800199F0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180053A002_2_0000000180053A00
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000FA002_2_000000018000FA00
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180021A102_2_0000000180021A10
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180025A102_2_0000000180025A10
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018002AA302_2_000000018002AA30
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180003A322_2_0000000180003A32
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180007A332_2_0000000180007A33
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018001EA402_2_000000018001EA40
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180005A502_2_0000000180005A50
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180004A982_2_0000000180004A98
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000FAA02_2_000000018000FAA0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180035AD02_2_0000000180035AD0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180006B002_2_0000000180006B00
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180005B3E2_2_0000000180005B3E
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180012B502_2_0000000180012B50
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180024B602_2_0000000180024B60
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000CBAB2_2_000000018000CBAB
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180023BC02_2_0000000180023BC0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180002BD62_2_0000000180002BD6
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180008C052_2_0000000180008C05
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180030C202_2_0000000180030C20
    Source: Joe Sandbox ViewDropped File: C:\Program Files\Windows Mail\arphaCrashReport64.exe E743E8FAC075A379161E1736388451E0AF0FDE7DA595EA9D15EEB5140E3E8271
    Source: C:\Windows\System32\svchost.exeCode function: String function: 0000000180044F40 appears 61 times
    Source: C:\Windows\System32\svchost.exeCode function: String function: 0000000180041800 appears 91 times
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: String function: 00007FF63A826BB0 appears 64 times
    Source: C:\Windows\System32\dllhost.exeCode function: String function: 0000000180044F40 appears 61 times
    Source: C:\Windows\System32\dllhost.exeCode function: String function: 0000000180041800 appears 91 times
    Source: 2024-12-10#U67e5#U9605_uninst.exeBinary or memory string: OriginalFilename vs 2024-12-10#U67e5#U9605_uninst.exe
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1686726549.000002C44DFF0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamearphaCrashReport.exe2 vs 2024-12-10#U67e5#U9605_uninst.exe
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamearphaCrashReport.exe2 vs 2024-12-10#U67e5#U9605_uninst.exe
    Source: classification engineClassification label: mal92.troj.evad.winEXE@11/5@1/2
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E0680 VirtualAlloc,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualAlloc,InitializeCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,1_2_000001845C4E0680
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DFD10 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,OpenProcess,GetLastError,1_2_000001845C4DFD10
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4ECE70 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,memset,OpenProcess,K32EnumProcessModules,K32GetProcessImageFileNameW,lstrcpyW,CloseHandle,1_2_000001845C4ECE70
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E7870 memset,lstrlenW,lstrlenW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetExtendedUdpTable,VirtualAlloc,GetExtendedUdpTable,VirtualFree,memset,lstrlenW,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,lstrlenA,memset,lstrlenW,VirtualFree,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,1_2_000001845C4E7870
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E9A70 memset,memset,VirtualFree,VirtualFree,GetModuleHandleW,GetProcAddress,GetProcAddress,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,OpenProcess,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,TerminateProcess,Sleep,DeleteFileW,lstrcpyW,lstrcatW,TerminateProcess,CloseHandle,Sleep,1_2_000001845C4E9A70
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E9300 __chkstk,memset,memset,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CreateToolhelp32Snapshot,Process32FirstW,OpenProcess,memset,lstrcpyW,GetPriorityClass,memset,memset,OpenProcessToken,GetTokenInformation,GlobalAlloc,GetTokenInformation,LookupAccountSidW,LookupAccountSidW,lstrcpyW,GlobalFree,CloseHandle,ProcessIdToSessionId,K32GetProcessMemoryInfo,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,CreateFileW,GetFileSize,CloseHandle,lstrcpyW,lstrcatW,CloseHandle,Process32NextW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,1_2_000001845C4E9300
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E7290 memset,lstrlenW,lstrlenW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetExtendedTcpTable,VirtualAlloc,GetExtendedTcpTable,VirtualFree,memset,lstrlenW,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,memset,lstrlenW,VirtualFree,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,1_2_000001845C4E7290
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E0480 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualAlloc,GetLastError,memcpy,1_2_000001845C4E0480
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180020680 VirtualAlloc,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualAlloc,InitializeCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,2_2_0000000180020680
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180027290 memset,lstrlenW,lstrlenW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetExtendedTcpTable,VirtualAlloc,GetExtendedTcpTable,VirtualFree,memset,lstrlenW,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,memset,lstrlenW,VirtualFree,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_0000000180027290
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180029300 __chkstk,memset,memset,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CreateToolhelp32Snapshot,Process32FirstW,OpenProcess,memset,lstrcpyW,GetPriorityClass,memset,memset,OpenProcessToken,GetTokenInformation,GlobalAlloc,GetTokenInformation,LookupAccountSidW,LookupAccountSidW,lstrcpyW,GlobalFree,CloseHandle,ProcessIdToSessionId,K32GetProcessMemoryInfo,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,CreateFileW,GetFileSize,CloseHandle,lstrcpyW,lstrcatW,CloseHandle,Process32NextW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_0000000180029300
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180020480 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualAlloc,GetLastError,memcpy,2_2_0000000180020480
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180027870 memset,lstrlenW,lstrlenW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetExtendedUdpTable,VirtualAlloc,GetExtendedUdpTable,VirtualFree,memset,lstrlenW,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,lstrlenA,memset,lstrlenW,VirtualFree,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_0000000180027870
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180029A70 memset,memset,VirtualFree,VirtualFree,GetModuleHandleW,GetProcAddress,GetProcAddress,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,OpenProcess,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,TerminateProcess,Sleep,DeleteFileW,lstrcpyW,lstrcatW,TerminateProcess,CloseHandle,Sleep,2_2_0000000180029A70
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018001FD10 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,OpenProcess,GetLastError,2_2_000000018001FD10
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018002CE70 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,memset,OpenProcess,K32EnumProcessModules,K32GetProcessImageFileNameW,lstrcpyW,CloseHandle,2_2_000000018002CE70
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_0000000180027290 memset,lstrlenW,lstrlenW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetExtendedTcpTable,VirtualAlloc,GetExtendedTcpTable,VirtualFree,memset,lstrlenW,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,memset,lstrlenW,VirtualFree,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_0000000180027290
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_0000000180029300 __chkstk,memset,memset,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CreateToolhelp32Snapshot,Process32FirstW,OpenProcess,memset,lstrcpyW,GetPriorityClass,memset,memset,OpenProcessToken,GetTokenInformation,GlobalAlloc,GetTokenInformation,LookupAccountSidW,LookupAccountSidW,lstrcpyW,GlobalFree,CloseHandle,ProcessIdToSessionId,K32GetProcessMemoryInfo,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,CreateFileW,GetFileSize,CloseHandle,lstrcpyW,lstrcatW,CloseHandle,Process32NextW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_0000000180029300
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_0000000180020480 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualAlloc,GetLastError,memcpy,3_2_0000000180020480
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_0000000180020680 VirtualAlloc,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualAlloc,InitializeCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,3_2_0000000180020680
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_0000000180027870 memset,lstrlenW,lstrlenW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetExtendedUdpTable,VirtualAlloc,GetExtendedUdpTable,VirtualFree,memset,lstrlenW,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,lstrlenA,memset,lstrlenW,VirtualFree,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_0000000180027870
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_0000000180029A70 memset,memset,VirtualFree,VirtualFree,GetModuleHandleW,GetProcAddress,GetProcAddress,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,OpenProcess,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,TerminateProcess,Sleep,DeleteFileW,lstrcpyW,lstrcatW,TerminateProcess,CloseHandle,Sleep,3_2_0000000180029A70
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_000000018001FD10 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,OpenProcess,GetLastError,3_2_000000018001FD10
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_000000018002CE70 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,memset,OpenProcess,K32EnumProcessModules,K32GetProcessImageFileNameW,lstrcpyW,CloseHandle,3_2_000000018002CE70
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DC4E0 memset,memset,memset,QueryDosDeviceW,GetDriveTypeW,lstrlenW,GetVolumeInformationW,lstrlenW,GetDiskFreeSpaceExW,1_2_000001845C4DC4E0
    Source: C:\Windows\System32\svchost.exeCode function: memset,lstrcatW,memset,GetWindowsDirectoryW,GetLastError,lstrcatW,OpenSCManagerW,GetLastError,CreateServiceW,GetLastError,CloseServiceHandle,GetLastError,StartServiceW,CloseServiceHandle,CloseServiceHandle,1_2_000001845C4E63C0
    Source: C:\Windows\System32\svchost.exeCode function: memset,lstrcatW,memset,GetWindowsDirectoryW,GetLastError,lstrcatW,OpenSCManagerW,GetLastError,CreateServiceW,GetLastError,CloseServiceHandle,GetLastError,StartServiceW,CloseServiceHandle,CloseServiceHandle,2_2_00000001800263C0
    Source: C:\Windows\System32\dllhost.exeCode function: memset,lstrcatW,memset,GetWindowsDirectoryW,GetLastError,lstrcatW,OpenSCManagerW,GetLastError,CreateServiceW,GetLastError,CloseServiceHandle,GetLastError,StartServiceW,CloseServiceHandle,CloseServiceHandle,3_2_00000001800263C0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4EC950 memset,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,1_2_000001845C4EC950
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180001A10 CoInitialize,CLSIDFromString,IIDFromString,CoCreateInstance,0_2_0000000180001A10
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63A844810 LoadResource,LockResource,SizeofResource,0_2_00007FF63A844810
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D2140 WSAStartup,GetCommandLineW,CommandLineToArgvW,VirtualAlloc,InitializeCriticalSection,VirtualAlloc,InitializeCriticalSection,memset,GetCurrentProcessId,lstrcmpiW,lstrcmpiW,ExitThread,lstrcmpiW,GetCurrentProcess,TerminateProcess,lstrcmpiW,GetCurrentProcessId,OpenProcess,TerminateProcess,CloseHandle,WaitForSingleObject,GetExitCodeProcess,Sleep,CreateThread,WaitForSingleObject,CloseHandle,memset,GetModuleFileNameW,wcsstr,GetNativeSystemInfo,ExitProcess,memset,GetModuleFileNameW,IsUserAnAdmin,memset,wsprintfW,OpenSCManagerW,GetLastError,OpenServiceW,ChangeServiceConfig2W,GetLastError,CloseServiceHandle,CloseServiceHandle,lstrcmpiW,lstrcmpiW,GetNativeSystemInfo,ExitProcess,GetCurrentProcess,TerminateProcess,1_2_000001845C4D2140
    Source: C:\Windows\System32\svchost.exeFile created: C:\Program Files\Windows Mail\arphaCrashReport64.exeJump to behavior
    Source: 2024-12-10#U67e5#U9605_uninst.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeSystem information queried: HandleInformationJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: svchost.exeString found in binary or memory: \\.\{F8284233-48F4-4680-ADDD-F8284233}
    Source: svchost.exeString found in binary or memory: /Processid:{F8284233-48F4-4680-ADDD-F8284233}
    Source: svchost.exeString found in binary or memory: /Processid:{F8284233-48F4-4680-ADDD-F8284233}
    Source: svchost.exeString found in binary or memory: \\.\{F8284233-48F4-4680-ADDD-F8284233}
    Source: dllhost.exeString found in binary or memory: /Processid:{F8284233-48F4-4680-ADDD-F8284233}
    Source: dllhost.exeString found in binary or memory: \\.\{F8284233-48F4-4680-ADDD-F8284233}
    Source: unknownProcess created: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exe "C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exe"
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Mail\arphaCrashReport64.exe "C:\Program Files\Windows Mail\arphaCrashReport64.exe"
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcsJump to behavior
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Mail\arphaCrashReport64.exe "C:\Program Files\Windows Mail\arphaCrashReport64.exe"Jump to behavior
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcsJump to behavior
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}Jump to behavior
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}Jump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: taskschd.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: fwpolicyiomgr.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: wtsapi32.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: fwpolicyiomgr.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: napinsp.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: wshbth.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: winrnr.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: devenum.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: msdmo.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: wtsapi32.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: firewallapi.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: fwbase.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: fwpolicyiomgr.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: arphadump64.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: wtsapi32.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: firewallapi.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: fwbase.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: fwpolicyiomgr.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: wtsapi32.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: fwpolicyiomgr.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: napinsp.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: wshbth.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: winrnr.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: devenum.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: msdmo.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: wtsapi32.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: firewallapi.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: fwbase.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: fwpolicyiomgr.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E2B3C97F-6AE1-41AC-817A-F6F92166D7DD}\InprocServer32Jump to behavior
    Source: C:\Windows\System32\svchost.exeDirectory created: C:\Program Files\Windows Mail\arphaCrashReport64.exeJump to behavior
    Source: C:\Windows\System32\svchost.exeDirectory created: C:\Program Files\Windows Mail\arphaDump64.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeDirectory created: C:\Program Files\Windows Mail\arphaDump64.binJump to behavior
    Source: 2024-12-10#U67e5#U9605_uninst.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
    Source: 2024-12-10#U67e5#U9605_uninst.exeStatic PE information: Image base 0x140000000 > 0x60000000
    Source: 2024-12-10#U67e5#U9605_uninst.exeStatic file information: File size 2319360 > 1048576
    Source: 2024-12-10#U67e5#U9605_uninst.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x1fde00
    Source: 2024-12-10#U67e5#U9605_uninst.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: 2024-12-10#U67e5#U9605_uninst.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: D:\Build\PX\A\PoisonX\nvsphelperplugin64\x64\Release\arphaDump64.pdb source: 2024-12-10#U67e5#U9605_uninst.exe, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1686726549.000002C44DFF0000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000002.2919665024.0000000180001000.00000020.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2925789716.000001845BF30000.00000004.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe, 00000004.00000002.1695190285.0000000180039000.00000002.00000001.01000000.00000005.sdmp, arphaDump64.dll.1.dr
    Source: Binary string: D:\jenkins\workspace\ci.arphasdk.build\qtc_out\Release_X64\arphaCrashReport64.exe.pdb source: 2024-12-10#U67e5#U9605_uninst.exe, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1686726549.000002C44DFF0000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000002.2919665024.0000000180001000.00000020.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2925789716.000001845BF30000.00000004.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe, 00000004.00000002.1698239793.00007FF7B5E32000.00000002.00000001.01000000.00000004.sdmp, arphaCrashReport64.exe, 00000004.00000000.1687919776.00007FF7B5E32000.00000002.00000001.01000000.00000004.sdmp, arphaCrashReport64.exe.1.dr
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E4080 VirtualAlloc,LoadLibraryW,GetProcAddress,FreeLibrary,1_2_000001845C4E4080
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63A8C7CA5 push rdi; retf 0_2_00007FF63A8C7CA6
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63A8C8B14 push rax; ret 0_2_00007FF63A8C8B15
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63A8C8379 push rbx; ret 0_2_00007FF63A8C837A
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63A8C755A push rbx; retf 0_2_00007FF63A8C7560
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DC3E0 push rcx; ret 1_2_000001845C4DC3E1
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018001C3E0 push rcx; ret 2_2_000000018001C3E1
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800619F7 push FF491775h; ret 2_2_00000001800619FC
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_000000018001C3E0 push rcx; ret 3_2_000000018001C3E1
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_00000001800619F7 push FF491775h; ret 3_2_00000001800619FC
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E30FE VirtualFree,VirtualFree,malloc,malloc,VirtualFree,VirtualFree,NetUserAdd,Sleep,NetLocalGroupAddMembers,free,free,1_2_000001845C4E30FE
    Source: C:\Windows\System32\svchost.exeFile created: C:\Program Files\Windows Mail\arphaCrashReport64.exeJump to dropped file
    Source: C:\Windows\System32\svchost.exeFile created: C:\Program Files\Windows Mail\arphaDump64.dllJump to dropped file
    Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\Microsoft\Windows\MicrosoftEdgeUpdateJump to behavior
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4ED060 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,StartServiceW,GetLastError,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,1_2_000001845C4ED060
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DBFC0 OpenEventLogW,ClearEventLogW,CloseEventLog,OpenEventLogW,ClearEventLogW,CloseEventLog,OpenEventLogW,ClearEventLogW,CloseEventLog,OpenEventLogW,ClearEventLogW,CloseEventLog,1_2_000001845C4DBFC0
    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Windows\System32\dllhost.exeCheck user administrative privileges: IsUserAndAdmin, DecisionNode
    Source: C:\Windows\System32\svchost.exeCheck user administrative privileges: IsUserAndAdmin, DecisionNode
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCheck user administrative privileges: IsUserAndAdmin, DecisionNodegraph_0-49548
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D6F60 GetCurrentProcessId,ProcessIdToSessionId,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,CloseHandle,WTSGetActiveConsoleSessionId,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,CreateThread,VirtualFree,VirtualFree,VirtualFree,VirtualFree,1_2_000001845C4D6F60
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: malloc,memcpy,malloc,memset,memcpy,memset,GetModuleFileNameW,malloc,memset,memcpy,OpenSCManagerW,EnumServicesStatusExW,malloc,memset,EnumServicesStatusExW,CloseServiceHandle,free,CloseServiceHandle,lstrcmpiW,free,0_2_00000001800015B0
    Source: C:\Windows\System32\svchost.exeCode function: malloc,memcpy,malloc,memset,memcpy,memset,GetModuleFileNameW,malloc,memset,memcpy,OpenSCManagerW,EnumServicesStatusExW,malloc,memset,EnumServicesStatusExW,CloseServiceHandle,free,CloseServiceHandle,lstrcmpiW,free,1_2_00000001800015B0
    Source: C:\Windows\System32\svchost.exeCode function: OpenSCManagerW,EnumServicesStatusExW,malloc,memset,EnumServicesStatusExW,CloseServiceHandle,free,CloseServiceHandle,lstrcmpiW,free,1_2_000001845C4ED140
    Source: C:\Windows\System32\svchost.exeCode function: OpenSCManagerW,EnumServicesStatusW,LocalAlloc,EnumServicesStatusW,memset,OpenServiceW,lstrlenW,memcpy,lstrlenW,memcpy,VirtualAlloc,QueryServiceConfig2W,lstrlenW,memcpy,lstrcpyW,VirtualAlloc,QueryServiceConfigW,lstrcpyW,lstrlenW,memcpy,lstrlenW,memcpy,lstrlenW,memcpy,CloseServiceHandle,VirtualFree,VirtualFree,CloseServiceHandle,LocalFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,1_2_000001845C4EF890
    Source: C:\Windows\System32\svchost.exeCode function: OpenSCManagerW,EnumServicesStatusExW,malloc,memset,EnumServicesStatusExW,CloseServiceHandle,free,CloseServiceHandle,lstrcmpiW,free,2_2_000000018002D140
    Source: C:\Windows\System32\svchost.exeCode function: OpenSCManagerW,EnumServicesStatusW,LocalAlloc,EnumServicesStatusW,memset,OpenServiceW,lstrlenW,memcpy,lstrlenW,memcpy,VirtualAlloc,QueryServiceConfig2W,lstrlenW,memcpy,lstrcpyW,VirtualAlloc,QueryServiceConfigW,lstrcpyW,lstrlenW,memcpy,lstrlenW,memcpy,lstrlenW,memcpy,CloseServiceHandle,VirtualFree,VirtualFree,CloseServiceHandle,LocalFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_000000018002F890
    Source: C:\Windows\System32\dllhost.exeCode function: OpenSCManagerW,EnumServicesStatusExW,malloc,memset,EnumServicesStatusExW,CloseServiceHandle,free,CloseServiceHandle,lstrcmpiW,free,3_2_000000018002D140
    Source: C:\Windows\System32\dllhost.exeCode function: OpenSCManagerW,EnumServicesStatusW,LocalAlloc,EnumServicesStatusW,memset,OpenServiceW,lstrlenW,memcpy,lstrlenW,memcpy,VirtualAlloc,QueryServiceConfig2W,lstrlenW,memcpy,lstrcpyW,VirtualAlloc,QueryServiceConfigW,lstrcpyW,lstrlenW,memcpy,lstrlenW,memcpy,lstrlenW,memcpy,CloseServiceHandle,VirtualFree,VirtualFree,CloseServiceHandle,LocalFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000000018002F890
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 6658Jump to behavior
    Source: C:\Windows\System32\svchost.exeAPI coverage: 4.0 %
    Source: C:\Windows\System32\svchost.exeAPI coverage: 7.5 %
    Source: C:\Windows\System32\dllhost.exeAPI coverage: 3.2 %
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exe TID: 7328Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\System32\svchost.exe TID: 7352Thread sleep count: 6658 > 30Jump to behavior
    Source: C:\Windows\System32\svchost.exe TID: 7352Thread sleep time: -66580s >= -30000sJump to behavior
    Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
    Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DDDD0 malloc,memset,FindFirstFileW,free,1_2_000001845C4DDDD0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DC850 memset,lstrcatW,lstrcatW,memset,FindFirstFileW,FindNextFileW,FindNextFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,1_2_000001845C4DC850
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DE210 __chkstk,memset,memset,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,memset,lstrcatW,lstrcatW,lstrcatW,Sleep,lstrlenW,wcsstr,GetCurrentThread,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,LeaveCriticalSection,WaitForSingleObject,VirtualFree,VirtualFree,1_2_000001845C4DE210
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DCCF0 memset,memset,memset,memset,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,memset,memset,wsprintfW,wsprintfW,FindFirstFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,memset,memset,wsprintfW,FindFirstFileW,FindNextFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,memset,memset,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,FindNextFileW,FindNextFileW,lstrlenW,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,1_2_000001845C4DCCF0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018001E210 __chkstk,memset,memset,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,memset,lstrcatW,lstrcatW,lstrcatW,Sleep,lstrlenW,wcsstr,GetCurrentThread,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,LeaveCriticalSection,WaitForSingleObject,VirtualFree,VirtualFree,2_2_000000018001E210
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018001C850 memset,lstrcatW,lstrcatW,memset,FindFirstFileW,FindNextFileW,FindNextFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_000000018001C850
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018001CCF0 memset,memset,memset,memset,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,memset,memset,wsprintfW,wsprintfW,FindFirstFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,memset,memset,wsprintfW,FindFirstFileW,FindNextFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,memset,memset,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,FindNextFileW,FindNextFileW,lstrlenW,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_000000018001CCF0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018001DDD0 malloc,memset,FindFirstFileW,free,2_2_000000018001DDD0
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_000000018001E210 __chkstk,memset,memset,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,memset,lstrcatW,lstrcatW,lstrcatW,Sleep,lstrlenW,wcsstr,GetCurrentThread,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,LeaveCriticalSection,WaitForSingleObject,VirtualFree,VirtualFree,3_2_000000018001E210
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_000000018001C850 memset,lstrcatW,lstrcatW,memset,FindFirstFileW,FindNextFileW,FindNextFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000000018001C850
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_000000018001CCF0 memset,memset,memset,memset,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,memset,memset,wsprintfW,wsprintfW,FindFirstFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,memset,memset,wsprintfW,FindFirstFileW,FindNextFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,memset,memset,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,FindNextFileW,FindNextFileW,lstrlenW,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000000018001CCF0
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_000000018001DDD0 malloc,memset,FindFirstFileW,free,3_2_000000018001DDD0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4ECD30 GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,lstrcpyW,lstrcatW,1_2_000001845C4ECD30
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63A828CF2 GetSystemInfo,0_2_00007FF63A828CF2
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: svchost.exe, 00000001.00000000.1663519946.000001845AC2B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: zSCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000_0r
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1684021102.000002C44C3DF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW>
    Source: dllhost.exe, 00000006.00000002.2921187707.0000020EEF7BC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll"
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.1684021102.000002C44C3DF000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000000.1663537334.000001845AC3F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2922208348.000001845AC3F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2922212863.000002397F413000.00000004.00000020.00020000.00000000.sdmp, arphaCrashReport64.exe, 00000004.00000002.1696340165.000001F74496C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.2921113475.000001D0C9A13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: dllhost.exe, 00000003.00000002.2920913245.00000270092CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllff
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeAPI call chain: ExitProcess graph end nodegraph_0-49554
    Source: C:\Windows\System32\svchost.exeAPI call chain: ExitProcess graph end node
    Source: C:\Windows\System32\svchost.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4EE010 BlockInput,BlockInput,GetDC,GetDeviceCaps,GetDeviceCaps,GetDeviceCaps,GetDeviceCaps,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,mouse_event,BlockInput,1_2_000001845C4EE010
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63AA06EF8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF63AA06EF8
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63AA016A4 GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF63AA016A4
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4D6F60 GetCurrentProcessId,ProcessIdToSessionId,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,CloseHandle,WTSGetActiveConsoleSessionId,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,CreateThread,VirtualFree,VirtualFree,VirtualFree,VirtualFree,1_2_000001845C4D6F60
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180034DA0 VirtualAlloc ?,?,00000000,0000000180035130,?,?,00000000,0000000180014AAC2_2_0000000180034DA0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E4080 VirtualAlloc,LoadLibraryW,GetProcAddress,FreeLibrary,1_2_000001845C4E4080
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63A8274A0 GetProcessHeap,0_2_00007FF63A8274A0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\System32\svchost.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\System32\svchost.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\System32\svchost.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\System32\svchost.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63AA06EF8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF63AA06EF8
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63AA00E60 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF63AA00E60
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63AA012BC IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF63AA012BC
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001801127E0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00000001801127E0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001801127E0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00000001801127E0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C520030 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_000001845C520030
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180060030 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0000000180060030
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180064130 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0000000180064130
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180060770 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_0000000180060770
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_0000000180060030 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_0000000180060030
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_0000000180064130 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_0000000180064130
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_0000000180060770 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0000000180060770

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\System32\svchost.exeFile created: arphaCrashReport64.exe.1.drJump to dropped file
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1845B370000 protect: page execute and read and writeJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1845BE00000 protect: page read and writeJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1845B380000 protect: page execute and read and writeJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1845B390000 protect: page read and writeJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1845C370000 protect: page execute and read and writeJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1845C380000 protect: page read and writeJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1845C410000 protect: page execute and read and writeJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1845C420000 protect: page read and writeJump to behavior
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DF9E0 VirtualAllocEx,GetLastError,VirtualAllocEx,WriteProcessMemory,GetLastError,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualProtectEx,VirtualProtectEx,memset,GetThreadContext,SetThreadContext,memset,Wow64GetThreadContext,Wow64SetThreadContext,ResumeThread,GetLastError,1_2_000001845C4DF9E0
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E9E10 VirtualAlloc,GetLastError,VirtualFree,VirtualFree,GetLastError,memset,lstrcatW,lstrcatW,lstrcatW,memset,memset,memcpy,VirtualFree,VirtualFree,VirtualFree,VirtualFree,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,VirtualFree,VirtualFree,VirtualFree,GetLastError,VirtualFree,VirtualFree,VirtualFree,GetLastError,VirtualFree,VirtualFree,1_2_000001845C4E9E10
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4DF710 VirtualAllocEx,GetLastError,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualProtectEx,GetModuleHandleW,GetProcAddress,CreateRemoteThread,1_2_000001845C4DF710
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4EE4D0 CreateToolhelp32Snapshot,Process32FirstW,lstrcmpiW,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,Process32NextW,lstrcmpiW,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,Process32NextW,1_2_000001845C4EE4D0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018002E4D0 CreateToolhelp32Snapshot,Process32FirstW,lstrcmpiW,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,Process32NextW,lstrcmpiW,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,Process32NextW,2_2_000000018002E4D0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018001F710 VirtualAllocEx,GetLastError,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualProtectEx,GetModuleHandleW,GetProcAddress,CreateRemoteThread,2_2_000000018001F710
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180029E10 VirtualAlloc,GetLastError,VirtualFree,VirtualFree,GetLastError,memset,lstrcatW,lstrcatW,lstrcatW,memset,memset,memcpy,VirtualFree,VirtualFree,VirtualFree,VirtualFree,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,VirtualFree,VirtualFree,VirtualFree,GetLastError,VirtualFree,VirtualFree,VirtualFree,GetLastError,VirtualFree,VirtualFree,2_2_0000000180029E10
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_000000018002E4D0 CreateToolhelp32Snapshot,Process32FirstW,lstrcmpiW,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,Process32NextW,lstrcmpiW,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,Process32NextW,3_2_000000018002E4D0
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_000000018001F710 VirtualAllocEx,GetLastError,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualProtectEx,GetModuleHandleW,GetProcAddress,CreateRemoteThread,3_2_000000018001F710
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_0000000180029E10 VirtualAlloc,GetLastError,VirtualFree,VirtualFree,GetLastError,memset,lstrcatW,lstrcatW,lstrcatW,memset,memset,memcpy,VirtualFree,VirtualFree,VirtualFree,VirtualFree,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,VirtualFree,VirtualFree,VirtualFree,GetLastError,VirtualFree,VirtualFree,VirtualFree,GetLastError,VirtualFree,VirtualFree,3_2_0000000180029E10
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x1F74513B0C3Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x1F74514D1CCJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x1F745140883Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtProtectVirtualMemory: Direct from: 0x1F74514D88CJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAdjustPrivilegesToken: Direct from: 0x1F745140727Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtProtectVirtualMemory: Direct from: 0x1F74514D52BJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtQuerySystemInformation: Direct from: 0x1F74514D84BJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x1F74512E173Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtClose: Direct from: 0x1F74514052B
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x1F745132212Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtWriteVirtualMemory: Direct from: 0x1F74512B93EJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtQueryInformationProcess: Direct from: 0x1F7451291B3Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtUnmapViewOfSection: Direct from: 0x1F74514C9C4Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x1F74512D3EBJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtProtectVirtualMemory: Direct from: 0x7FFE221C26A1Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x1F7451409C4Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x1F7451408EEJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtQuerySystemInformation: Direct from: 0x1F74513216DJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x1F745140A2FJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtQuerySystemInformation: Direct from: 0x1F74513244CJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x1F745128FB0Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x1F74512B8ADJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x1F74514069DJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x1F745140818Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtQuerySystemInformation: Direct from: 0x1F745129000Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtProtectVirtualMemory: Direct from: 0x1F74514D89DJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtWriteVirtualMemory: Direct from: 0x1F74512E6D2Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtProtectVirtualMemory: Direct from: 0x1F74514D4F8Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x1F74513B08CJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x1F745140544Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtClose: Direct from: 0x1F745140741
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x1F74513B131Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtQuerySystemInformation: Direct from: 0x1F74514C984Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAdjustPrivilegesToken: Direct from: 0x1F74512C5C9Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x1F74513AFDDJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAdjustPrivilegesToken: Direct from: 0x1F745140511Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x1F74513B0FAJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtWriteVirtualMemory: Direct from: 0x1F74512E8B1Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x1F745140959Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x1F745128494Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x1F74512E4F4Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtClose: Direct from: 0x1F74514CA47
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x1F745140758Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x1F7451407ADJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x1F745140A9AJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x1F7451321DBJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtWriteVirtualMemory: Direct from: 0x1F74512E065Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtUnmapViewOfSection: Direct from: 0x1F74514C9A7Jump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeMemory written: PID: 1044 base: 1845B370000 value: E9Jump to behavior
    Source: C:\Windows\System32\svchost.exeThread register set: target process: 7368Jump to behavior
    Source: C:\Windows\System32\svchost.exeThread register set: target process: 7500Jump to behavior
    Source: C:\Windows\System32\svchost.exeThread register set: target process: 7400Jump to behavior
    Source: C:\Windows\System32\svchost.exeThread register set: target process: 7532Jump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B370000Jump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeMemory written: C:\Windows\System32\svchost.exe base: 1845BE00000Jump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B380000Jump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B390000Jump to behavior
    Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\System32\dllhost.exe base: 270091A0000Jump to behavior
    Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\System32\dllhost.exe base: 27009230000Jump to behavior
    Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\System32\dllhost.exe base: 27009190000Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeMemory written: C:\Windows\System32\svchost.exe base: 1845C370000Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeMemory written: C:\Windows\System32\svchost.exe base: 1845C380000Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeMemory written: C:\Windows\System32\svchost.exe base: 1845C410000Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeMemory written: C:\Windows\System32\svchost.exe base: 1845C420000Jump to behavior
    Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\System32\dllhost.exe base: 20EEF530000Jump to behavior
    Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\System32\dllhost.exe base: 20EEF5C0000Jump to behavior
    Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\System32\dllhost.exe base: 20EEF520000Jump to behavior
    Source: C:\Windows\System32\svchost.exeCode function: WSAStartup,GetCommandLineW,CommandLineToArgvW,VirtualAlloc,InitializeCriticalSection,VirtualAlloc,InitializeCriticalSection,memset,GetCurrentProcessId,lstrcmpiW,lstrcmpiW,ExitThread,lstrcmpiW,GetCurrentProcess,TerminateProcess,lstrcmpiW,GetCurrentProcessId,OpenProcess,TerminateProcess,CloseHandle,WaitForSingleObject,GetExitCodeProcess,Sleep,CreateThread,WaitForSingleObject,CloseHandle,memset,GetModuleFileNameW,wcsstr,GetNativeSystemInfo,ExitProcess,memset,GetModuleFileNameW,IsUserAnAdmin,memset,wsprintfW,OpenSCManagerW,GetLastError,OpenServiceW,ChangeServiceConfig2W,GetLastError,CloseServiceHandle,CloseServiceHandle,lstrcmpiW,lstrcmpiW,GetNativeSystemInfo,ExitProcess,GetCurrentProcess,TerminateProcess, svchost.exe1_2_000001845C4D2140
    Source: C:\Windows\System32\svchost.exeCode function: WSAStartup,GetCommandLineW,CommandLineToArgvW,VirtualAlloc,InitializeCriticalSection,VirtualAlloc,InitializeCriticalSection,memset,GetCurrentProcessId,lstrcmpiW,lstrcmpiW,ExitThread,lstrcmpiW,GetCurrentProcess,TerminateProcess,lstrcmpiW,GetCurrentProcessId,OpenProcess,TerminateProcess,CloseHandle,WaitForSingleObject,GetExitCodeProcess,Sleep,CreateThread,WaitForSingleObject,CloseHandle,memset,GetModuleFileNameW,wcsstr,GetNativeSystemInfo,ExitProcess,memset,GetModuleFileNameW,IsUserAnAdmin,memset,wsprintfW,OpenSCManagerW,GetLastError,OpenServiceW,ChangeServiceConfig2W,GetLastError,CloseServiceHandle,CloseServiceHandle,lstrcmpiW,lstrcmpiW,GetNativeSystemInfo,ExitProcess,GetCurrentProcess,TerminateProcess, svchost.exe2_2_0000000180012140
    Source: C:\Windows\System32\dllhost.exeCode function: WSAStartup,GetCommandLineW,CommandLineToArgvW,VirtualAlloc,InitializeCriticalSection,VirtualAlloc,InitializeCriticalSection,memset,GetCurrentProcessId,lstrcmpiW,lstrcmpiW,ExitThread,lstrcmpiW,GetCurrentProcess,TerminateProcess,lstrcmpiW,GetCurrentProcessId,OpenProcess,TerminateProcess,CloseHandle,WaitForSingleObject,GetExitCodeProcess,Sleep,CreateThread,WaitForSingleObject,CloseHandle,memset,GetModuleFileNameW,wcsstr,GetNativeSystemInfo,ExitProcess,memset,GetModuleFileNameW,IsUserAnAdmin,memset,wsprintfW,OpenSCManagerW,GetLastError,OpenServiceW,ChangeServiceConfig2W,GetLastError,CloseServiceHandle,CloseServiceHandle,lstrcmpiW,lstrcmpiW,GetNativeSystemInfo,ExitProcess,GetCurrentProcess,TerminateProcess, svchost.exe3_2_0000000180012140
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4EE010 BlockInput,BlockInput,GetDC,GetDeviceCaps,GetDeviceCaps,GetDeviceCaps,GetDeviceCaps,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,mouse_event,BlockInput,1_2_000001845C4EE010
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4EE010 BlockInput,BlockInput,GetDC,GetDeviceCaps,GetDeviceCaps,GetDeviceCaps,GetDeviceCaps,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,mouse_event,BlockInput,1_2_000001845C4EE010
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcsJump to behavior
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Mail\arphaCrashReport64.exe "C:\Program Files\Windows Mail\arphaCrashReport64.exe"Jump to behavior
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcsJump to behavior
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}Jump to behavior
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}Jump to behavior
    Source: C:\Windows\System32\svchost.exeFile opened: Windows Firewall: C:\Windows\System32\FirewallAPI.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeFile opened: Windows Firewall: C:\Windows\System32\FirewallAPI.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeFile opened: Windows Firewall: C:\Windows\System32\FirewallAPI.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeFile opened: Windows Firewall: C:\Windows\System32\FirewallAPI.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeFile opened: Windows Firewall: C:\Windows\System32\FirewallAPI.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeFile opened: Windows Firewall: C:\Windows\System32\FirewallAPI.dllJump to behavior
    Source: svchost.exe, 00000002.00000003.2918301064.0000023900B40000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2921666834.0000023900B40000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2918329668.0000023900B20000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Program Manager
    Source: svchost.exe, 00000002.00000003.2314289158.0000023900C60000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2314477801.0000023900BE0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000005.00000003.2328737234.000001D0CB110000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: TCPProgram ManagerT
    Source: svchost.exe, 00000002.00000003.2918545090.0000023900BE0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2918351000.0000023900C60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: TCPProgram Manager
    Source: svchost.exe, 00000002.00000003.2314269589.0000023900B40000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2314244751.0000023900B20000.00000004.00001000.00020000.00000000.sdmp, dllhost.exe, 00000003.00000003.2294706815.000002700B8B0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Program ManagerT
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018002BBA8 cpuid 0_2_000000018002BBA8
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\MicrosoftEdgeUpdate VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\MicrosoftEdgeUpdate VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E7E20 CreateNamedPipeW,GetLastError,ConnectNamedPipe,GetLastError,1_2_000001845C4E7E20
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63AA0F09C GetSystemTimeAsFileTime,0_2_00007FF63AA0F09C
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E24E0 memset,memset,memset,memset,gethostname,gethostbyname,inet_ntoa,wsprintfW,lstrcatW,GetForegroundWindow,GetWindowTextW,VirtualAlloc,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,VirtualFree,GetComputerNameW,GetCurrentProcess,IsWow64Process,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,RegCloseKey,GetSystemInfo,wsprintfW,GlobalMemoryStatusEx,wsprintfW,VirtualAlloc,VirtualAlloc,GetUserNameW,GetCurrentProcessId,wsprintfW,VirtualFree,VirtualFree,memset,GetWindowsDirectoryW,GetLastError,GetVolumeInformationW,wsprintfA,wsprintfA,wsprintfW,CoInitialize,CoCreateInstance,SysFreeString,CoUninitialize,GetCurrentProcess,IsWow64Process,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,1_2_000001845C4E24E0

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1044, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1044, type: MEMORYSTR
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63A858C00 WSAGetLastError,socket,WSAGetLastError,bind,WSAGetLastError,bind,WSAGetLastError,0_2_00007FF63A858C00
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63A8549E0 socket,bind,WSAGetLastError,WSAGetLastError,WSAGetLastError,0_2_00007FF63A8549E0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF63A846320 socket,bind,SetLastError,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,WSAGetLastError,0_2_00007FF63A846320
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C4E1520 memset,VirtualFree,VirtualFree,socket,setsockopt,htons,inet_addr,htonl,bind,WSAGetLastError,listen,CreateThread,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,1_2_000001845C4E1520
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C507630 socket,setsockopt,setsockopt,setsockopt,WSAGetLastError,listen,closesocket,WSAGetLastError,closesocket,closesocket,1_2_000001845C507630
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C50A830 socket,socket,htonl,bind,getsockname,1_2_000001845C50A830
    Source: C:\Windows\System32\svchost.exeCode function: 1_2_000001845C516B30 htons,_unlink,bind,WSAGetLastError,getsockname,htons,1_2_000001845C516B30
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180021520 memset,VirtualFree,VirtualFree,socket,setsockopt,htons,inet_addr,htonl,bind,WSAGetLastError,listen,CreateThread,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,2_2_0000000180021520
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180047630 socket,setsockopt,setsockopt,setsockopt,WSAGetLastError,listen,closesocket,WSAGetLastError,closesocket,closesocket,2_2_0000000180047630
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018004A830 socket,socket,htonl,bind,getsockname,2_2_000000018004A830
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180056B30 htons,_unlink,bind,WSAGetLastError,getsockname,htons,2_2_0000000180056B30
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_0000000180021520 memset,VirtualFree,VirtualFree,socket,setsockopt,htons,inet_addr,htonl,bind,WSAGetLastError,listen,CreateThread,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,3_2_0000000180021520
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_0000000180047630 socket,setsockopt,setsockopt,setsockopt,WSAGetLastError,listen,closesocket,WSAGetLastError,closesocket,closesocket,3_2_0000000180047630
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_000000018004A830 socket,socket,htonl,bind,getsockname,3_2_000000018004A830
    Source: C:\Windows\System32\dllhost.exeCode function: 3_2_0000000180056B30 htons,_unlink,bind,WSAGetLastError,getsockname,htons,3_2_0000000180056B30
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire Infrastructure1
    Valid Accounts
    11
    Native API
    1
    DLL Side-Loading
    1
    Abuse Elevation Control Mechanism
    3
    Disable or Modify Tools
    21
    Input Capture
    1
    System Time Discovery
    Remote Services1
    Archive Collected Data
    1
    Ingress Tool Transfer
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts1
    Exploitation for Client Execution
    1
    Create Account
    1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    LSASS Memory11
    Account Discovery
    Remote Desktop Protocol21
    Input Capture
    1
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain Accounts2
    Command and Scripting Interpreter
    1
    Valid Accounts
    1
    Valid Accounts
    1
    Abuse Elevation Control Mechanism
    Security Account Manager1
    System Service Discovery
    SMB/Windows Admin Shares3
    Clipboard Data
    1
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal Accounts1
    Scheduled Task/Job
    12
    Windows Service
    11
    Access Token Manipulation
    2
    Obfuscated Files or Information
    NTDS2
    File and Directory Discovery
    Distributed Component Object ModelInput Capture1
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud Accounts12
    Service Execution
    1
    Scheduled Task/Job
    12
    Windows Service
    1
    DLL Side-Loading
    LSA Secrets25
    System Information Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts623
    Process Injection
    12
    Masquerading
    Cached Domain Credentials1
    Network Share Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items1
    Scheduled Task/Job
    1
    Valid Accounts
    DCSync41
    Security Software Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
    Virtualization/Sandbox Evasion
    Proc Filesystem21
    Virtualization/Sandbox Evasion
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
    Access Token Manipulation
    /etc/passwd and /etc/shadow4
    Process Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron623
    Process Injection
    Network Sniffing1
    Application Window Discovery
    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
    Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
    Indicator Removal
    Input Capture1
    System Owner/User Discovery
    Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1572748 Sample: 2024-12-10#U67e5#U9605_uninst.exe Startdate: 10/12/2024 Architecture: WINDOWS Score: 92 36 www.wshifen.com 2->36 38 www.baidu.com 2->38 40 www.a.shifen.com 2->40 52 Yara detected ValleyRAT 2->52 54 AI detected suspicious sample 2->54 9 2024-12-10#U67e5#U9605_uninst.exe 2->9         started        signatures3 process4 dnsIp5 42 www.wshifen.com 103.235.47.188, 49730, 80 BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtd Hong Kong 9->42 60 Hijacks the control flow in another process 9->60 62 Writes to foreign memory regions 9->62 64 Allocates memory in foreign processes 9->64 66 Found evasive API chain checking for user administrative privileges 9->66 13 svchost.exe 12 4 9->13 injected signatures6 process7 file8 30 C:\Program Files\...\arphaCrashReport64.exe, PE32+ 13->30 dropped 32 C:\Program Files\...\arphaDump64.dll, PE32+ 13->32 dropped 68 Benign windows process drops PE files 13->68 70 Contains functionality to inject threads in other processes 13->70 72 Contains functionality to inject code into remote processes 13->72 74 2 other signatures 13->74 17 svchost.exe 1 13->17         started        21 arphaCrashReport64.exe 13->21         started        23 svchost.exe 13->23         started        signatures9 process10 dnsIp11 34 43.154.172.193, 49731, 49732, 80 LILLY-ASUS Japan 17->34 44 Writes to foreign memory regions 17->44 46 Modifies the context of a thread in another process (thread injection) 17->46 25 dllhost.exe 17->25         started        48 Allocates memory in foreign processes 21->48 50 Found direct / indirect Syscall (likely to bypass EDR) 21->50 28 dllhost.exe 23->28         started        signatures12 process13 signatures14 56 Contains functionality to inject threads in other processes 25->56 58 Found evasive API chain checking for user administrative privileges 25->58

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    No Antivirus matches
    SourceDetectionScannerLabelLink
    C:\Program Files\Windows Mail\arphaCrashReport64.exe4%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    www.wshifen.com
    103.235.47.188
    truefalse
      high
      www.baidu.com
      unknown
      unknownfalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        43.154.172.193
        unknownJapan4249LILLY-ASUSfalse
        103.235.47.188
        www.wshifen.comHong Kong
        55967BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtdfalse
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1572748
        Start date and time:2024-12-10 20:48:05 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 7m 33s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:10
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:1
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:2024-12-10#U67e5#U9605_uninst.exe
        renamed because original name is a hash value
        Original Sample Name:2024-12-10_uninst.exe
        Detection:MAL
        Classification:mal92.troj.evad.winEXE@11/5@1/2
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 93%
        • Number of executed functions: 37
        • Number of non-executed functions: 93
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
        • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.63
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report creation exceeded maximum time and may have missing disassembly code information.
        • Report size exceeded maximum capacity and may have missing disassembly code.
        • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
        • VT rate limit hit for: 2024-12-10#U67e5#U9605_uninst.exe
        TimeTypeDescription
        14:49:49API Interceptor4254x Sleep call for process: svchost.exe modified
        19:48:57Task SchedulerRun new task: MicrosoftEdgeUpdate path: C:\Program Files\Windows Mail\arphaCrashReport64.exe
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        103.235.47.188VIP-#U4f1a#U5458#U7248.exeGet hashmaliciousBlackMoonBrowse
        • www.baidu.com/
        Iifpj4i2kC.exeGet hashmaliciousFormBookBrowse
        • www.zruypj169g.top/md02/?oHH8=VZUPDXU8mXkToFn&0PG4QdD=KBMih/6UmjMCLIvQj8A+JVJ0ZduXlvkac/jrKRN7UGcA2YCWIWeuvW479UURmW6VwJBRFqK2PA==
        3.exeGet hashmaliciousBlackMoon, XRedBrowse
        • www.baidu.com/
        CZyOWoN2hiszA6d.exeGet hashmaliciousFormBookBrowse
        • www.vicmvm649n.top/v15n/?Yn=UsBn8mn1PUl4czyMQZxenuqc6dPBc+Q3khu6MN2NNQj7YA4ug5lWpId+R/K0fD87Hm6v&mv=Y4QppplhSjwxWBd
        f2.exeGet hashmaliciousBlackMoonBrowse
        • www.baidu.com/
        f1.exeGet hashmaliciousUnknownBrowse
        • www.baidu.com/
        SecuriteInfo.com.FileRepMalware.29184.31872.exeGet hashmaliciousUnknownBrowse
        • www.baidu.com/
        chAJcIK6ZO.exeGet hashmaliciousUnknownBrowse
        • www.baidu.com/
        LisectAVT_2403002A_489.exeGet hashmaliciousUnknownBrowse
        • www.baidu.com/
        d48c236503a4d2e54e23d9ebc9aa48e86300fd24955c871a7b8792656c47fb6a.exeGet hashmaliciousBdaejecBrowse
        • www.baidu.com/
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        www.wshifen.comSetup.exeGet hashmaliciousLummaC StealerBrowse
        • 103.235.47.188
        b6FArHy7yA.exeGet hashmaliciousLummaC StealerBrowse
        • 103.235.47.188
        VIP-#U4f1a#U5458#U7248.exeGet hashmaliciousBlackMoonBrowse
        • 103.235.46.96
        360safe.exeGet hashmaliciousUnknownBrowse
        • 103.235.47.188
        XiaobingOnekey.exeGet hashmaliciousUnknownBrowse
        • 103.235.46.96
        DNF#U604b#U62180224a.exeGet hashmaliciousUnknownBrowse
        • 103.235.46.96
        http://profdentalcare.comGet hashmaliciousUnknownBrowse
        • 103.235.46.96
        Iifpj4i2kC.exeGet hashmaliciousFormBookBrowse
        • 103.235.47.188
        https://www.baidu.com/link?url=7AgUGxkCgEsQdPm9T1PXcA0XghaPOWMLvdhGyyVngg844uS4x-KZy4IMqs1ov0OgdFqhAB-_X2oOV9exK4hWC_&wd=ZWxraW58WTI5eVpUUmpaUzVqYjIwPXxNYkdVSlpkdVROdWNyeW1UWU1laElVVW1QbGRGb0F5RmNLcWJadW1CT01YYw==Get hashmaliciousHTMLPhisherBrowse
        • 103.235.46.96
        kHslwiV2w6.exeGet hashmaliciousFormBookBrowse
        • 103.235.47.188
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtdhax.mpsl.elfGet hashmaliciousMiraiBrowse
        • 182.61.224.158
        Fantazy.arm7.elfGet hashmaliciousMiraiBrowse
        • 180.76.229.255
        Setup.exeGet hashmaliciousLummaC StealerBrowse
        • 103.235.47.188
        .akcqrfutuo.elfGet hashmaliciousUnknownBrowse
        • 106.13.55.248
        b6FArHy7yA.exeGet hashmaliciousLummaC StealerBrowse
        • 103.235.47.188
        VIP-#U4f1a#U5458#U7248.exeGet hashmaliciousBlackMoonBrowse
        • 103.235.46.96
        360safe.exeGet hashmaliciousUnknownBrowse
        • 103.235.47.188
        XiaobingOnekey.exeGet hashmaliciousUnknownBrowse
        • 103.235.46.96
        arm7.elfGet hashmaliciousMiraiBrowse
        • 106.13.224.235
        splarm.elfGet hashmaliciousUnknownBrowse
        • 180.76.142.163
        LILLY-ASUSJosho.ppc.elfGet hashmaliciousUnknownBrowse
        • 43.153.180.60
        Josho.arm.elfGet hashmaliciousUnknownBrowse
        • 43.75.63.212
        Josho.m68k.elfGet hashmaliciousUnknownBrowse
        • 40.171.24.94
        Josho.mpsl.elfGet hashmaliciousUnknownBrowse
        • 42.139.61.210
        hax.spc.elfGet hashmaliciousMiraiBrowse
        • 42.171.217.5
        http://enteolcl.top/Get hashmaliciousUnknownBrowse
        • 43.175.135.109
        hax.arm7.elfGet hashmaliciousMiraiBrowse
        • 42.175.33.200
        hax.mpsl.elfGet hashmaliciousMiraiBrowse
        • 40.225.254.87
        hax.sh4.elfGet hashmaliciousMiraiBrowse
        • 40.223.139.135
        hax.arm5.elfGet hashmaliciousMiraiBrowse
        • 40.218.241.92
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        C:\Program Files\Windows Mail\arphaCrashReport64.exepng131.exeGet hashmaliciousValleyRATBrowse
          install.exeGet hashmaliciousValleyRATBrowse
            Telegrm2.69.exeGet hashmaliciousUnknownBrowse
              Telegrm2.69.exeGet hashmaliciousUnknownBrowse
                file_6c73ff4553d147e39fc35434c1e9e972_2024-07-30_02_54_11_351000.zipGet hashmaliciousUnknownBrowse
                  SvpnLong2.exeGet hashmaliciousUnknownBrowse
                    SvpnLong2.exeGet hashmaliciousUnknownBrowse
                      Cbrome1.0.exeGet hashmaliciousUnknownBrowse
                        Supe.exeGet hashmaliciousUnknownBrowse
                          Cbrome1.0.exeGet hashmaliciousUnknownBrowse
                            Process:C:\Windows\System32\svchost.exe
                            File Type:PE32+ executable (GUI) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):238384
                            Entropy (8bit):6.278635939854228
                            Encrypted:false
                            SSDEEP:3072:fN9rZ5vuFomptSepjTxUPjfOgwXCtRLDya09M9EvoHmkQ/2Y8L6vVefD:rZ5qomPSeCx7tRNQjSfD
                            MD5:8B5D51DF7BBD67AEB51E9B9DEE6BC84A
                            SHA1:DD63C3D4ACF0CE27F71CCE44B8950180E48E36FA
                            SHA-256:E743E8FAC075A379161E1736388451E0AF0FDE7DA595EA9D15EEB5140E3E8271
                            SHA-512:1B4350D51C2107D0AA22EB01D64E1F1AB73C28114045C388BAF9547CC39A902C8A274A24479C7C2599F94C96F8772E438F21A2849316B5BD7F5D47C26A1E483B
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 4%
                            Joe Sandbox View:
                            • Filename: png131.exe, Detection: malicious, Browse
                            • Filename: install.exe, Detection: malicious, Browse
                            • Filename: Telegrm2.69.exe, Detection: malicious, Browse
                            • Filename: Telegrm2.69.exe, Detection: malicious, Browse
                            • Filename: file_6c73ff4553d147e39fc35434c1e9e972_2024-07-30_02_54_11_351000.zip, Detection: malicious, Browse
                            • Filename: SvpnLong2.exe, Detection: malicious, Browse
                            • Filename: SvpnLong2.exe, Detection: malicious, Browse
                            • Filename: Cbrome1.0.exe, Detection: malicious, Browse
                            • Filename: Supe.exe, Detection: malicious, Browse
                            • Filename: Cbrome1.0.exe, Detection: malicious, Browse
                            Reputation:moderate, very likely benign file
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........i...:...:...:...;...:...;)..:...;...:...;...:...;...:...;...:...;...:3..;...:...:...:3..;...:3.4:...:..\:...:3..;...:Rich...:........................PE..d......`.........."..........t......$..........@....................................j.....`..........................................................p...-...P.......h..0;......l...P...8.......................(.................... ..@............................text............................... ..`.rdata..F.... ......................@..@.data...L&... ......................@....pdata.......P......................@..@.rsrc....-...p.......2..............@..@.reloc..l............`..............@..B........................................................................................................................................................................................................................
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):546252
                            Entropy (8bit):6.544066734855226
                            Encrypted:false
                            SSDEEP:12288:awnKbeNO/thmmWIK3z9rG3U9szzrHUPRxG0+UfYlrYS:flXDp9HPYlr5
                            MD5:41A525ADD2B2B33FB9681C0E65E57B55
                            SHA1:FC90352608D96D0454A2F51D7EEC7B6ECA687505
                            SHA-256:3EE9E55C4C469042C3622D84CB4DA2EBCFA77C1D2517564AC289BA5D17264D64
                            SHA-512:4CEB617727D6CF40E81E715BA2FBDB440859B3DC2DAC592FDAE93EB5577CDE341191AA98A87D3CFF3AF9D2CE95C465A71D7FC0CF004243C947F781BB0C263CD1
                            Malicious:false
                            Reputation:low
                            Preview:4...H..(H...D$8run.H.L$8.O...H..(...eH..%`......D..3.L..E..t"A........A..a.J..L.I....A..D....u..H.A.....H.\$.H.l$.H.t$.WAVAWH.. D......H.P.H.j L..I.......M..L.P0M..tLIcB<B.........t<I.<..O.I...j....w 3.I..D..9_.v...I...P...A..D;.t+..H...;_.r.L;.u.3.H.\$@H.l$HH.t$PH.. A_A^_.O$I..D...Y.O.I..B...I.......@SH.. H.......%...H..H.. [H....H.\$.WH.. H..H...........H..H..H.\$0H.. _H.....H.\$.UVWATAUAVAWH.. L..M..3.Z.H........2=..L.......-A..H.D$x....M..M.f.H.D$p3...A..y.H..(fA;A.s|I..9.u29E8~ZHc]8A......O.H..I..A.....A..L..G.3.H...T$p.-.O.A.......I..A.....A..W.H..D..I..H...T$x._.I....H..(..H......;.|.H.\$`H.. A_A^A]A\_^].H.\$.H.l$.H.t$ WATAUAVAWH..@L..-A........ ...H.L$ D..H..3...D.g.E..H.L$ A....E..W.H.L$$..E..W.H.L$(..E..W.H.L$,..E..W.H.L$0..E..W`H.L$4..E..H.L$8....E..W H.L$<....O.B....../.H...5...M..E3.L..A..H.........A..Y.I.q0H..(H#.fE;i.......I..D.C.A.....A.....E..A#.A...A#.A....s..K.A..@....H.....OH..B..I..RD.T. A....A....D.CT. ..u.A..@t.A.A ..E..y.A.A$..t..K.L.L$pH...E.
                            Process:C:\Windows\System32\svchost.exe
                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):286720
                            Entropy (8bit):6.3893906748659095
                            Encrypted:false
                            SSDEEP:3072:HxZrTgN6uyqfkqc53wuY+OrGW2LRKK9+R/BsP3VkxQO6yOxaXLNC3dvMvuTYpr:fsxkmyLRKiM/BsNd3yGaXpruT2r
                            MD5:A0DDABA09C3626E07A748C662B83BE19
                            SHA1:C28FA5C63075CD8846143F417A0C0D4874675B0F
                            SHA-256:31E1AA8C30756D56F8E0038D37AAAC5A53976D1DB05D3534B8B2E1AA21407B4B
                            SHA-512:59BAD78B84C4DA7097E87BA67CEB3CEB6F72774FEA78FBD7E2168E548A7860197708AD96CC5010A2D5669427BC916F5CC24F5F27AF8B474AC62DE620C757B41F
                            Malicious:false
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K+...Js..Js..Js.D2p..Js.D2v..Js.D2w..Js...p..Js...w..Js...v.,Js.D2r..Js..Jr.jJs...z..Js...s..Js.....Js...q..Js.Rich.Js.................PE..d....DDg.........." ...*.............^....................................................`..........................................,.......-..<............p..........................p.......................(.......@............................................text...P~.......................... ..`.rdata.............................@..@.data....&...@.......,..............@....pdata.......p.......B..............@..@.reloc...............X..............@..B................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\svchost.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):3188
                            Entropy (8bit):3.559862861079417
                            Encrypted:false
                            SSDEEP:48:yei1q9tNTPQOYZj9c9V9Lbra+iaiudupRCRvA9ufAuRa7T5XhPsV8ic4dTCp+++:t7U4diaigVA9ll7dhFFb+
                            MD5:53DCF71FCE78EA4C7B41FB4D973E5815
                            SHA1:46FB4C836823ABC49A153F6385D66C5F9E0CA30D
                            SHA-256:464DAC2210C387ADA19C7DF46AE18B628E1D8F9EA34DD7EDF812289CFECAF4DB
                            SHA-512:BF9C4DBEC061FE85A099C4D8E31C09B75F9B8CDDD554CA0F241A63E08B463242A30272B423C0ED9F5A38844A89924530C358442EB898837CC00B1368C439008B
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...2.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.A.u.t.h.o.r.>.S.Y.S.T.E.M.<./.A.u.t.h.o.r.>..... . . . .<.D.e.s.c.r.i.p.t.i.o.n.>.M.i.c.r.o.s.o.f.t. .E.d.g.e. .U.p.d.a.t.e. .T.a.s.k. .M.a.c.h.i.n.e.C.o.r.e.<./.D.e.s.c.r.i.p.t.i.o.n.>..... . . . .<.U.R.I.>.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.M.i.c.r.o.s.o.f.t.E.d.g.e.U.p.d.a.t.e.<./.U.R.I.>..... . .<./.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . .<.T.r.i.g.g.e.r.s.>..... . . . .<.B.o.o.t.T.r.i.g.g.e.r.>..... . . . . . .<.E.n.a.b.l.e.d.>.t.r.u.e.<./.E.n.a.b.l.e.d.>..... . . . .<./.B.o.o.t.T.r.i.g.g.e.r.>..... . .<./.T.r.i.g.g.e.r.s.>..... . .<.P.r.i.n.c.i.p.a.l.s.>..... . . . .<.P.r.i.n.c.i.p.a.l. .i.d.=.".A.u.t.h.o.r.".>..... . . . . . .<.U.s.e.r.I.d.>.S.-.1.-.5.-.1.8.<./.U.s.e.r.I.d.
                            Process:C:\Windows\System32\svchost.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:modified
                            Size (bytes):4680
                            Entropy (8bit):3.711019165288102
                            Encrypted:false
                            SSDEEP:96:pYMguQII4ij6h4aGdinipV9ll7UY5HAmzQ+:9A4L/xne7HO+
                            MD5:B09EE389FED6402C80024A5082984BC0
                            SHA1:4CA5CFB1B224A69C0BDF9EB17F6897B1ACFEA8A4
                            SHA-256:F91EE59F8FFAB6027C46C37E1DB4AE8D1F5B50F26D5957299354ABDA5D4EDE18
                            SHA-512:50C4C96A2BEFCD688186BDAE1A68385BD76A0BB52C766DE2EEF7F33836BBC6C625EDB7BD403F5634B688A93065978B60A133E569E325E47DEA9A4296116C5526
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...6.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.S.o.u.r.c.e.>.$.(.@.%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.p.p.c...d.l.l.,.-.2.0.0.).<./.S.o.u.r.c.e.>..... . . . .<.A.u.t.h.o.r.>.$.(.@.%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.p.p.c...d.l.l.,.-.2.0.0.).<./.A.u.t.h.o.r.>..... . . . .<.V.e.r.s.i.o.n.>.1...0.<./.V.e.r.s.i.o.n.>..... . . . .<.D.e.s.c.r.i.p.t.i.o.n.>.$.(.@.%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.p.p.c...d.l.l.,.-.2.0.1.).<./.D.e.s.c.r.i.p.t.i.o.n.>..... . . . .<.U.R.I.>.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.S.o.f.t.w.a.r.e.P.r.o.t.e.c.t.i.o.n.P.l.a.t.f.o.r.m.\.S.v.c.R.e.s.t.a.r.t.T.a.s.k.<./.U.R.I.>..... . . . .<.S.e.c.u.r.i.t.y.D.e.s.c.r.i.p.t.o.r.>.D.:.P.(.A.;.;.F.A.;.;.;.S.Y.).(.A.;.;.F.A.;.;.;.B.A.).
                            File type:PE32+ executable (GUI) x86-64, for MS Windows
                            Entropy (8bit):7.132204010116387
                            TrID:
                            • Win64 Executable GUI (202006/5) 92.65%
                            • Win64 Executable (generic) (12005/4) 5.51%
                            • Generic Win/DOS Executable (2004/3) 0.92%
                            • DOS Executable Generic (2002/1) 0.92%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:2024-12-10#U67e5#U9605_uninst.exe
                            File size:2'319'360 bytes
                            MD5:0aa972dc4d2fe4c5f9a7a9d26ea3f51f
                            SHA1:2e141f8072836b479572b1d7fa468727011601eb
                            SHA256:bb1d91e8f93a1b08b098969e48a12d2f2b8203a30de0c3d85ec8cd36a3fa8049
                            SHA512:fcfad174c11e8085161afeebb0b4380bf82105ff3e108f09e115be7e51ef53a24159f12637862cdca4f770019fdaf78972966a81d406eedcc75a1b104fa072a0
                            SSDEEP:49152:soQVMCMbSwPwOTINyDiSym2GBKhrKhpYVNw:WZoPZI0D3yLGB6wpYVNw
                            TLSH:94B58D58258E8EA1F56F70B8990092D2DF22F52442B087FB37C5D655352A26CC8FFBC6
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......M..)...z...z...zB..{...zB..{...zB..{...z[..{...z[..{...z[..{;..z...z...z...{...zB..{...z...z...z...{...z...{...zRich...z.......
                            Icon Hash:90cececece8e8eb0
                            Entrypoint:0x1401e0afc
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x140000000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                            Time Stamp:0x6757D86F [Tue Dec 10 05:58:07 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:6
                            OS Version Minor:0
                            File Version Major:6
                            File Version Minor:0
                            Subsystem Version Major:6
                            Subsystem Version Minor:0
                            Import Hash:30e5e37178bcd33feee09c46955e53d9
                            Instruction
                            dec eax
                            sub esp, 28h
                            call 00007FB15CDA3F4Ch
                            dec eax
                            add esp, 28h
                            jmp 00007FB15CDA33BFh
                            int3
                            int3
                            inc eax
                            push ebx
                            dec eax
                            sub esp, 20h
                            dec eax
                            mov ebx, ecx
                            jmp 00007FB15CDA3551h
                            dec eax
                            mov ecx, ebx
                            call 00007FB15CDB3682h
                            test eax, eax
                            je 00007FB15CDA3555h
                            dec eax
                            mov ecx, ebx
                            call 00007FB15CDA942Ah
                            dec eax
                            test eax, eax
                            je 00007FB15CDA3529h
                            dec eax
                            add esp, 20h
                            pop ebx
                            ret
                            dec eax
                            cmp ebx, FFFFFFFFh
                            je 00007FB15CDA3548h
                            call 00007FB15CDA4084h
                            int3
                            call 00007FB15CDA409Eh
                            int3
                            dec eax
                            mov dword ptr [esp+08h], ebx
                            push edi
                            dec eax
                            sub esp, 20h
                            mov edx, 00000FA0h
                            dec eax
                            lea ecx, dword ptr [00050A06h]
                            call dword ptr [0001E510h]
                            dec eax
                            lea ecx, dword ptr [00025401h]
                            call dword ptr [0001E6A3h]
                            dec eax
                            mov ebx, eax
                            dec eax
                            test eax, eax
                            jne 00007FB15CDA3557h
                            dec eax
                            lea ecx, dword ptr [00025434h]
                            call dword ptr [0001E68Eh]
                            dec eax
                            mov ebx, eax
                            dec eax
                            test eax, eax
                            je 00007FB15CDA35C1h
                            dec eax
                            lea edx, dword ptr [0002543Fh]
                            dec eax
                            mov ecx, ebx
                            call dword ptr [0001E5A6h]
                            dec eax
                            lea edx, dword ptr [0002544Fh]
                            dec eax
                            mov ecx, ebx
                            dec eax
                            mov edi, eax
                            call dword ptr [0001E593h]
                            dec eax
                            test edi, edi
                            je 00007FB15CDA3557h
                            dec eax
                            test eax, eax
                            je 00007FB15CDA3552h
                            dec eax
                            mov dword ptr [000009CAh], edi
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x217cb40x8c.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x2330000x7e78.pdata
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x23b0000x18d4.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x2107500x38.rdata
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x2109000x28.rdata
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2107900x138.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x1ff0000x590.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x1fdc400x1fde00abc775d348f8fcdba8ba056dc90b6a66unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x1ff0000x19e0c0x1a000ad081c80f064c5b3d90710fd215ad089False0.3142841045673077data4.61868901075285IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x2190000x1986c0x1480065b50643df565d23f37475f99d8a275aFalse0.8717487614329268DIY-Thermocam raw data (Lepton 2.x), scale 20575-8256, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 214.2548687.671876601140216IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .pdata0x2330000x7e780x8000b714e5ad635fdebcddda0a616c83f649False0.45068359375data5.558361042678715IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x23b0000x18d40x1a00a68bb8e43de5a6407a0e583bf4cb460cFalse0.3073918269230769data5.379536810924863IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            DLLImport
                            KERNEL32.dllSleep, LocalFree, WriteConsoleW, InitializeCriticalSectionEx, GetLastError, DecodePointer, DeleteCriticalSection, RaiseException, GetProcessHeap, HeapDestroy, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, CreateEventA, InitializeCriticalSectionAndSpinCount, InitializeConditionVariable, CloseHandle, GetSystemInfo, ResetEvent, PostQueuedCompletionStatus, WaitForSingleObject, EnterCriticalSection, SetEvent, GetQueuedCompletionStatus, GetCurrentThreadId, LeaveCriticalSection, GetExitCodeThread, TerminateThread, SetLastError, CreateTimerQueue, InitializeSRWLock, DeleteTimerQueueEx, lstrlenA, CreateFileA, GetFileSize, CreateFileMappingA, MapViewOfFileEx, MultiByteToWideChar, WideCharToMultiByte, GetModuleHandleA, GetProcAddress, GetCurrentThread, WakeConditionVariable, CreateIoCompletionPort, WakeAllConditionVariable, SwitchToThread, SleepConditionVariableCS, FindResourceExW, LoadResource, LockResource, SizeofResource, FindResourceW, GetNativeSystemInfo, CreateTimerQueueTimer, WaitForMultipleObjects, UnmapViewOfFile, AcquireSRWLockShared, ReleaseSRWLockShared, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, lstrcatA, lstrcatW, VirtualAlloc, GetCurrentProcessId, WaitForSingleObjectEx, CreateEventW, GetModuleHandleW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetSystemTimeAsFileTime, InitializeSListHead, OutputDebugStringW, RtlUnwindEx, RtlPcToFileHeader, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, CreateThread, ExitThread, FreeLibraryAndExitThread, GetModuleHandleExW, ExitProcess, GetModuleFileNameW, GetStdHandle, WriteFile, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, CompareStringW, LCMapStringW, GetFileType, GetTimeZoneInformation, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, GetStringTypeW, SetFilePointerEx, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, CreateFileW
                            SHLWAPI.dllStrChrA
                            USER32.dllMsgWaitForMultipleObjects, TranslateMessage, UnregisterClassA, PeekMessageA, DispatchMessageA
                            WS2_32.dllgetsockname, getpeername, ntohl, htonl, WSAIoctl, setsockopt, getsockopt, ioctlsocket, send, shutdown, closesocket, WSASend, WSASetLastError, inet_pton, ntohs, __WSAFDIsSet, WSAStartup, WSACleanup, socket, bind, listen, WSAGetOverlappedResult, connect, WSACreateEvent, WSAEventSelect, WSAWaitForMultipleEvents, WSAEnumNetworkEvents, recv, WSAResetEvent, WSACloseEvent, WSAGetLastError, freeaddrinfo, getaddrinfo, inet_ntop, htons, select, WSAStringToAddressA, WSARecv
                            WINMM.dlltimeGetTime
                            SHELL32.dllCommandLineToArgvW
                            TimestampSource PortDest PortSource IPDest IP
                            Dec 10, 2024 20:48:56.107781887 CET4973080192.168.2.4103.235.47.188
                            Dec 10, 2024 20:48:56.227516890 CET8049730103.235.47.188192.168.2.4
                            Dec 10, 2024 20:48:56.227754116 CET4973080192.168.2.4103.235.47.188
                            Dec 10, 2024 20:48:57.595433950 CET4973180192.168.2.443.154.172.193
                            Dec 10, 2024 20:48:57.715226889 CET804973143.154.172.193192.168.2.4
                            Dec 10, 2024 20:48:57.715336084 CET4973180192.168.2.443.154.172.193
                            Dec 10, 2024 20:48:57.808696032 CET4973180192.168.2.443.154.172.193
                            Dec 10, 2024 20:48:57.930028915 CET804973143.154.172.193192.168.2.4
                            Dec 10, 2024 20:48:58.938450098 CET4973080192.168.2.4103.235.47.188
                            Dec 10, 2024 20:48:59.242044926 CET804973143.154.172.193192.168.2.4
                            Dec 10, 2024 20:48:59.285109043 CET4973180192.168.2.443.154.172.193
                            Dec 10, 2024 20:48:59.340114117 CET4973180192.168.2.443.154.172.193
                            Dec 10, 2024 20:48:59.463165998 CET804973143.154.172.193192.168.2.4
                            Dec 10, 2024 20:48:59.998645067 CET4973280192.168.2.443.154.172.193
                            Dec 10, 2024 20:49:00.124685049 CET804973243.154.172.193192.168.2.4
                            Dec 10, 2024 20:49:00.124761105 CET4973280192.168.2.443.154.172.193
                            Dec 10, 2024 20:49:00.124926090 CET4973280192.168.2.443.154.172.193
                            Dec 10, 2024 20:49:00.245006084 CET804973243.154.172.193192.168.2.4
                            Dec 10, 2024 20:49:01.652539968 CET804973243.154.172.193192.168.2.4
                            Dec 10, 2024 20:49:01.705017090 CET4973280192.168.2.443.154.172.193
                            Dec 10, 2024 20:49:01.988873959 CET4973280192.168.2.443.154.172.193
                            Dec 10, 2024 20:49:02.111066103 CET804973243.154.172.193192.168.2.4
                            Dec 10, 2024 20:49:09.470652103 CET4973180192.168.2.443.154.172.193
                            Dec 10, 2024 20:49:09.590239048 CET804973143.154.172.193192.168.2.4
                            Dec 10, 2024 20:49:12.111279011 CET4973280192.168.2.443.154.172.193
                            Dec 10, 2024 20:49:12.230902910 CET804973243.154.172.193192.168.2.4
                            Dec 10, 2024 20:49:19.595693111 CET4973180192.168.2.443.154.172.193
                            Dec 10, 2024 20:49:19.716212034 CET804973143.154.172.193192.168.2.4
                            Dec 10, 2024 20:49:22.236279964 CET4973280192.168.2.443.154.172.193
                            Dec 10, 2024 20:49:22.356534004 CET804973243.154.172.193192.168.2.4
                            Dec 10, 2024 20:49:29.720675945 CET4973180192.168.2.443.154.172.193
                            Dec 10, 2024 20:49:29.840332031 CET804973143.154.172.193192.168.2.4
                            Dec 10, 2024 20:49:32.361455917 CET4973280192.168.2.443.154.172.193
                            Dec 10, 2024 20:49:32.481940985 CET804973243.154.172.193192.168.2.4
                            Dec 10, 2024 20:49:39.845693111 CET4973180192.168.2.443.154.172.193
                            Dec 10, 2024 20:49:39.965178967 CET804973143.154.172.193192.168.2.4
                            Dec 10, 2024 20:49:42.486428976 CET4973280192.168.2.443.154.172.193
                            Dec 10, 2024 20:49:42.605894089 CET804973243.154.172.193192.168.2.4
                            Dec 10, 2024 20:49:49.970822096 CET4973180192.168.2.443.154.172.193
                            Dec 10, 2024 20:49:50.090223074 CET804973143.154.172.193192.168.2.4
                            Dec 10, 2024 20:49:52.611330032 CET4973280192.168.2.443.154.172.193
                            Dec 10, 2024 20:49:52.733249903 CET804973243.154.172.193192.168.2.4
                            Dec 10, 2024 20:50:00.095706940 CET4973180192.168.2.443.154.172.193
                            Dec 10, 2024 20:50:00.215064049 CET804973143.154.172.193192.168.2.4
                            Dec 10, 2024 20:50:01.552089930 CET4973180192.168.2.443.154.172.193
                            Dec 10, 2024 20:50:01.671542883 CET804973143.154.172.193192.168.2.4
                            Dec 10, 2024 20:50:02.736428976 CET4973280192.168.2.443.154.172.193
                            Dec 10, 2024 20:50:02.856194973 CET804973243.154.172.193192.168.2.4
                            Dec 10, 2024 20:50:02.999219894 CET4973280192.168.2.443.154.172.193
                            Dec 10, 2024 20:50:03.119035006 CET804973243.154.172.193192.168.2.4
                            Dec 10, 2024 20:50:11.689459085 CET4973180192.168.2.443.154.172.193
                            Dec 10, 2024 20:50:11.809035063 CET804973143.154.172.193192.168.2.4
                            Dec 10, 2024 20:50:13.127335072 CET4973280192.168.2.443.154.172.193
                            Dec 10, 2024 20:50:13.250214100 CET804973243.154.172.193192.168.2.4
                            Dec 10, 2024 20:50:21.814479113 CET4973180192.168.2.443.154.172.193
                            Dec 10, 2024 20:50:21.936803102 CET804973143.154.172.193192.168.2.4
                            Dec 10, 2024 20:50:23.267589092 CET4973280192.168.2.443.154.172.193
                            Dec 10, 2024 20:50:23.386888981 CET804973243.154.172.193192.168.2.4
                            Dec 10, 2024 20:50:31.939493895 CET4973180192.168.2.443.154.172.193
                            Dec 10, 2024 20:50:32.061321974 CET804973143.154.172.193192.168.2.4
                            Dec 10, 2024 20:50:33.392721891 CET4973280192.168.2.443.154.172.193
                            Dec 10, 2024 20:50:33.512592077 CET804973243.154.172.193192.168.2.4
                            Dec 10, 2024 20:50:42.080100060 CET4973180192.168.2.443.154.172.193
                            Dec 10, 2024 20:50:42.199404001 CET804973143.154.172.193192.168.2.4
                            Dec 10, 2024 20:50:43.517611980 CET4973280192.168.2.443.154.172.193
                            Dec 10, 2024 20:50:43.637032032 CET804973243.154.172.193192.168.2.4
                            Dec 10, 2024 20:50:52.205213070 CET4973180192.168.2.443.154.172.193
                            Dec 10, 2024 20:50:52.324856997 CET804973143.154.172.193192.168.2.4
                            Dec 10, 2024 20:50:53.642636061 CET4973280192.168.2.443.154.172.193
                            Dec 10, 2024 20:50:53.761924982 CET804973243.154.172.193192.168.2.4
                            Dec 10, 2024 20:51:01.958594084 CET4973180192.168.2.443.154.172.193
                            Dec 10, 2024 20:51:02.078104019 CET804973143.154.172.193192.168.2.4
                            Dec 10, 2024 20:51:03.596160889 CET4973280192.168.2.443.154.172.193
                            Dec 10, 2024 20:51:03.715568066 CET804973243.154.172.193192.168.2.4
                            TimestampSource PortDest PortSource IPDest IP
                            Dec 10, 2024 20:48:55.950741053 CET5714753192.168.2.41.1.1.1
                            Dec 10, 2024 20:48:56.088651896 CET53571471.1.1.1192.168.2.4
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Dec 10, 2024 20:48:55.950741053 CET192.168.2.41.1.1.10x3e7bStandard query (0)www.baidu.comA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Dec 10, 2024 20:48:56.088651896 CET1.1.1.1192.168.2.40x3e7bNo error (0)www.baidu.comwww.a.shifen.comCNAME (Canonical name)IN (0x0001)false
                            Dec 10, 2024 20:48:56.088651896 CET1.1.1.1192.168.2.40x3e7bNo error (0)www.a.shifen.comwww.wshifen.comCNAME (Canonical name)IN (0x0001)false
                            Dec 10, 2024 20:48:56.088651896 CET1.1.1.1192.168.2.40x3e7bNo error (0)www.wshifen.com103.235.47.188A (IP address)IN (0x0001)false
                            Dec 10, 2024 20:48:56.088651896 CET1.1.1.1192.168.2.40x3e7bNo error (0)www.wshifen.com103.235.46.96A (IP address)IN (0x0001)false
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.44973143.154.172.193807368C:\Windows\System32\svchost.exe
                            TimestampBytes transferredDirectionData
                            Dec 10, 2024 20:48:57.808696032 CET56OUTData Raw: 21 27 12 28 15 11 15 2d 02 20 1e 23 27 12 2f 0b 0d 2f 02 01 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 1e 1a 3d 38
                            Data Ascii: !'(- #'//::::::::::::::::::::::::::::::::=8
                            Dec 10, 2024 20:48:59.242044926 CET85INData Raw: 1b 1c 23 2b 0e 23 1a 22 2d 2b 26 2b 28 27 2f 1f 01 2d 2f 0f 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3b 3a 3a 3a 5e 3a 3a 3a 27 3a 3a 3a 3a 3a 3a 3a 1e 1a 3d 38 78 9c 63 b2 12 b1 e2 b3 e2 01 92 dc 56 1c 56 9c 60 9a d7 8a df 8a 9a 00 00 bc
                            Data Ascii: #+#"-+&+('/-/::::::::::::::::;:::^:::':::::::=8xcVV`a
                            Dec 10, 2024 20:48:59.340114117 CET830OUTData Raw: 1b 1c 23 2b 0e 23 1a 22 2d 2b 26 2b 28 27 2f 1f 01 2d 2f 0f 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3b 3a 3a 3a 08 13 3a 3a 3c 39 3a 3a 3a 3a 3a 3a 1e 1a 3d 38 78 9c ed 59 df 6b 1a 41 10 2e e6 c5 a8 b5 79 f0 21 48 28 25 94 52 4a e9 53 9f
                            Data Ascii: #+#"-+&+('/-/::::::::::::::::;:::::<9::::::=8xYkA.y!H(%RJSR(aG$!MHITol=\v]7ID(S6A)>%sTG[-S/:--tpLS6\E>8f3{5W`Bk78XR^LwH;NgNjGY|!p
                            Dec 10, 2024 20:49:09.470652103 CET6OUTData Raw: 00
                            Data Ascii:
                            Dec 10, 2024 20:49:19.595693111 CET6OUTData Raw: 00
                            Data Ascii:
                            Dec 10, 2024 20:49:29.720675945 CET6OUTData Raw: 00
                            Data Ascii:
                            Dec 10, 2024 20:49:39.845693111 CET6OUTData Raw: 00
                            Data Ascii:
                            Dec 10, 2024 20:49:49.970822096 CET6OUTData Raw: 00
                            Data Ascii:
                            Dec 10, 2024 20:50:00.095706940 CET6OUTData Raw: 00
                            Data Ascii:
                            Dec 10, 2024 20:50:01.552089930 CET631OUTData Raw: 16 1d 29 2c 29 10 16 1f 04 0f 20 06 2f 07 05 1d 0d 29 2c 1c 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 32 1a 3a 3a 6c 1b 3a 3a 05 38 3a 3a 3a 3a 3a 3a 1e 1a 3d 38 78 9c ed 58 41 4b eb 40 10 86 77 12 de c5 83 07 29 22 22 2a 22 f2 f0 e0 e9 c3
                            Data Ascii: ),) /),::::::::::::::::2::l::8::::::=8xXAK@w)""*"(Hj|4mZQVlSkmk"0~3iEr!FwTA<~\f>v#d%.O9brJ]A\R);$H_$P8f|JK},u)'


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            1192.168.2.44973243.154.172.193807500C:\Windows\System32\svchost.exe
                            TimestampBytes transferredDirectionData
                            Dec 10, 2024 20:49:00.124926090 CET56OUTData Raw: 1b 1c 23 2b 0e 23 1a 22 2d 2b 26 2b 28 27 2f 1f 01 2d 2f 0f 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 1e 1a 3d 38
                            Data Ascii: #+#"-+&+('/-/::::::::::::::::::::::::::::::::=8
                            Dec 10, 2024 20:49:01.652539968 CET85INData Raw: 11 11 1b 15 0e 17 23 20 1c 1f 2a 0c 19 2e 0c 19 0b 19 13 09 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3b 3a 3a 3a 5e 3a 3a 3a 27 3a 3a 3a 3a 3a 3a 3a 1e 1a 3d 38 78 9c 63 b2 12 b1 e2 b3 e2 01 92 dc 56 1c 56 9c 60 9a d7 8a df 8a 9a 00 00 bc
                            Data Ascii: # *.::::::::::::::::;:::^:::':::::::=8xcVV`a
                            Dec 10, 2024 20:49:01.988873959 CET803OUTData Raw: 12 14 03 05 13 0c 2b 20 1d 13 2e 03 02 2b 1f 23 05 20 19 24 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3b 3a 3a 3a 26 13 3a 3a d1 38 3a 3a 3a 3a 3a 3a 1e 1a 3d 38 78 9c ed 58 df 6f 12 41 10 36 f4 85 02 d6 3e f0 d0 90 c6 98 46 8d 31 c6 27 9f
                            Data Ascii: + .+# $::::::::::::::::;:::&::8::::::=8xXoA6>F1'&#HCiiZpD"nofvgvv$H"#/'-1"ehK]G,M)pPl&voSVUv,?Nq3<A_Im)9OS
                            Dec 10, 2024 20:49:12.111279011 CET6OUTData Raw: 00
                            Data Ascii:
                            Dec 10, 2024 20:49:22.236279964 CET6OUTData Raw: 00
                            Data Ascii:
                            Dec 10, 2024 20:49:32.361455917 CET6OUTData Raw: 00
                            Data Ascii:
                            Dec 10, 2024 20:49:42.486428976 CET6OUTData Raw: 00
                            Data Ascii:
                            Dec 10, 2024 20:49:52.611330032 CET6OUTData Raw: 00
                            Data Ascii:
                            Dec 10, 2024 20:50:02.736428976 CET6OUTData Raw: 00
                            Data Ascii:
                            Dec 10, 2024 20:50:02.999219894 CET631OUTData Raw: 15 09 26 1c 24 0b 1e 1c 04 0b 2c 02 0a 05 15 0b 13 07 27 01 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 32 1a 3a 3a 6c 1b 3a 3a 05 38 3a 3a 3a 3a 3a 3a 1e 1a 3d 38 78 9c ed 58 41 4b eb 40 10 86 77 12 de c5 83 07 29 22 22 2a 22 f2 f0 e0 e9 c3
                            Data Ascii: &$,'::::::::::::::::2::l::8::::::=8xXAK@w)""*"(Hj|4mZQVlSkmk"0~3iEr!FwTA<~\f>v#d%.O9brJ]A\R);$H_$P8f|JK},u)'


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:14:48:54
                            Start date:10/12/2024
                            Path:C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exe"
                            Imagebase:0x7ff63a820000
                            File size:2'319'360 bytes
                            MD5 hash:0AA972DC4D2FE4C5F9A7A9D26EA3F51F
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:1
                            Start time:14:48:55
                            Start date:10/12/2024
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                            Imagebase:0x7ff6eef20000
                            File size:55'320 bytes
                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:false

                            Target ID:2
                            Start time:14:48:56
                            Start date:10/12/2024
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\svchost.exe -k netsvcs
                            Imagebase:0x7ff6eef20000
                            File size:55'320 bytes
                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:false

                            Target ID:3
                            Start time:14:48:56
                            Start date:10/12/2024
                            Path:C:\Windows\System32\dllhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}
                            Imagebase:0x7ff70f330000
                            File size:21'312 bytes
                            MD5 hash:08EB78E5BE019DF044C26B14703BD1FA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:false

                            Target ID:4
                            Start time:14:48:57
                            Start date:10/12/2024
                            Path:C:\Program Files\Windows Mail\arphaCrashReport64.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Program Files\Windows Mail\arphaCrashReport64.exe"
                            Imagebase:0x7ff7b5e10000
                            File size:238'384 bytes
                            MD5 hash:8B5D51DF7BBD67AEB51E9B9DEE6BC84A
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Antivirus matches:
                            • Detection: 4%, ReversingLabs
                            Reputation:moderate
                            Has exited:true

                            Target ID:5
                            Start time:14:48:58
                            Start date:10/12/2024
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\svchost.exe -k netsvcs
                            Imagebase:0x7ff6eef20000
                            File size:55'320 bytes
                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:false

                            Target ID:6
                            Start time:14:48:58
                            Start date:10/12/2024
                            Path:C:\Windows\System32\dllhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}
                            Imagebase:0x7ff70f330000
                            File size:21'312 bytes
                            MD5 hash:08EB78E5BE019DF044C26B14703BD1FA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:4.1%
                              Dynamic/Decrypted Code Coverage:19.3%
                              Signature Coverage:26.2%
                              Total number of Nodes:424
                              Total number of Limit Nodes:12
                              execution_graph 49016 180005824 realloc NtQuerySystemInformation 49017 2c44c350000 49018 2c44c350114 49017->49018 49019 2c44c35016b VirtualAlloc 49018->49019 49020 2c44c350191 49019->49020 49023 2c44c350214 49020->49023 49022 2c44c3501a4 49026 2c44c350224 49023->49026 49025 2c44c35021d 49025->49022 49027 2c44c350254 49026->49027 49028 2c44c3502e1 VirtualAlloc 49027->49028 49035 2c44c350336 49027->49035 49029 2c44c3502fe 49028->49029 49030 2c44c350361 VirtualAlloc 49029->49030 49029->49035 49031 2c44c3503b3 49030->49031 49036 2c44c350544 49031->49036 49033 2c44c3503cf 49040 2c44c3508d0 49033->49040 49035->49025 49039 2c44c35056b 49036->49039 49037 2c44c350623 49037->49033 49038 2c44c3505e0 VirtualAlloc 49038->49039 49039->49037 49039->49038 49041 2c44c3508f4 49040->49041 49042 2c44c350ac2 49041->49042 49043 2c44c3509e5 LoadLibraryA 49041->49043 49042->49035 49043->49041 49043->49042 49044 7ff63a89ff49 49047 7ff63a89ff66 49044->49047 49046 7ff63a8a0336 49047->49046 49048 7ff63a8a03fa 49047->49048 49052 7ff63a8b4d5c 49047->49052 49048->49046 49065 7ff63a8348e0 EnterCriticalSection 49048->49065 49050 7ff63a8a0e34 49066 7ff63a834990 LeaveCriticalSection 49050->49066 49053 7ff63a8b4d67 49052->49053 49067 7ff63a9ef810 49053->49067 49055 7ff63a8b4de1 49071 7ff63a9e78a4 49055->49071 49057 7ff63a8b4e00 49074 7ff63a9e7932 49057->49074 49059 7ff63a8b4e57 49064 7ff63a8b56fe 49059->49064 49077 7ff63a9e7cb0 49059->49077 49060 7ff63a8b645e 49060->49048 49064->49060 49080 7ff63a8348e0 EnterCriticalSection 49064->49080 49081 7ff63a834990 LeaveCriticalSection 49064->49081 49065->49050 49066->49046 49068 7ff63a9ef83b 49067->49068 49069 7ff63a9ef986 49068->49069 49082 7ff63a9f0a20 49068->49082 49069->49055 49123 7ff63aa005c4 49071->49123 49073 7ff63a9e78b2 49073->49057 49157 7ff63a9e8ba0 49074->49157 49172 7ff63a9e9660 49077->49172 49080->49064 49081->49064 49083 7ff63a9f0a60 49082->49083 49084 7ff63a9f2437 49083->49084 49085 7ff63a9f0d75 49083->49085 49086 7ff63a9f182c 49083->49086 49084->49069 49092 7ff63aa1189c 49085->49092 49104 7ff63aa11954 49086->49104 49087 7ff63a9f1827 Concurrency::cancel_current_task 49087->49084 49111 7ff63aa02f54 RtlPcToFileHeader RaiseException 49087->49111 49089 7ff63a9f3a5e 49093 7ff63aa118bb 49092->49093 49094 7ff63aa118b1 49092->49094 49096 7ff63aa118c0 49093->49096 49102 7ff63aa118c7 _invalid_parameter_noinfo 49093->49102 49095 7ff63aa11954 12 API calls 49094->49095 49100 7ff63aa118b9 49095->49100 49112 7ff63aa11918 49096->49112 49098 7ff63aa118fa RtlReAllocateHeap 49098->49100 49098->49102 49099 7ff63aa118cd 49118 7ff63aa06db8 11 API calls __std_exception_copy 49099->49118 49100->49087 49102->49098 49102->49099 49119 7ff63aa10c60 EnterCriticalSection LeaveCriticalSection _invalid_parameter_noinfo 49102->49119 49105 7ff63aa1199f 49104->49105 49110 7ff63aa11963 _invalid_parameter_noinfo 49104->49110 49122 7ff63aa06db8 11 API calls __std_exception_copy 49105->49122 49106 7ff63aa11986 HeapAlloc 49108 7ff63aa1199d 49106->49108 49106->49110 49108->49087 49110->49105 49110->49106 49121 7ff63aa10c60 EnterCriticalSection LeaveCriticalSection _invalid_parameter_noinfo 49110->49121 49111->49089 49113 7ff63aa1191d HeapFree 49112->49113 49117 7ff63aa1194c 49112->49117 49114 7ff63aa11938 GetLastError 49113->49114 49113->49117 49115 7ff63aa11945 __free_lconv_mon 49114->49115 49120 7ff63aa06db8 11 API calls __std_exception_copy 49115->49120 49117->49100 49118->49100 49119->49102 49120->49117 49121->49110 49122->49108 49126 7ff63aa0f958 49123->49126 49125 7ff63aa005d2 49127 7ff63aa0f978 49126->49127 49128 7ff63aa0f961 49126->49128 49138 7ff63aa12744 49127->49138 49143 7ff63aa06db8 11 API calls __std_exception_copy 49128->49143 49132 7ff63aa0f966 49144 7ff63aa071c4 52 API calls _invalid_parameter_noinfo 49132->49144 49133 7ff63aa0f971 49133->49125 49147 7ff63aa12140 49138->49147 49143->49132 49144->49133 49148 7ff63aa1219d 49147->49148 49154 7ff63aa12198 __vcrt_FlsGetValue 49147->49154 49156 7ff63aa0f900 52 API calls 2 library calls 49148->49156 49149 7ff63aa121cd LoadLibraryExW 49151 7ff63aa122a2 49149->49151 49152 7ff63aa121f2 GetLastError 49149->49152 49150 7ff63aa122c2 GetProcAddressForCaller 49150->49148 49151->49150 49153 7ff63aa122b9 FreeLibrary 49151->49153 49152->49154 49153->49150 49154->49148 49154->49149 49154->49150 49155 7ff63aa1222c LoadLibraryExW 49154->49155 49155->49151 49155->49154 49158 7ff63a9e8bd6 49157->49158 49161 7ff63aa00600 49158->49161 49162 7ff63aa00609 49161->49162 49163 7ff63a9e7956 49162->49163 49164 7ff63aa00e94 IsProcessorFeaturePresent 49162->49164 49163->49059 49165 7ff63aa00eac 49164->49165 49170 7ff63aa01088 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 49165->49170 49167 7ff63aa00ebf 49171 7ff63aa00e60 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 49167->49171 49170->49167 49173 7ff63a9e7ccd 49172->49173 49174 7ff63a9e967f 49172->49174 49173->49064 49176 7ff63a9e8890 49174->49176 49179 7ff63a9f08a0 49176->49179 49178 7ff63a9e88c5 49178->49173 49181 7ff63a9f08be 49179->49181 49180 7ff63a9f0a09 49180->49178 49181->49180 49182 7ff63a9f0a20 15 API calls 49181->49182 49182->49180 49183 7ff63a823c50 49184 7ff63a823c73 49183->49184 49187 7ff63a85add0 49184->49187 49188 7ff63a85adda 49187->49188 49191 7ff63a85af0d 49188->49191 49293 7ff63a86c98a SwitchToThread SetLastError 49188->49293 49193 7ff63a85b629 49191->49193 49225 7ff63a85cbdd 49191->49225 49229 7ff63a8702e6 49191->49229 49192 7ff63a85b800 49194 7ff63a85bb59 49192->49194 49201 7ff63a86902e 49192->49201 49196 7ff63aa00600 _invalid_parameter_noinfo_noreturn 8 API calls 49193->49196 49194->49225 49256 7ff63a878d5a 49194->49256 49195 7ff63a86c58e GetLastError 49198 7ff63a86c5a9 SetLastError 49195->49198 49199 7ff63a823cae 49196->49199 49198->49193 49200 7ff63a85bc0f 49204 7ff63a85bf68 49200->49204 49205 7ff63a865f1c 49200->49205 49202 7ff63a869e82 WSAGetLastError 49201->49202 49201->49225 49210 7ff63a869ea4 49202->49210 49208 7ff63a85c3c2 49204->49208 49212 7ff63a862dff 49204->49212 49204->49225 49206 7ff63a866d70 WSAGetLastError 49205->49206 49205->49225 49217 7ff63a866d92 49206->49217 49208->49225 49264 7ff63a87b922 49208->49264 49300 7ff63a88166a SetLastError 49210->49300 49211 7ff63a85c46f 49214 7ff63a85c7c8 49211->49214 49221 7ff63a85fced 49211->49221 49212->49225 49297 7ff63a83dde0 GetLastError 49212->49297 49214->49225 49290 7ff63a881260 49214->49290 49299 7ff63a88166a SetLastError 49217->49299 49218 7ff63a85c865 49219 7ff63a85cbba 49218->49219 49228 7ff63a85cbe2 49218->49228 49294 7ff63a843200 ResetEvent 49219->49294 49222 7ff63a860b41 WSAGetLastError 49221->49222 49221->49225 49227 7ff63a860b63 49222->49227 49224 7ff63a863c64 49298 7ff63a88166a SetLastError 49224->49298 49225->49193 49225->49195 49296 7ff63a88166a SetLastError 49227->49296 49228->49225 49295 7ff63a88166a SetLastError 49228->49295 49230 7ff63a8702f1 49229->49230 49301 7ff63a858ab0 StrChrA 49230->49301 49232 7ff63a8703fb 49236 7ff63a87049f 49232->49236 49304 7ff63a83a8c0 49232->49304 49234 7ff63a871ef1 socket 49240 7ff63a871f40 49234->49240 49236->49234 49238 7ff63a87101f 49236->49238 49243 7ff63a871b4f 49236->49243 49253 7ff63a870b63 49236->49253 49349 7ff63a83b700 56 API calls 49236->49349 49239 7ff63a871b2c WSASetLastError 49238->49239 49238->49243 49238->49253 49239->49243 49244 7ff63a87325a 49240->49244 49240->49253 49312 7ff63a83cbf0 WSAIoctl 49240->49312 49350 7ff63a828ae0 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 49240->49350 49243->49234 49243->49253 49247 7ff63a873d71 49244->49247 49317 7ff63a83ced0 49244->49317 49351 7ff63a828ae0 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 49244->49351 49249 7ff63a87488c 49247->49249 49327 7ff63a83ca80 setsockopt 49247->49327 49352 7ff63a828ae0 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 49247->49352 49330 7ff63a88a24e 49249->49330 49251 7ff63a876942 VirtualAlloc 49255 7ff63a8769a9 49251->49255 49253->49192 49254 7ff63a8748b4 49254->49251 49333 7ff63a88acf8 49255->49333 49259 7ff63a878dc6 49256->49259 49257 7ff63aa00600 _invalid_parameter_noinfo_noreturn 8 API calls 49258 7ff63a87b915 49257->49258 49258->49200 49260 7ff63a87acdf 49259->49260 49263 7ff63a8791f4 49259->49263 49427 7ff63a859720 9 API calls 49259->49427 49428 7ff63a83a660 htons 49260->49428 49263->49257 49265 7ff63a87b9d5 49264->49265 49266 7ff63a87bdae 49265->49266 49273 7ff63a87c2d9 49265->49273 49289 7ff63a87c2d2 49265->49289 49267 7ff63a87c202 49266->49267 49266->49289 49268 7ff63a87c223 connect 49267->49268 49270 7ff63a87c2b1 49268->49270 49271 7ff63a87c26e 49268->49271 49270->49289 49271->49270 49272 7ff63a87c293 WSAGetLastError 49271->49272 49272->49270 49275 7ff63a87dcd1 49273->49275 49273->49289 49429 7ff63a83ca20 ioctlsocket 49273->49429 49446 7ff63a828ae0 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 49273->49446 49276 7ff63a87dcf2 connect 49275->49276 49277 7ff63a87dd2e 49276->49277 49278 7ff63a87ddca GetLastError 49277->49278 49279 7ff63a87dde8 49277->49279 49277->49289 49278->49279 49281 7ff63a87e556 49279->49281 49279->49289 49432 7ff63a83dad0 49279->49432 49282 7ff63a87e957 49281->49282 49284 7ff63a8800a6 49281->49284 49281->49289 49283 7ff63a87e9e7 WSAEventSelect 49282->49283 49282->49289 49286 7ff63a87ea3b 49283->49286 49285 7ff63a880ee5 WSASetLastError 49284->49285 49284->49289 49285->49289 49286->49289 49447 7ff63a83dde0 GetLastError 49286->49447 49288 7ff63a87f227 WSASetLastError 49288->49289 49289->49211 49451 7ff63aa06bfc 49290->49451 49292 7ff63a8812b8 49292->49218 49293->49191 49294->49225 49295->49225 49296->49225 49297->49224 49298->49225 49299->49225 49300->49225 49302 7ff63a858b1b lstrlenA 49301->49302 49303 7ff63a858af1 49301->49303 49302->49303 49303->49232 49353 7ff63a83a160 49304->49353 49307 7ff63a83a91a 49361 7ff63a83aa80 49307->49361 49308 7ff63a83a900 49376 7ff63a83a510 11 API calls _invalid_parameter_noinfo_noreturn 49308->49376 49311 7ff63a83a914 49311->49236 49313 7ff63a83ccb7 WSAGetLastError 49312->49313 49314 7ff63a83ccd5 49312->49314 49313->49314 49315 7ff63aa00600 _invalid_parameter_noinfo_noreturn 8 API calls 49314->49315 49316 7ff63a83ccfe 49315->49316 49316->49240 49318 7ff63a83cf31 setsockopt setsockopt 49317->49318 49319 7ff63a83cfb4 49317->49319 49325 7ff63a83d108 49318->49325 49320 7ff63a83cfcc setsockopt setsockopt 49319->49320 49321 7ff63a83d04f 49319->49321 49320->49325 49322 7ff63a83d0e7 SetLastError 49321->49322 49323 7ff63a83d067 setsockopt setsockopt 49321->49323 49322->49325 49323->49325 49324 7ff63aa00600 _invalid_parameter_noinfo_noreturn 8 API calls 49326 7ff63a83d121 49324->49326 49325->49324 49326->49244 49328 7ff63aa00600 _invalid_parameter_noinfo_noreturn 8 API calls 49327->49328 49329 7ff63a83cae6 49328->49329 49329->49247 49390 7ff63a8444c0 49330->49390 49344 7ff63a88ad02 49333->49344 49335 7ff63a88cff5 49336 7ff63a9ee680 15 API calls 49335->49336 49345 7ff63a88d017 49336->49345 49338 7ff63a9ee680 15 API calls 49339 7ff63a895a12 49338->49339 49340 7ff63a9ee680 15 API calls 49339->49340 49341 7ff63a895a35 49340->49341 49342 7ff63aa00600 _invalid_parameter_noinfo_noreturn 8 API calls 49341->49342 49343 7ff63a895a45 49342->49343 49343->49253 49417 7ff63a9ee680 49344->49417 49348 7ff63aa11954 12 API calls 49345->49348 49346 7ff63a88f299 49421 7ff63a8c6d7e 49346->49421 49347 7ff63a8937dd 49347->49338 49348->49346 49349->49238 49354 7ff63a83a18c 49353->49354 49360 7ff63a83a1a7 49353->49360 49355 7ff63a83a1bf StrChrA 49354->49355 49354->49360 49356 7ff63a83a1f7 49355->49356 49355->49360 49377 7ff63a83a400 52 API calls _invalid_parameter_noinfo_noreturn 49356->49377 49357 7ff63aa00600 _invalid_parameter_noinfo_noreturn 8 API calls 49358 7ff63a83a3e8 49357->49358 49358->49307 49358->49308 49360->49357 49362 7ff63a83aab2 _invalid_parameter_noinfo_noreturn 49361->49362 49378 7ff63a83ac80 49362->49378 49364 7ff63a83aafd 49365 7ff63a83ab0a getaddrinfo 49364->49365 49366 7ff63a83ab35 49365->49366 49367 7ff63a83ab51 WSASetLastError 49366->49367 49375 7ff63a83ab6f 49366->49375 49368 7ff63a83ac3b 49367->49368 49369 7ff63aa00600 _invalid_parameter_noinfo_noreturn 8 API calls 49368->49369 49373 7ff63a83ac6f 49369->49373 49370 7ff63a83ac0a freeaddrinfo 49371 7ff63a83ac3d WSASetLastError 49370->49371 49372 7ff63a83ac2c 49370->49372 49371->49368 49381 7ff63a83a660 htons 49372->49381 49373->49311 49375->49370 49376->49311 49377->49360 49382 7ff63a840c70 49378->49382 49381->49368 49383 7ff63a840ca1 49382->49383 49384 7ff63a83acc0 49382->49384 49388 7ff63a840d40 RtlPcToFileHeader RaiseException __std_exception_copy 49383->49388 49384->49364 49386 7ff63a840cf4 49389 7ff63a840f40 54 API calls 49386->49389 49388->49386 49389->49384 49393 7ff63a844b70 49390->49393 49396 7ff63a844ba0 49393->49396 49397 7ff63a844bc2 49396->49397 49400 7ff63a844be0 49397->49400 49401 7ff63a844c1a 49400->49401 49403 7ff63a844c29 49400->49403 49412 7ff63a844d70 RtlPcToFileHeader RaiseException 49401->49412 49406 7ff63a844c42 49403->49406 49413 7ff63a828ae0 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 49403->49413 49405 7ff63a8444e2 49405->49254 49414 7ff63a844200 RtlPcToFileHeader RaiseException 49406->49414 49408 7ff63a844c85 49409 7ff63a844cd3 49408->49409 49415 7ff63a844e50 52 API calls 49408->49415 49416 7ff63a844270 RtlPcToFileHeader RaiseException 49409->49416 49412->49405 49414->49408 49415->49409 49416->49405 49418 7ff63a9ee6be 49417->49418 49419 7ff63a9f0a20 15 API calls 49418->49419 49420 7ff63a9ee830 49418->49420 49419->49420 49420->49335 49422 7ff63a8c6dec 49421->49422 49423 7ff63a8c7252 49422->49423 49426 7ff63a8c72c0 8 API calls _invalid_parameter_noinfo_noreturn 49422->49426 49423->49347 49425 7ff63a8c72b9 49425->49347 49426->49425 49427->49260 49428->49263 49430 7ff63aa00600 _invalid_parameter_noinfo_noreturn 8 API calls 49429->49430 49431 7ff63a83ca69 49430->49431 49431->49273 49433 7ff63a83db6f select 49432->49433 49435 7ff63a83dd12 49433->49435 49436 7ff63a83dcd2 49433->49436 49438 7ff63a83dd31 49435->49438 49439 7ff63a83dd90 __WSAFDIsSet 49435->49439 49444 7ff63a83dce6 49436->49444 49448 7ff63a83dde0 GetLastError 49436->49448 49449 7ff63a83d1a0 9 API calls _invalid_parameter_noinfo_noreturn 49438->49449 49439->49444 49440 7ff63aa00600 _invalid_parameter_noinfo_noreturn 8 API calls 49442 7ff63a83ddc9 49440->49442 49442->49281 49443 7ff63a83dd3b 49443->49444 49450 7ff63a83dde0 GetLastError 49443->49450 49444->49440 49447->49288 49448->49444 49449->49443 49450->49444 49452 7ff63aa06c33 49451->49452 49453 7ff63aa06c1c 49451->49453 49469 7ff63aa06b98 49452->49469 49476 7ff63aa06db8 11 API calls __std_exception_copy 49453->49476 49457 7ff63aa06c21 49477 7ff63aa071c4 52 API calls _invalid_parameter_noinfo 49457->49477 49458 7ff63aa06c46 CreateThread 49460 7ff63aa06c76 GetLastError 49458->49460 49468 7ff63aa06c2c 49458->49468 49478 7ff63aa06d2c 11 API calls 2 library calls 49460->49478 49462 7ff63aa06c83 49463 7ff63aa06c92 49462->49463 49464 7ff63aa06c8c CloseHandle 49462->49464 49465 7ff63aa06ca1 49463->49465 49466 7ff63aa06c9b FreeLibrary 49463->49466 49464->49463 49467 7ff63aa11918 __free_lconv_mon 11 API calls 49465->49467 49466->49465 49467->49468 49468->49292 49479 7ff63aa119b4 49469->49479 49472 7ff63aa11918 __free_lconv_mon 11 API calls 49473 7ff63aa06bc4 49472->49473 49474 7ff63aa06bcd GetModuleHandleExW 49473->49474 49475 7ff63aa06bc9 49473->49475 49474->49475 49475->49458 49475->49468 49476->49457 49477->49468 49478->49462 49480 7ff63aa119c5 _invalid_parameter_noinfo 49479->49480 49481 7ff63aa119fa HeapAlloc 49480->49481 49482 7ff63aa11a16 49480->49482 49486 7ff63aa10c60 EnterCriticalSection LeaveCriticalSection _invalid_parameter_noinfo 49480->49486 49481->49480 49483 7ff63aa06bba 49481->49483 49487 7ff63aa06db8 11 API calls __std_exception_copy 49482->49487 49483->49472 49486->49480 49487->49483 49488 180005a0d GetProcessId 49489 180005a8c 49488->49489 49490 180008e30 RtlAdjustPrivilege 49491 180008eb4 49490->49491 49492 180008eaf 49490->49492 49495 180112460 49491->49495 49497 180112469 49495->49497 49496 180008eb9 49497->49496 49498 180112814 IsProcessorFeaturePresent 49497->49498 49499 18011282c 49498->49499 49504 1801128e8 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 49499->49504 49501 18011283f 49505 1801127e0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 49501->49505 49504->49501 49506 1800080f2 VirtualAllocEx WriteProcessMemory 49507 180008273 memset memcpy NtAlpcConnectPort 49506->49507 49509 7ff63a89e15e WSAEnumNetworkEvents 49510 7ff63a89e21a 49509->49510 49511 18000a8b2 WriteProcessMemory 49512 18000a939 49511->49512 49513 1800054d5 49514 180005524 DuplicateHandle 49513->49514 49515 1800055a7 49514->49515 49516 7ff63a8ae138 49517 7ff63a8ae1ad 49516->49517 49519 7ff63a8ae5d5 49517->49519 49520 7ff63a8a1222 GetLastError 49517->49520 49520->49519 49521 2c44c35070d 49522 2c44c3507c7 49521->49522 49524 2c44c350728 49521->49524 49523 2c44c35074f VirtualFree 49523->49524 49524->49522 49524->49523 49525 2c44c35079d VirtualProtect 49524->49525 49525->49524 49530 7ff63a851140 49533 7ff63a845ae0 49530->49533 49538 7ff63a845b20 49533->49538 49537 7ff63a845b16 49539 7ff63a845b77 WSAStartup 49538->49539 49540 7ff63a845b63 49538->49540 49541 7ff63aa00600 _invalid_parameter_noinfo_noreturn 8 API calls 49539->49541 49540->49539 49542 7ff63a845b0a 49541->49542 49543 7ff63aa0088c 55 API calls 49542->49543 49543->49537 49546 180001920 memset GetModuleFileNameW wcsstr 49547 1800019a8 49546->49547 49548 18000197a IsUserAnAdmin 49546->49548 49579 180001010 59 API calls 49547->49579 49550 180001984 49548->49550 49551 180001995 49548->49551 49558 1800015b0 49550->49558 49554 18000199f ExitProcess 49551->49554 49552 1800019b0 49555 180112460 8 API calls 49552->49555 49557 1800019c0 49555->49557 49559 1800015db malloc 49558->49559 49560 180001893 49558->49560 49559->49560 49562 1800015f7 memcpy malloc 49559->49562 49561 180112460 8 API calls 49560->49561 49563 18000190e ExitProcess 49561->49563 49562->49560 49564 180001625 memset 49562->49564 49565 180001656 49564->49565 49566 18000165b 49564->49566 49567 18000169b memset GetModuleFileNameW malloc 49565->49567 49566->49565 49569 180001682 memcpy 49566->49569 49567->49560 49568 1800016df memset memcpy 49567->49568 49570 180001720 49568->49570 49569->49567 49570->49570 49571 180001773 OpenSCManagerW 49570->49571 49571->49560 49572 18000179b EnumServicesStatusExW malloc 49571->49572 49572->49560 49573 1800017f4 memset EnumServicesStatusExW 49572->49573 49574 180001845 CloseServiceHandle free 49573->49574 49575 180001856 CloseServiceHandle 49573->49575 49574->49560 49575->49560 49576 180001865 49575->49576 49576->49560 49577 180001870 lstrcmpiW 49576->49577 49577->49576 49578 180001895 free 49577->49578 49578->49560 49579->49552 49580 180009bc0 VirtualAllocEx 49581 180009da0 49580->49581

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: mallocmemset$CloseEnumHandleServiceServicesStatusmemcpy$FileManagerModuleNameOpenfreelstrcmpi
                              • String ID: Schedule
                              • API String ID: 3636854120-2739827629
                              • Opcode ID: 70ccbce7ac579554b00e68964982556cd3487ef553e62ff7290f06c43de960f4
                              • Instruction ID: 77915f136d28d9010cc6e861f3bfda285807add5c1f84c5dca0c70953a9b4365
                              • Opcode Fuzzy Hash: 70ccbce7ac579554b00e68964982556cd3487ef553e62ff7290f06c43de960f4
                              • Instruction Fuzzy Hash: A3A1AE36705B8486EBA5CB19E4883EDB7A4F78DB94F54D128EE8903755EF38D648C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: ErrorLast$EventReset
                              • String ID: bh5('$,4=H
                              • API String ID: 3410914340-298069639
                              • Opcode ID: 8bf2926e3c4078e62d6db7854044052cef78856126e4dd2c86e2c5eb1fe41bbb
                              • Instruction ID: c2f58e9707a85c5b8779a351149ce14ca28ff41ccb03bf7b98e34f3b1c5e425b
                              • Opcode Fuzzy Hash: 8bf2926e3c4078e62d6db7854044052cef78856126e4dd2c86e2c5eb1fe41bbb
                              • Instruction Fuzzy Hash: 8574613A90C6D24BE329DF24E8A55FA77E1EB85301F04517AE689C7B56CE3CA405BF40
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: ErrorLast$connect$EventSelectselect
                              • String ID:
                              • API String ID: 2159918928-0
                              • Opcode ID: 02f99bb89bd9bec302923d8007e00a99b7d901f9d53df09aa5ed8d383f7659a2
                              • Instruction ID: 9a30343edcc84cac3d853ef85bf262423c3df1189ffde641f5af2b6cc649ed4e
                              • Opcode Fuzzy Hash: 02f99bb89bd9bec302923d8007e00a99b7d901f9d53df09aa5ed8d383f7659a2
                              • Instruction Fuzzy Hash: 69B3837A90C6D24BE328DF24E8A52BB77E5EB85301F04517AE589C7B56CE3CA405BF40
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: AllocErrorLastVirtualsocket
                              • String ID:
                              • API String ID: 2017719348-0
                              • Opcode ID: e88fd56ae137a1c74461e8097582d2c5e2c0598196ac759611b4794dc1e3bd91
                              • Instruction ID: 8f1cb30022d08910aaf1dfab2d42a03fb3daf46a38b974bb224adfc79228e5d5
                              • Opcode Fuzzy Hash: e88fd56ae137a1c74461e8097582d2c5e2c0598196ac759611b4794dc1e3bd91
                              • Instruction Fuzzy Hash: 1B04803AA086D24FE329DF34D8A56FA37E1EB45309F04517AE549CBB56CE3CA505BB00

                              Control-flow Graph

                              APIs
                              Strings
                              • Dive right in and make a splash,We're throwing a pool party in a flash!Bring your swimsuits and sunscreen galore,We'll turn up the heat and let the good times pour!, xrefs: 0000000180008315
                              • 0, xrefs: 000000018000828B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: AllocAlpcConnectMemoryPortProcessVirtualWritememcpymemset
                              • String ID: 0$Dive right in and make a splash,We're throwing a pool party in a flash!Bring your swimsuits and sunscreen galore,We'll turn up the heat and let the good times pour!
                              • API String ID: 2322259470-3460289035
                              • Opcode ID: 7606ac36fa39d5fba01efb1612d82c7ec8bc058541244c139688a313f2a7d181
                              • Instruction ID: 0b600ae3a3e83453483b19f834bfc71158cd70f74abece231445517b9c63723b
                              • Opcode Fuzzy Hash: 7606ac36fa39d5fba01efb1612d82c7ec8bc058541244c139688a313f2a7d181
                              • Instruction Fuzzy Hash: 35713DB5324EC891EFA5CF65E8587DA6362F788798F80A216DE4D07668DF3CC249C700

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 8957 180009bc0-180009d4a VirtualAllocEx 8958 180009da0-180009da9 8957->8958 8959 180009db1-180009e16 8958->8959 8960 180009dab 8958->8960 8960->8959
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID: @
                              • API String ID: 4275171209-2766056989
                              • Opcode ID: 08567cc30074b475b331b46d2cc87d554941ba0be2af3992f720d6e759045faf
                              • Instruction ID: 13e2f726a9112c9c31c995d983c9da114070f7450b087ebba6d3042457f4b947
                              • Opcode Fuzzy Hash: 08567cc30074b475b331b46d2cc87d554941ba0be2af3992f720d6e759045faf
                              • Instruction Fuzzy Hash: 8F41CF32318B9881EB65CF62F854BD67764F788784F519116EE8D43B14DF38C61AC700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: InformationQuerySystemrealloc
                              • String ID:
                              • API String ID: 4089764311-0
                              • Opcode ID: aa0bfc6469bc17d5eeda48fd87731ce22d6874c3ca3fc959c4416cf641374c4d
                              • Instruction ID: b0525076bbbf58c043072cd616ac76dc382e5d39b6996fcf6a95a9be821e6ce1
                              • Opcode Fuzzy Hash: aa0bfc6469bc17d5eeda48fd87731ce22d6874c3ca3fc959c4416cf641374c4d
                              • Instruction Fuzzy Hash: 27015EB632498485FB55CBA6E86839BB362E38CBD4F44E0269E0D47758CE28C1098700
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: ExceptionFileHeaderRaise
                              • String ID:
                              • API String ID: 2573137834-0
                              • Opcode ID: 002b99e58013bd091bb3f1efd12dfbcd04e87f10befed7b9ccd1c4f08ecaca4e
                              • Instruction ID: a38856f728f8555991ffcbf7557107269382d76837bda7e6ca02a73c7e4aded1
                              • Opcode Fuzzy Hash: 002b99e58013bd091bb3f1efd12dfbcd04e87f10befed7b9ccd1c4f08ecaca4e
                              • Instruction Fuzzy Hash: DE63F867E1C99109E34ACB3498E013D7EE65FC5346B0983BAE54BE771ADD2CA143BB40
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: de33ea6b4f9ce6d4b4402c8e18623ba837b56d9b22b6662e0c33dbf5e61d8208
                              • Instruction ID: 9c50cbf5d08d3b6d4a605893f6b359a3682b26f1feaf6ace4ca51b493498b96a
                              • Opcode Fuzzy Hash: de33ea6b4f9ce6d4b4402c8e18623ba837b56d9b22b6662e0c33dbf5e61d8208
                              • Instruction Fuzzy Hash: 9211BFB1614B8885FB61CFA5E8187C773A0E38D794F45A116DE4E17B64CF38C209C704
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0746b3e73b7ebd77920953652783f00b32297ebf0d4588ce81e063e50ea78c0e
                              • Instruction ID: 6285e803379504e019a6fa47b9c0fbb3e33f29116ca282e56b08782927e6d5e6
                              • Opcode Fuzzy Hash: 0746b3e73b7ebd77920953652783f00b32297ebf0d4588ce81e063e50ea78c0e
                              • Instruction Fuzzy Hash: 6BA2C727E1C9D149D35ACB3498E063A7EE66FC5341F0983B6E14AD375ADE2CA143BB40

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 3158 2c44c3508d0-2c44c3509b2 call 2c44c35004c * 2 call 2c44c3501c4 call 2c44c3501e4 call 2c44c3501c4 call 2c44c3501e4 3171 2c44c3509b8-2c44c3509cc 3158->3171 3172 2c44c350ae3-2c44c350afc 3158->3172 3171->3172 3174 2c44c3509d2-2c44c3509d3 3171->3174 3175 2c44c3509d6-2c44c3509df 3174->3175 3175->3172 3176 2c44c3509e5-2c44c3509f8 LoadLibraryA 3175->3176 3177 2c44c350ae0-2c44c350ae1 3176->3177 3178 2c44c3509fe-2c44c350a17 3176->3178 3177->3172 3180 2c44c350a19-2c44c350a24 3178->3180 3181 2c44c350a26-2c44c350a29 3178->3181 3183 2c44c350a31-2c44c350a37 3180->3183 3181->3183 3184 2c44c350ad2-2c44c350ade 3183->3184 3185 2c44c350a3d-2c44c350a51 3183->3185 3184->3172 3186 2c44c350a55-2c44c350a66 3185->3186 3187 2c44c350a53 3185->3187 3189 2c44c350a68-2c44c350a6b 3186->3189 3190 2c44c350aa7-2c44c350abc 3186->3190 3187->3186 3191 2c44c350a6d-2c44c350a77 3189->3191 3190->3175 3196 2c44c350ac2 3190->3196 3192 2c44c350a79-2c44c350a7d 3191->3192 3193 2c44c350a7f-2c44c350a87 3191->3193 3195 2c44c350a89-2c44c350a92 3192->3195 3193->3195 3198 2c44c350ac4-2c44c350ad0 3195->3198 3199 2c44c350a94-2c44c350aa2 3195->3199 3196->3172 3198->3172 3199->3191 3200 2c44c350aa4 3199->3200 3200->3190
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1682254319.000002C44C350000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C44C350000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2c44c350000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: LibraryLoad
                              • String ID: RtlA$RtlR$ateH$eAll$eHea$eap$l.dl$l.dl$lloc$ntdl$ntdl$ocat
                              • API String ID: 1029625771-3994871222
                              • Opcode ID: b11f4f2f506f70575e309f4ee35f27514d2eccd09e92f81734cd8165a29d1a1f
                              • Instruction ID: 4a7614ff94ff476e892eddc8376722d8b2a31c36151adf110078cc7b047ab8f6
                              • Opcode Fuzzy Hash: b11f4f2f506f70575e309f4ee35f27514d2eccd09e92f81734cd8165a29d1a1f
                              • Instruction Fuzzy Hash: 60710531604E098FFB68EF58C869BAE73E2FF94310F24011AD80AC7285DB35D942CB95

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 5865 7ff63aa12140-7ff63aa12192 5866 7ff63aa12198-7ff63aa1219b 5865->5866 5867 7ff63aa12283 5865->5867 5869 7ff63aa1219d-7ff63aa121a0 5866->5869 5870 7ff63aa121a5-7ff63aa121a8 5866->5870 5868 7ff63aa12285-7ff63aa122a1 5867->5868 5869->5868 5871 7ff63aa12268-7ff63aa1227b 5870->5871 5872 7ff63aa121ae-7ff63aa121bd 5870->5872 5871->5867 5873 7ff63aa121cd-7ff63aa121ec LoadLibraryExW 5872->5873 5874 7ff63aa121bf-7ff63aa121c2 5872->5874 5877 7ff63aa122a2-7ff63aa122b7 5873->5877 5878 7ff63aa121f2-7ff63aa121fb GetLastError 5873->5878 5875 7ff63aa121c8 5874->5875 5876 7ff63aa122c2-7ff63aa122d1 GetProcAddressForCaller 5874->5876 5879 7ff63aa12254-7ff63aa1225b 5875->5879 5881 7ff63aa12261 5876->5881 5882 7ff63aa122d3-7ff63aa122fa 5876->5882 5877->5876 5880 7ff63aa122b9-7ff63aa122bc FreeLibrary 5877->5880 5883 7ff63aa121fd-7ff63aa12214 call 7ff63aa11870 5878->5883 5884 7ff63aa12242-7ff63aa1224c 5878->5884 5879->5872 5879->5881 5880->5876 5881->5871 5882->5868 5883->5884 5887 7ff63aa12216-7ff63aa1222a call 7ff63aa11870 5883->5887 5884->5879 5887->5884 5890 7ff63aa1222c-7ff63aa12240 LoadLibraryExW 5887->5890 5890->5877 5890->5884
                              APIs
                              • FreeLibrary.KERNEL32(?,?,?,00007FF63AA12772,?,?,00000000,00007FF63AA0F985), ref: 00007FF63AA122BC
                              • GetProcAddressForCaller.KERNELBASE(?,?,?,00007FF63AA12772,?,?,00000000,00007FF63AA0F985), ref: 00007FF63AA122C8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: AddressCallerFreeLibraryProc
                              • String ID: api-ms-$ext-ms-
                              • API String ID: 3520295827-537541572
                              • Opcode ID: 2aad29cd30e0b31b49d84af00daefe6c2f6c56548210d022b1ceaf4a48be1a8b
                              • Instruction ID: dc17cf971de90b50960c3df1c92b9c586660ebf49baa7e96bb3c3b902727aaf2
                              • Opcode Fuzzy Hash: 2aad29cd30e0b31b49d84af00daefe6c2f6c56548210d022b1ceaf4a48be1a8b
                              • Instruction Fuzzy Hash: D741D42BB19A5261FA19CB16A80457923D1BF59BE0F494275DD0DC7798DF3CE44AF300

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: memset$malloc$ExitFileModuleNameProcessmemcpy$AdminManagerOpenUserwcsstr
                              • String ID: svchost.exe
                              • API String ID: 2075570005-3106260013
                              • Opcode ID: 45f69df0e4fed2e44586dca63e0d8318bfe1b258da8823836d84a3e13a2394f6
                              • Instruction ID: 5c56fdee547d7df19f87fbfca49010fe5bdf447972866224b63b2f3b95cb53d0
                              • Opcode Fuzzy Hash: 45f69df0e4fed2e44586dca63e0d8318bfe1b258da8823836d84a3e13a2394f6
                              • Instruction Fuzzy Hash: 9D015631311A4D81FBAADB21E8993DA2360BB8D795F449115A95E46695DF3CC34CC740

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: setsockopt
                              • String ID:
                              • API String ID: 3981526788-0
                              • Opcode ID: c38cac35fdacff014c4541e6b4e3abd54bb6126dc4ab5a11cef0fb7acfa13688
                              • Instruction ID: 21396600436127486ce57fe2020f350b3440a6add3b4380b19e70641c4ecd772
                              • Opcode Fuzzy Hash: c38cac35fdacff014c4541e6b4e3abd54bb6126dc4ab5a11cef0fb7acfa13688
                              • Instruction Fuzzy Hash: F0513C7BA192428BD650CF58EC8452AB7A0FB84748B1050B6F68AC3B59DF3CE415BF04

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 7760 2c44c350224-2c44c3502d0 call 2c44c35004c * 4 call 2c44c3501c4 call 2c44c3501e4 7773 2c44c350341 7760->7773 7774 2c44c3502d2-2c44c3502df 7760->7774 7775 2c44c350343-2c44c350360 7773->7775 7774->7773 7776 2c44c3502e1-2c44c3502fc VirtualAlloc 7774->7776 7777 2c44c350317-2c44c350334 7776->7777 7778 2c44c3502fe-2c44c350315 7776->7778 7782 2c44c350336-2c44c35033e 7777->7782 7783 2c44c350361-2c44c3503d6 VirtualAlloc call 2c44c350544 7777->7783 7778->7773 7778->7777 7782->7773 7787 2c44c3503d8-2c44c3503db call 2c44c350834 7783->7787 7788 2c44c3503e0-2c44c3503e3 call 2c44c3508d0 7783->7788 7787->7788 7791 2c44c3503e8-2c44c3503ea 7788->7791 7791->7773 7792 2c44c3503f0-2c44c350407 call 2c44c350638 call 2c44c3507e8 7791->7792 7797 2c44c350409-2c44c35041f 7792->7797 7798 2c44c350428-2c44c35042b 7792->7798 7797->7773 7800 2c44c350425 7797->7800 7798->7775 7800->7798
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1682254319.000002C44C350000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C44C350000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2c44c350000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID: RtlAllocateHeap$l$l.dl$ntdl
                              • API String ID: 4275171209-1387368096
                              • Opcode ID: b4c4ed2c585202e7720ad32f940b49e1e34a84d2224b2416f6ee24bbd427b5d8
                              • Instruction ID: f50c380ceb695c25b9b8704eb03b6a2257c5cc6855730765613b87ffa6f9c6b8
                              • Opcode Fuzzy Hash: b4c4ed2c585202e7720ad32f940b49e1e34a84d2224b2416f6ee24bbd427b5d8
                              • Instruction Fuzzy Hash: C861A470618E084FE75CEF68D89ABAA77E2FB48300F54415ED44AC3292EF35E9418BD5

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: CloseCreateErrorFreeHandleLastLibraryThread_invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 2067211477-0
                              • Opcode ID: bab2295e073a4f6ace4db4130badd438c31a8126a09a57ee1ca7020adb751a51
                              • Instruction ID: e526f6bde380c88bcdf44da40dc33c45bf5b61c5a9f765aaaaec82afaab32623
                              • Opcode Fuzzy Hash: bab2295e073a4f6ace4db4130badd438c31a8126a09a57ee1ca7020adb751a51
                              • Instruction Fuzzy Hash: 5A214F3AA09B4286EF15DF62A410079B3A0EF88B94F084575DE4D83B95DE7CE442B740

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: ErrorLastfreeaddrinfogetaddrinfo
                              • String ID:
                              • API String ID: 1817844550-0
                              • Opcode ID: a6ae1f46db6b9b4b934caf5453b3632453f573c696a1fdf8df20312b1abb7991
                              • Instruction ID: 8ccb7e867f31155852cc71a74fa84d7d89db2f850aecf3bffa5130ac188b6bd6
                              • Opcode Fuzzy Hash: a6ae1f46db6b9b4b934caf5453b3632453f573c696a1fdf8df20312b1abb7991
                              • Instruction Fuzzy Hash: 66510C3AA186858BD754DF19E89076AB3A1FB88744F404075EA8EC3BA5DF7CE415EF00

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 8961 18000ad3e-18000adcc VirtualAllocEx 8962 18000add5 8961->8962 8963 18000adce 8961->8963 8963->8962
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID: @
                              • API String ID: 4275171209-2766056989
                              • Opcode ID: 25e8e2e1e41b46ff06f862ad0091e17087f53469a818b64f494525446fc89b42
                              • Instruction ID: 6b845daad974ccd9c6abd76d61111d535f536517db2d34ef27256cbb8d76cfd7
                              • Opcode Fuzzy Hash: 25e8e2e1e41b46ff06f862ad0091e17087f53469a818b64f494525446fc89b42
                              • Instruction Fuzzy Hash: 7B016DB5729A8C41FBA9CBA1F465BD62360A78DBD4F40A21A9D0E17B55DE2CC2068304

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 8964 7ff63a83dad0-7ff63a83db6b 8965 7ff63a83db6f-7ff63a83db7a 8964->8965 8966 7ff63a83db7c-7ff63a83db8d 8965->8966 8967 7ff63a83dbab-7ff63a83dbb6 8965->8967 8968 7ff63a83db91-7ff63a83dba9 8966->8968 8969 7ff63a83db8f 8966->8969 8970 7ff63a83dbb8-7ff63a83dbcd 8967->8970 8971 7ff63a83dbfe-7ff63a83dc0d 8967->8971 8968->8965 8969->8967 8972 7ff63a83dbfc 8970->8972 8973 7ff63a83dbcf-7ff63a83dbf5 8970->8973 8977 7ff63a83dc11-7ff63a83dc19 8971->8977 8972->8971 8973->8972 8978 7ff63a83dc47-7ff63a83dc4f 8977->8978 8979 7ff63a83dc1b-7ff63a83dc29 8977->8979 8982 7ff63a83dc8b-7ff63a83dcd0 select 8978->8982 8983 7ff63a83dc51-7ff63a83dc63 8978->8983 8980 7ff63a83dc2d-7ff63a83dc45 8979->8980 8981 7ff63a83dc2b 8979->8981 8980->8977 8981->8978 8988 7ff63a83dd12-7ff63a83dd2f call 7ff63aa1df8c 8982->8988 8989 7ff63a83dcd2-7ff63a83dce4 8982->8989 8985 7ff63a83dc89 8983->8985 8986 7ff63a83dc65-7ff63a83dc85 8983->8986 8985->8982 8986->8985 8998 7ff63a83dd31-7ff63a83dd51 call 7ff63a83d1a0 8988->8998 8999 7ff63a83dd90-7ff63a83ddad __WSAFDIsSet 8988->8999 8990 7ff63a83dce6-7ff63a83dcee 8989->8990 8991 7ff63a83dcf0-7ff63a83dd01 call 7ff63a83dde0 8989->8991 8993 7ff63a83dd05-7ff63a83dd0d 8990->8993 8991->8993 8997 7ff63a83ddb1-7ff63a83ddd4 call 7ff63aa00600 8993->8997 9004 7ff63a83dd71-7ff63a83dd82 call 7ff63a83dde0 8998->9004 9005 7ff63a83dd53-7ff63a83dd65 8998->9005 8999->8997 9009 7ff63a83dd86-7ff63a83dd8e 9004->9009 9005->9004 9006 7ff63a83dd67-7ff63a83dd6f 9005->9006 9006->9009 9009->8997
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: ErrorLastselect
                              • String ID:
                              • API String ID: 215497628-0
                              • Opcode ID: dc751306dc8cf1236dd36cb09db1014315388741eb5250ea4012c355936f6198
                              • Instruction ID: 782fe6abee43556343e4741b68fee389f25ed8aeab2eedf9d0acdac94be9f6db
                              • Opcode Fuzzy Hash: dc751306dc8cf1236dd36cb09db1014315388741eb5250ea4012c355936f6198
                              • Instruction Fuzzy Hash: F8910A7AA0C6428BD754CF19EC94639B7A1EB84348F102575E6CAC7B98CF3CE855AF04

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 9010 2c44c35070d-2c44c350722 9011 2c44c350728-2c44c350729 9010->9011 9012 2c44c3507c7-2c44c3507e4 9010->9012 9013 2c44c35072b-2c44c35074d 9011->9013 9014 2c44c350761-2c44c350782 9013->9014 9015 2c44c35074f-2c44c35075f VirtualFree 9013->9015 9017 2c44c350784-2c44c350788 9014->9017 9018 2c44c35079d-2c44c3507ae VirtualProtect 9014->9018 9016 2c44c3507b0-2c44c3507c1 9015->9016 9016->9012 9016->9013 9019 2c44c35078a-2c44c35078e 9017->9019 9020 2c44c350790-2c44c350793 9017->9020 9018->9016 9021 2c44c350799-2c44c35079b 9019->9021 9020->9016 9022 2c44c350795-2c44c350796 9020->9022 9021->9016 9021->9018 9022->9021
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1682254319.000002C44C350000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C44C350000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2c44c350000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: Virtual$FreeProtect
                              • String ID:
                              • API String ID: 2581862158-0
                              • Opcode ID: 88289986f9ffe6edc648fa77a415d0491739a420f0f8400cd95d764a84c61761
                              • Instruction ID: cdedc164e2212d0a4b9b92805b186d1fdc5cf97e3c8a32ccb8931b239639c0a2
                              • Opcode Fuzzy Hash: 88289986f9ffe6edc648fa77a415d0491739a420f0f8400cd95d764a84c61761
                              • Instruction Fuzzy Hash: F231D731658A008BEB2CAE0CE881A7A73D1F755304F38019CD9C7C7187EA3AE9438AD5

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1682254319.000002C44C350000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C44C350000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2c44c350000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID: run
                              • API String ID: 4275171209-1349952704
                              • Opcode ID: e5dc8825a7370ff9ec57641739cdc0d48f865f2156bb471bdecd58f16db5c67c
                              • Instruction ID: eb5100753ffa11912c0aef7650b8fa8d2ac3e99cc592998c70c3b80294fcab92
                              • Opcode Fuzzy Hash: e5dc8825a7370ff9ec57641739cdc0d48f865f2156bb471bdecd58f16db5c67c
                              • Instruction Fuzzy Hash: 6C11B42031494C4BEB48FFA8C894BED72D6FB9C315F150229A84EC3281CD78D9428795

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 9039 7ff63a83cbf0-7ff63a83ccb5 WSAIoctl 9040 7ff63a83ccb7-7ff63a83ccd3 WSAGetLastError 9039->9040 9041 7ff63a83cce6-7ff63a83cd09 call 7ff63aa00600 9039->9041 9042 7ff63a83ccd5-7ff63a83cce0 9040->9042 9043 7ff63a83cce4 9040->9043 9042->9043 9043->9041
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: ErrorIoctlLast
                              • String ID:
                              • API String ID: 4052769934-0
                              • Opcode ID: ed837b09f12dab1b763b41369a70df7f490d427acf7979e47f9f45fbe10ef913
                              • Instruction ID: 56c75ec0e6f7099f0d014bdedb9e94478386da01b81a1cb39aba6044d94bee7a
                              • Opcode Fuzzy Hash: ed837b09f12dab1b763b41369a70df7f490d427acf7979e47f9f45fbe10ef913
                              • Instruction Fuzzy Hash: 7031A476A086818BE750CF58E88472AB7A0FB88754F504169E6C9C3B58DF7CE459EF00
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: EnumEventsNetwork
                              • String ID:
                              • API String ID: 1334179165-0
                              • Opcode ID: 4ebcac89412e7efc30e7a2640db87857a87e6e34a58adc62e6712ee0787db7c2
                              • Instruction ID: ddd9206fb83efc792a7934e2a7d929bfcf1c7c4545564b05144ad3eed489b9e7
                              • Opcode Fuzzy Hash: 4ebcac89412e7efc30e7a2640db87857a87e6e34a58adc62e6712ee0787db7c2
                              • Instruction Fuzzy Hash: 04E1823A90D5D24BE318DF28E8A55BA7BE1AB85301F0451BAE58DC3B56CE3CE405FB44
                              APIs
                              • WSAStartup.WS2_32(?,?,?,?,?,?,?,?,?,?,?,00007FF63A845B0A), ref: 00007FF63A845BD0
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: Startup
                              • String ID:
                              • API String ID: 724789610-0
                              • Opcode ID: d9a925ab13b5f89ad6467af50c660541581057f2aad2aeabf3dab3806dc53e3c
                              • Instruction ID: 55615de80af3eb0568a9147c123993bf1c6791deb57e3cda06965f59356fd887
                              • Opcode Fuzzy Hash: d9a925ab13b5f89ad6467af50c660541581057f2aad2aeabf3dab3806dc53e3c
                              • Instruction Fuzzy Hash: 98216A27F25B648DF704CBB5AC912BC37B4AB18748F1404A9EE8DA7B59CF3C9461A710
                              APIs
                                • Part of subcall function 00007FF63AA11954: HeapAlloc.KERNEL32(?,?,?,00007FF63AA118B9,?,?,00000000,00007FF63AA06A8B,?,?,?,00007FF63AA104D7,?,?,?,00007FF63AA103CD), ref: 00007FF63AA11992
                              • RtlReAllocateHeap.NTDLL(?,?,00000000,00007FF63AA06A8B,?,?,?,00007FF63AA104D7,?,?,?,00007FF63AA103CD,?,?,00000000,00007FF63AA107AE), ref: 00007FF63AA11909
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: Heap$AllocAllocate
                              • String ID:
                              • API String ID: 2177240990-0
                              • Opcode ID: a07a89cb0b122696095850704bbce82ee04866544705d1835cf35ed82e0b98d6
                              • Instruction ID: 44704265435ca92d307767f34d758d4b83f8cf686354e522fa8e57498f77acc6
                              • Opcode Fuzzy Hash: a07a89cb0b122696095850704bbce82ee04866544705d1835cf35ed82e0b98d6
                              • Instruction Fuzzy Hash: D401811FE0C703A0FEA4AB6259402B992D08F547E0F18C6B9E92DC63C2EE2CE4437710
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: e550c5f1444e37c0b1477e103827308c662109d29a65ec8f8fad6b41b1961b1e
                              • Instruction ID: 251b8e02f3a2b925dc00676b0f08ae0c6924386de3889a0ff5d432a66f8cfcc3
                              • Opcode Fuzzy Hash: e550c5f1444e37c0b1477e103827308c662109d29a65ec8f8fad6b41b1961b1e
                              • Instruction Fuzzy Hash: 75012CB5619E8C41FBA9CBA1F464BDA6774E78DB94F40A11ADE0E17B51DF28C20AC304
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: AdjustPrivilege
                              • String ID:
                              • API String ID: 3260937286-0
                              • Opcode ID: 5d6e4b59ff8a6b8225dc495acd6b689647a659c3c95a76a3c66f1975b6b2e2b3
                              • Instruction ID: 006989147f6c0ef173a6ad63e481d54274f3f56e0f4d918a3b7be20be4d5dd86
                              • Opcode Fuzzy Hash: 5d6e4b59ff8a6b8225dc495acd6b689647a659c3c95a76a3c66f1975b6b2e2b3
                              • Instruction Fuzzy Hash: 18F04F3A334F8C81EBE9DB21E85979667A0B74CB98F41A406ED4D43B64CE3DC2158B00
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: Process
                              • String ID:
                              • API String ID: 1235230986-0
                              • Opcode ID: d16e56ca8ceffb6996a770eebb8859cff0112ba79151dc499dea6e218c25d2af
                              • Instruction ID: d652ffa87c38ed1c04ac93e0a0d2335ef1528c7a1f19fbd04ef7ff50280f2555
                              • Opcode Fuzzy Hash: d16e56ca8ceffb6996a770eebb8859cff0112ba79151dc499dea6e218c25d2af
                              • Instruction Fuzzy Hash: 0C018BB271490485EB54CB59E4503AB7371F78DBD8F50A122EF4E87764DF29C256C704
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: MemoryProcessWrite
                              • String ID:
                              • API String ID: 3559483778-0
                              • Opcode ID: 4492a0bf8fcf8f33afd06441f64975728a7ffe302e5029ee3f64efdc84710f0c
                              • Instruction ID: 56856a108c934b35fd8b12db096080665d1aff2e22ecb35535ebb708edeb7d18
                              • Opcode Fuzzy Hash: 4492a0bf8fcf8f33afd06441f64975728a7ffe302e5029ee3f64efdc84710f0c
                              • Instruction Fuzzy Hash: 9101E8B5319E8891FBA9CB52E898386A362A78DBD0F51D1169D0D47768CE2DC109C304
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: MemoryProcessWrite
                              • String ID:
                              • API String ID: 3559483778-0
                              • Opcode ID: a9c6a2df7492c35cbc3cd719515342c8cda296547e204cd9f67484ff88ad8695
                              • Instruction ID: 440d9c2e63d84a318507e4d3145013176a8cc7cafd38941c5fd7eab054e276a3
                              • Opcode Fuzzy Hash: a9c6a2df7492c35cbc3cd719515342c8cda296547e204cd9f67484ff88ad8695
                              • Instruction Fuzzy Hash: 4A013CF5319E8881FBA5CB56E898786A762E78EBD4F41D1168D4D0B768CF3DC109C304
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: MemoryProcessWrite
                              • String ID:
                              • API String ID: 3559483778-0
                              • Opcode ID: 35ffae5299d4c335a8ff36bc6453c7f7216bb7ebbfbf3e1d59d74c353a4e1218
                              • Instruction ID: 24c97e1a4b5bf787aa031fe235fe3c6da918f95ea593df74073bd4adbefb4954
                              • Opcode Fuzzy Hash: 35ffae5299d4c335a8ff36bc6453c7f7216bb7ebbfbf3e1d59d74c353a4e1218
                              • Instruction Fuzzy Hash: 73F03CF5329E9981FBA5CB12EC58786A322F789BD4F41E1168D0D4B768CE2DC2098384
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: setsockopt
                              • String ID:
                              • API String ID: 3981526788-0
                              • Opcode ID: af89ea1b8ec91a43d788d3702766a00663bf58fa3567b022c96e23f12184821a
                              • Instruction ID: ae263206629e885d13e8a5c2ba2c38cfbcb1366c9e579895f02f9fedfa8bdb7f
                              • Opcode Fuzzy Hash: af89ea1b8ec91a43d788d3702766a00663bf58fa3567b022c96e23f12184821a
                              • Instruction Fuzzy Hash: D8F0F93AB286418BE650DF15E84552AB3A0FBC8748F8061A6F68D87719CF3DE016AF04
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 3215553584-0
                              • Opcode ID: 2cf6b01025c55fe36bac35e1374138a8c0fdc424bddf6831c527cfc152c669fd
                              • Instruction ID: 98b0d5ff027dae7e6a4f40d95547a916c494b8b5d6e5adbeb0ce26a37db02fe9
                              • Opcode Fuzzy Hash: 2cf6b01025c55fe36bac35e1374138a8c0fdc424bddf6831c527cfc152c669fd
                              • Instruction Fuzzy Hash: 03E01A6BE0D10296FE14EBA488413BD22905F51349F9150B1E509E63C7CE6E6803B721
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: ioctlsocket
                              • String ID:
                              • API String ID: 3577187118-0
                              • Opcode ID: b0bfba42d1e121afd2aa587a6bf0855246f236eddc80dfa68d8ee748d5dd00b9
                              • Instruction ID: 260fc156134f5811535076656ced86c692557eae0754928fd5952917d47a167a
                              • Opcode Fuzzy Hash: b0bfba42d1e121afd2aa587a6bf0855246f236eddc80dfa68d8ee748d5dd00b9
                              • Instruction Fuzzy Hash: 73E01576A28A808BE650CF15E84512BB3B0FBC8748F809062F69E82718CF3CD016AF00
                              APIs
                              • VirtualAlloc.KERNELBASE(?,00000000,-00000010,-00000001,00000000,00000000,000002C44C3503CF), ref: 000002C44C3505F5
                              Memory Dump Source
                              • Source File: 00000000.00000002.1682254319.000002C44C350000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C44C350000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2c44c350000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 554d3170c60eca2eb45742e049d3fa52307cae005affeb1c7ff9a92fbe018032
                              • Instruction ID: 37fe2a3a1c4bd82a186b72d4e29df732fd80320b2cf561aff8a4f00ec129dad7
                              • Opcode Fuzzy Hash: 554d3170c60eca2eb45742e049d3fa52307cae005affeb1c7ff9a92fbe018032
                              • Instruction Fuzzy Hash: 2631D870618A088FE76CEF69D495B79B3D1FB88351F34052EE18AC3392EA39D8438755
                              APIs
                              • HeapAlloc.KERNEL32(?,?,00000000,00007FF63AA11FBA,?,?,0000AB33D6134830,00007FF63AA06DC1,?,?,?,?,00007FF63AA118D2,?,?,00000000), ref: 00007FF63AA11A09
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: AllocHeap
                              • String ID:
                              • API String ID: 4292702814-0
                              • Opcode ID: a86d170df06594815dba4405610f31e691f9023b579b5647a33137061aee6a42
                              • Instruction ID: 31bcd5c3763e6bcc54b92dcec243e26996138e587ce7e5f49d4e57f842e9567c
                              • Opcode Fuzzy Hash: a86d170df06594815dba4405610f31e691f9023b579b5647a33137061aee6a42
                              • Instruction Fuzzy Hash: 0AF0240FF09207A5FE5957A289003B916900F58B80F0C04B9CD0EC63C2FD6CE8837220
                              APIs
                              • HeapAlloc.KERNEL32(?,?,?,00007FF63AA118B9,?,?,00000000,00007FF63AA06A8B,?,?,?,00007FF63AA104D7,?,?,?,00007FF63AA103CD), ref: 00007FF63AA11992
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: AllocHeap
                              • String ID:
                              • API String ID: 4292702814-0
                              • Opcode ID: 59a06c0fe47b61a158d5c0987dd7de93d021d18a07cf429da4402c5438593290
                              • Instruction ID: db08a0809b9a47cfdfc617dcb0c332066e697bb54a3f3d9e31f4e9ab50ffafa7
                              • Opcode Fuzzy Hash: 59a06c0fe47b61a158d5c0987dd7de93d021d18a07cf429da4402c5438593290
                              • Instruction Fuzzy Hash: 36F08C1FF0C20BA1FE6566A2584037952824F847B0F0816B8ED3ECA3C2FE2DE4837611
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: ErrorLast$File$Creatememset$memcpywsprintf$CloseHandleSleepWrite$AllocThreadmalloc$InitStringVariantVirtual
                              • String ID: %s\%s$\Microsoft\Windows
                              • API String ID: 1085075972-4137575348
                              • Opcode ID: 8ffd0cab172734a36e43c1cf7f5894ebfd94f3a2633384a290ba864bc3d060c0
                              • Instruction ID: 94de6d573fa0d8927b5bb826392d177512a30fcfd5af4058503230c0fb562cf8
                              • Opcode Fuzzy Hash: 8ffd0cab172734a36e43c1cf7f5894ebfd94f3a2633384a290ba864bc3d060c0
                              • Instruction Fuzzy Hash: EDF17A32701F8985F7A6CF64E8487DD33A4F78DBA8F449215EE9A56694EF38C249C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: FromString$CreateInitializeInstance
                              • String ID: :_:$:Y:$:$A::$X:[:$X:^:$Y::$Y:\:$\:[:$\:^:$^:G:
                              • API String ID: 511945936-2205580742
                              • Opcode ID: b21433bbcfd500ff2e1a040f01b86cf70ebae5ae9220c9be1f718c8c064dbea4
                              • Instruction ID: d33754435be79ee62176bbf206138c07fbdd3e121f941c643f14d68da248290d
                              • Opcode Fuzzy Hash: b21433bbcfd500ff2e1a040f01b86cf70ebae5ae9220c9be1f718c8c064dbea4
                              • Instruction Fuzzy Hash: 2291FD73D18BD4CAE311CF7994016EDBB70F799348F14A249EB946A919EB78E684CF00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: String$Alloc$FromInitVariant
                              • String ID: SYSTEM${4c3d624d-fd6b-49a3-b9b7-09cb3cd3f047}
                              • API String ID: 929278495-107290059
                              • Opcode ID: f90c8e403a0b1249590ad1665be699f9ac10e390f971a03fc807c8f653187a63
                              • Instruction ID: e54bcdf9e92cae3ed311456612b02479e66d2eb3af00e5f4fdd7df8a388e748b
                              • Opcode Fuzzy Hash: f90c8e403a0b1249590ad1665be699f9ac10e390f971a03fc807c8f653187a63
                              • Instruction Fuzzy Hash: 6EB1C236B00B558AEB40DF6AD88829D77B1FB88FA9F559016DE0E57B28DF35C189C300
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                              • String ID:
                              • API String ID: 808467561-0
                              • Opcode ID: e6e2a47d0b7aca8797bf2f78af511f090b7de726a253ea606c4e540f123b5b7a
                              • Instruction ID: 4599084cfb13f8c747939fbc3aba35a6bd4e8a08bbcc0f0b71949d4f47730483
                              • Opcode Fuzzy Hash: e6e2a47d0b7aca8797bf2f78af511f090b7de726a253ea606c4e540f123b5b7a
                              • Instruction Fuzzy Hash: 5FB2E0766022998BE7A7CE69D544BED37A5F78C3C8F509125EA0657B88DF34CB48CB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: ErrorLast
                              • String ID: bE|
                              • API String ID: 1452528299-1622097931
                              • Opcode ID: 313a03b3af2a00bfe047cb8b84b9f5c966d05dc480f75a02f31c235431600d44
                              • Instruction ID: 2d6132236d68d9ea414b6aa3b676f864388e886002d5a5989b92f0eca2f6a013
                              • Opcode Fuzzy Hash: 313a03b3af2a00bfe047cb8b84b9f5c966d05dc480f75a02f31c235431600d44
                              • Instruction Fuzzy Hash: A6F16D3AF05645CEE714DBB6D8911BC3BB2AB58748B1004B6EE0EC7755DE38A492FB10
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID: ?Vse4"$NtAlpcConnectPort$NtAlpcCreatePort$NtAlpcSetInformation$TpAllocAlpcCompletion$\RPC Control\$ntdll.dll
                              • API String ID: 0-3440571002
                              • Opcode ID: 3e7f587f86fd0b2bf1a8a0d1d2c8b2dcce1149cee181315916f08b714af195f2
                              • Instruction ID: 8c3100648684ed6cf3a6acba9f1e9974d33f54458c7afc613a7cd7d66638faa8
                              • Opcode Fuzzy Hash: 3e7f587f86fd0b2bf1a8a0d1d2c8b2dcce1149cee181315916f08b714af195f2
                              • Instruction Fuzzy Hash: 53124DF5720E9891EF94CBB9E8687C66362F78D798F81A117DE0D57624DE38C20AC700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: ErrorLast$bindsocket
                              • String ID:
                              • API String ID: 2672188334-0
                              • Opcode ID: 4f19865bda3b12aa65bde297c8eeb848f29aeb92f68061c147d016fa6e1a1ed0
                              • Instruction ID: 9a3bb1e732cb0c0712e98b109c6c475fdfed7866c55f64bf9e3d9985573061d1
                              • Opcode Fuzzy Hash: 4f19865bda3b12aa65bde297c8eeb848f29aeb92f68061c147d016fa6e1a1ed0
                              • Instruction Fuzzy Hash: C4812C7AA0964286EB10DF15F84027AB761FF94748F504076EA8EC3B6ADE3CE445FB44
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: ExceptionThrow
                              • String ID: __restrict$__swift_1$__swift_2$__unaligned$call
                              • API String ID: 432778473-3141380587
                              • Opcode ID: 6a396b12831feff5c6f80a323355d14ea9fae3a8da964f50d645d654625ebbdc
                              • Instruction ID: 673e966dcc0d85f334313fac89718d38bf41ed5ef13417959e8c730922fdb805
                              • Opcode Fuzzy Hash: 6a396b12831feff5c6f80a323355d14ea9fae3a8da964f50d645d654625ebbdc
                              • Instruction Fuzzy Hash: 5C627E72701E8882EB86EB25D4583DD27A1FB8EBD4F408125FA5E577A6DF38C649C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID: gfffffff
                              • API String ID: 3215553584-1523873471
                              • Opcode ID: 2520fe7bf4aaf198221899a8f6838957eb71f23a71b26e0d8cd2dd751d59c1b4
                              • Instruction ID: 7c5b9028af6473dd728daef05391e74bafcea77e80a4e195b251d3550d854208
                              • Opcode Fuzzy Hash: 2520fe7bf4aaf198221899a8f6838957eb71f23a71b26e0d8cd2dd751d59c1b4
                              • Instruction Fuzzy Hash: 869145767057CC86EF97CB2AE4013EDABA5A758BC4F06C022EA5947395DE3DC60AC701
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID: C:\windows\$C:\windows\system32\$WinSta0\Default$taskmgr.exe
                              • API String ID: 0-638001070
                              • Opcode ID: 3c7d1f0fb87f662b2079bad57b09a5afaa48cb8c83d5525282594a227a335d39
                              • Instruction ID: 1bf4e9e1e70513e3816d114cab4aa84c7a719184b3830627372934e1f9606700
                              • Opcode Fuzzy Hash: 3c7d1f0fb87f662b2079bad57b09a5afaa48cb8c83d5525282594a227a335d39
                              • Instruction Fuzzy Hash: 0C8127F5324E9982EF95CBA8F8697D66322F7897D8F80A112CD1E57624DE38D209C704
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID: C:\windows\$C:\windows\system32\$WinSta0\Default$winver.exe
                              • API String ID: 0-1160837885
                              • Opcode ID: 1308d712bd6591429a8d37c48bbd1829232a434116c75b441977ccfa919fa798
                              • Instruction ID: 55855d67a1f766f1614c6ad6b77d44964cb4204ffe99e224a87b86ff19b563fd
                              • Opcode Fuzzy Hash: 1308d712bd6591429a8d37c48bbd1829232a434116c75b441977ccfa919fa798
                              • Instruction Fuzzy Hash: C841A4B5324E9882FF55CB69F8687966322F789BD8F40A116CD5E4B764DE3CC20AC704
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: ErrorLast
                              • String ID:
                              • API String ID: 1452528299-0
                              • Opcode ID: c3dd4c0e9385bfd57a55dd02cfd5c7f506640c84b3a23a86f047f0916954dca1
                              • Instruction ID: f161eab85c47a14871370113dd2e6ced5406633ba5b2ab8c1840f85fc5307754
                              • Opcode Fuzzy Hash: c3dd4c0e9385bfd57a55dd02cfd5c7f506640c84b3a23a86f047f0916954dca1
                              • Instruction Fuzzy Hash: 1273917A9086D24FE328DF3498E52FE37E5AB45309F0451BAE549CBB56CE3CA505BB00
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: memcpy_s
                              • String ID:
                              • API String ID: 1502251526-0
                              • Opcode ID: 4ea583caa57715286bcbaff0c0c248d65fdcd68c244adb70adfc071040c02cb8
                              • Instruction ID: 57088630f82899a46a4f04304140a90d468cb093ad556e4d18a7d8c59b71a2f9
                              • Opcode Fuzzy Hash: 4ea583caa57715286bcbaff0c0c248d65fdcd68c244adb70adfc071040c02cb8
                              • Instruction Fuzzy Hash: 5EC1387671628987EB66CF19E044B9EB791F7987C4F44C125EB4A43B84DB38EA09DB00
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID: YJQ14M
                              • API String ID: 0-2177451014
                              • Opcode ID: 0af040db7df14dfe293f60302d2c0759f28008a493c87d53679fe50132aa8295
                              • Instruction ID: 3ed14adad9bfea343fcbcfb72757ee6228b44ad8786c040b64f481ad888f9b3c
                              • Opcode Fuzzy Hash: 0af040db7df14dfe293f60302d2c0759f28008a493c87d53679fe50132aa8295
                              • Instruction Fuzzy Hash: C3539136A086D24FD329DF38DCA52FA37E5AB45309F04517AE649CBB56CE3CA505BB00
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: ErrorLastRecv
                              • String ID:
                              • API String ID: 904507345-0
                              • Opcode ID: deb7d056b98802d721299dea02c37c7f98589deea631aa3ca4c427b9f49b8a50
                              • Instruction ID: 5c51268f489d967984167efe31b54ac175bc9202bdc655b7045c54123986f0c7
                              • Opcode Fuzzy Hash: deb7d056b98802d721299dea02c37c7f98589deea631aa3ca4c427b9f49b8a50
                              • Instruction Fuzzy Hash: BF214F3AA1C6418BE750CF19E84462A77B0FB88789F101579E68DC7764DF3CE445AF00
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID: 0$ko-KR
                              • API String ID: 3215553584-2196303776
                              • Opcode ID: f96d09346a2f6e77d59369c2194a8b950e6b78dbaa0c336e0d12ce098f52cc8c
                              • Instruction ID: 454ebc8193fa5ca865f8f1965dd2a4e4b4682b0a5584ee5ea9980d899769f2f6
                              • Opcode Fuzzy Hash: f96d09346a2f6e77d59369c2194a8b950e6b78dbaa0c336e0d12ce098f52cc8c
                              • Instruction Fuzzy Hash: 3A71D33521070D82FBFB9A1990807E963A1E74D7C4FA4D126BE49437ABCF35CA4B9705
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID: 0$p
                              • API String ID: 0-2059906072
                              • Opcode ID: e7e5a160b0dc7bf11acf6e058a7a07693b04e0544c402e7120b811fb21f28438
                              • Instruction ID: 3ee67f828506e40d833cc10e170725f94807106ad1cab914bfb00022e22d59fe
                              • Opcode Fuzzy Hash: e7e5a160b0dc7bf11acf6e058a7a07693b04e0544c402e7120b811fb21f28438
                              • Instruction Fuzzy Hash: A731F075605E9D81EB55DF56E894BD62321F388BD8F42A212ED4E0BB24EE3CC15AC700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 3215553584-0
                              • Opcode ID: 9a675805437782ecf3217d5187c311e375e8358acccf04f95891004c6cc889dd
                              • Instruction ID: 1f61cd1c6d9a0cc47e5c3170d1c15f4e9de5b8ae94a737795fa3a990e1df4aaf
                              • Opcode Fuzzy Hash: 9a675805437782ecf3217d5187c311e375e8358acccf04f95891004c6cc889dd
                              • Instruction Fuzzy Hash: 0BA1E67231069881EBA3DB66A8047DAA3A0F78DBD4F549526FE9D07BC4DF78C64D8304
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: _clrfp
                              • String ID:
                              • API String ID: 3618594692-0
                              • Opcode ID: 0e21b991dae342f80746e460734db2b0327f033799438967f91080e093b168d9
                              • Instruction ID: 0593f73a9b31075b8e6bf2cb9e383320a294c5aeb291d1da762f6cdddc12ea76
                              • Opcode Fuzzy Hash: 0e21b991dae342f80746e460734db2b0327f033799438967f91080e093b168d9
                              • Instruction Fuzzy Hash: 10B12B73600B88CBEB56CF29C88679C77A0F349B88F19C916EB59877A8CB35C955C701
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: ExceptionThrow
                              • String ID: l section in CAtlBaseModule
                              • API String ID: 432778473-2709337986
                              • Opcode ID: a127ccbb264a5a4aec1e8b8c97d9fa5e153886bac66a3a6cc8a19aedac249b0e
                              • Instruction ID: 3133a5dfd5f79aac6ce2c53f471fbcfe22b2aa6c2a7d5a5a984ae032cb248d46
                              • Opcode Fuzzy Hash: a127ccbb264a5a4aec1e8b8c97d9fa5e153886bac66a3a6cc8a19aedac249b0e
                              • Instruction Fuzzy Hash: 23027C36600E8886EB96DF25E8443DD73A1FB8DBD5F448526EA4E43BA4DF38C648C700
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID: __restrict
                              • API String ID: 0-803856930
                              • Opcode ID: 5745e3cfed15ffb7b3e2fa7717aad80a57a6249b3a0910dbd319ea413861beba
                              • Instruction ID: 2a1f3f8c5416bf1435224dd1e95b651f0a407b08188742a7ac323c2b5a68232f
                              • Opcode Fuzzy Hash: 5745e3cfed15ffb7b3e2fa7717aad80a57a6249b3a0910dbd319ea413861beba
                              • Instruction Fuzzy Hash: DAF15936601F4886EB928F65D8543DC73A5EB8DBC8F548526FE0E47BA4DE78CB498340
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: InfoSystem
                              • String ID:
                              • API String ID: 31276548-0
                              • Opcode ID: 7b0ed490353ac5753f53b679cf1d633e8f55c468c51ae4daf13fe6cf5aa634ea
                              • Instruction ID: 732050b1d2a1f8be63cebae4dd58888cc8e2297d8cbf8c9517ebdc5a73b95165
                              • Opcode Fuzzy Hash: 7b0ed490353ac5753f53b679cf1d633e8f55c468c51ae4daf13fe6cf5aa634ea
                              • Instruction Fuzzy Hash: 35111C36A1C6018BD764CF19E89152AB7B1FB88748F505076F69EC3769CE3CE401AF44
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: Time$FileSystem
                              • String ID:
                              • API String ID: 2086374402-0
                              • Opcode ID: 2e6cf9f0f265987901d8c94c949428919c05d11ac58600d38c9db5a5ae17beab
                              • Instruction ID: b4c6c11791adae061f0f821324ea7b15046e1cc9d1695e8509bf14a31ca16d38
                              • Opcode Fuzzy Hash: 2e6cf9f0f265987901d8c94c949428919c05d11ac58600d38c9db5a5ae17beab
                              • Instruction Fuzzy Hash: 79F0E2EAB2968843EE14C725D8103A852819F6CBF4F00A331EE3D4EBDAEE1CE0519300
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID: 0-3916222277
                              • Opcode ID: aafb5cdcbcfdbea6ff1b2b0da23af50879320a08883d54d7ebcfe894ebd0289d
                              • Instruction ID: c745d7ff7b1f0a75ae5c573a0f0e0c2e04a98bf62a11adacdef2d0baed7025bd
                              • Opcode Fuzzy Hash: aafb5cdcbcfdbea6ff1b2b0da23af50879320a08883d54d7ebcfe894ebd0289d
                              • Instruction Fuzzy Hash: 82B18D7B908B8586E7A4CF39C45023D3BA0EB59B48F2442B6CA4E87395CF3AD452F701
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID: 0
                              • API String ID: 3215553584-4108050209
                              • Opcode ID: 5f4ddedfd77a8f2be46d5b27c9f7dfb0d5136d7c17e53cee70af679ad4ba4177
                              • Instruction ID: 71f2418fc044250fc616a08c0bb954c8cfb89a1255eab9d4a98bc77a135e3a3b
                              • Opcode Fuzzy Hash: 5f4ddedfd77a8f2be46d5b27c9f7dfb0d5136d7c17e53cee70af679ad4ba4177
                              • Instruction Fuzzy Hash: 5871E235210A0D82FBFB9A29A0407F92392E7487C4F94D016BE46577EACF35CA4B9745
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID: 201ef99a-7fa0-444c-9399-19ba84f12a1a
                              • API String ID: 0-3963691810
                              • Opcode ID: 305143c906e545cbbdba88b15ed8d96aa5c5b1023b370279aab489ed2de4cf70
                              • Instruction ID: f859e3b1c76c282179c02603d62779a177e542a7d14e57d8a75f66858979eba8
                              • Opcode Fuzzy Hash: 305143c906e545cbbdba88b15ed8d96aa5c5b1023b370279aab489ed2de4cf70
                              • Instruction Fuzzy Hash: A54153B1715B9D46EF89CB78D9653A62322FB8C7ACF40A516C90E47765DE38C209C300
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID: ncalrpc
                              • API String ID: 0-2983622238
                              • Opcode ID: 8e139b6873f62461d47cfb06735ed223aa3699eae5bf13dfab6a051279dd2f2d
                              • Instruction ID: 72ca54434e2e545ad87ad6f85711ca4f80c48705b1af1cf0b8a8e1738ac29a0d
                              • Opcode Fuzzy Hash: 8e139b6873f62461d47cfb06735ed223aa3699eae5bf13dfab6a051279dd2f2d
                              • Instruction Fuzzy Hash: 99312FB1721A6952EF49CF78E8687966762F79C794F91E522CE0E4B624DE3CC209C700
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 84d2a2c5cf828a8c708c3c6e26cc7a7284321eea6bb625a0dda2739eaddb4e08
                              • Instruction ID: 5a26b21fd7bf5d12088173a8934af97bd8cbdf1395e93af40d36f716c6ee5359
                              • Opcode Fuzzy Hash: 84d2a2c5cf828a8c708c3c6e26cc7a7284321eea6bb625a0dda2739eaddb4e08
                              • Instruction Fuzzy Hash: F692643690C6D28BE318DF28E4956BAB7E1EB85301F04517AE689C7B56CE3CE405BF00
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2eea02c496926168e0f2016d62dcd4b3212950ef3c49fc117d334fa2024440a6
                              • Instruction ID: d0a3ec819b78b2918788dc213945643c6970b4b6e6736c08cf26c1a16b99101c
                              • Opcode Fuzzy Hash: 2eea02c496926168e0f2016d62dcd4b3212950ef3c49fc117d334fa2024440a6
                              • Instruction Fuzzy Hash: AD82A86791C9D145D356CB34A8E023A7FE56FC5341F0983BAE18AD771AEE2CA143BB40
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3e631ec45a2daf68f48d52614a6345ed429c570a616f22469c908a5fe8b28b5b
                              • Instruction ID: 6d80879f2b6ca484a565809d41c0eb2dabc8ae21e66747f9efe079bfb1bd8c10
                              • Opcode Fuzzy Hash: 3e631ec45a2daf68f48d52614a6345ed429c570a616f22469c908a5fe8b28b5b
                              • Instruction Fuzzy Hash: DA22D177310AA882EB46DB65C0547AC33B6FB48B84F028116FB599B7B1DF38D668C354
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1622125fadd830d72695094e7b85cc31ec002336933b0e724cad098e10e2d7b0
                              • Instruction ID: 946e0dd2bba7b3100fd246393857d7d015b19ff97fe3a12f1d34a5a40530aed8
                              • Opcode Fuzzy Hash: 1622125fadd830d72695094e7b85cc31ec002336933b0e724cad098e10e2d7b0
                              • Instruction Fuzzy Hash: E4E181722046C986EBB2CB15E8943E977A1F78E7D4F84C121EA8A936D5DF78C64DC700
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: cfe71d8e7cd50308ca462f153a194306955503b02d46b76410196ab8a6e65239
                              • Instruction ID: c02e86e1f92cc5576d6cd232989999bceb531278b49536794b781076c4770d9c
                              • Opcode Fuzzy Hash: cfe71d8e7cd50308ca462f153a194306955503b02d46b76410196ab8a6e65239
                              • Instruction Fuzzy Hash: BFE1D032708A848AE793CF68E5803DD77B1F74A7D8F548116EA4E57B99DE38C25AC700
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 16ae51d95b1815005dd45d5e3ab8a349bfdaaf9539e2a3891bf7a9a4281af68b
                              • Instruction ID: 207e761d23252ea67ff1337872d1fa257f2b4668b6d9f4a23401ae9418e5b291
                              • Opcode Fuzzy Hash: 16ae51d95b1815005dd45d5e3ab8a349bfdaaf9539e2a3891bf7a9a4281af68b
                              • Instruction Fuzzy Hash: AFB1AB72A10B8886E352CF39D8457DC37A4F389B88F519216EE4D17B66DF35D689CB00
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 30536b62a6d0da437fd114397cfbd3f50a9eae59392f0b1b67c723097f145a58
                              • Instruction ID: 24312ee17ac27d640e5902fdf911b4c821bd108a67df2382ab98bc71ef406521
                              • Opcode Fuzzy Hash: 30536b62a6d0da437fd114397cfbd3f50a9eae59392f0b1b67c723097f145a58
                              • Instruction Fuzzy Hash: C8410672B10A5886EB14CB64F815B9AB3A8F788794F505025DF8E47B68EF3CC156C700
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bfda2f7c180109932206dffacf20a53aef2a56dc1179a3e9a6f89e125c1a26ad
                              • Instruction ID: 6a73b4ca67aa358b5cca9cf8f50e7addbf38a80432c4fb2377473208703d20e7
                              • Opcode Fuzzy Hash: bfda2f7c180109932206dffacf20a53aef2a56dc1179a3e9a6f89e125c1a26ad
                              • Instruction Fuzzy Hash: 645126E9654B9982EF94DBA9F8693D62322FB497D8F80F112CE1E57724DD38D209C304
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 073128fd360148c17e41ec35af6a18c2df5ced6b4e463a8a16fec66cb74d860e
                              • Instruction ID: b6fa69fb7e3d6089a58b1dc0a55349c666dd73e1d328c0310e1d9ae523244059
                              • Opcode Fuzzy Hash: 073128fd360148c17e41ec35af6a18c2df5ced6b4e463a8a16fec66cb74d860e
                              • Instruction Fuzzy Hash: A351CF32715F8896EB64CB65F94478A73A5F7887C4F54412AEA8E83B28EF3CD119C700
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: de1111058f7c16aa1c110f3b5979ca66c856bb8bda45b3eaebbbd55d773fd606
                              • Instruction ID: 9937fe3f73516922539d469a7d9b5dbd200fa43091dfd9594953e81ca0841af9
                              • Opcode Fuzzy Hash: de1111058f7c16aa1c110f3b5979ca66c856bb8bda45b3eaebbbd55d773fd606
                              • Instruction Fuzzy Hash: 7F51C2B5760E9982EB64CF65E8687D66321FB89BD4F44E126DE0E57B24DE3CC11AC300
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a53c239ed1f9684605d2ef346be0b8bf89de5d156fdc40e0d799da5887b65061
                              • Instruction ID: 211af31c44281ca6c3f3932d9a28d26ed70725301ca9e5a4bb4aa04c7d8998f6
                              • Opcode Fuzzy Hash: a53c239ed1f9684605d2ef346be0b8bf89de5d156fdc40e0d799da5887b65061
                              • Instruction Fuzzy Hash: 25419232310A5886EB85CF6AE954399A391E34CFD4F49D427EE4D97B58DE3CC649C300
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 219bf7831b4ff29649a0959f5cba49ff1e968e7e299094c0451f4ae6976958c1
                              • Instruction ID: 6cb90250f36c561b05bdbfb3a32d9520807f84a022e52005c3b8c35e7831f1c3
                              • Opcode Fuzzy Hash: 219bf7831b4ff29649a0959f5cba49ff1e968e7e299094c0451f4ae6976958c1
                              • Instruction Fuzzy Hash: B54103B3714E4995EB25CF61E86478AB3A5F3887D8F44E126EE4D07A18DF38C246C300
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: eaae997217fc1b3336f25de6e62d34e0746f7d3c2a6a256d0b5f71472e0a0425
                              • Instruction ID: 048e6db2ecfd184872977d7eb727c5e493510e05d032e6f18c4ab6865a9947bf
                              • Opcode Fuzzy Hash: eaae997217fc1b3336f25de6e62d34e0746f7d3c2a6a256d0b5f71472e0a0425
                              • Instruction Fuzzy Hash: B341B37261C6888AF7EB8F15B4847967B91E34E3D0F11C429F94A87691DF79C6888F00
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 59276b993bbd5f607d6d3a9a9acf607f8ad274a0d99c33aa421d3a75b3b8979b
                              • Instruction ID: ea9816badbe891c07a2aded6d1ec92d5857af46983f2473552b7590bc608b90a
                              • Opcode Fuzzy Hash: 59276b993bbd5f607d6d3a9a9acf607f8ad274a0d99c33aa421d3a75b3b8979b
                              • Instruction Fuzzy Hash: 24419D76B20A8886EB14CB65F45479AB365F38CBC4F40912ADE4E53B68DE3CC216C740
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f3a4f3e3c3f40ea96cedb268f2507c4aa92d7cf089ba266e7691892548829ecb
                              • Instruction ID: ff810da637aa1fd401c95da2c6d69315e604f84d2d111450c1a2a7c20e68e2a5
                              • Opcode Fuzzy Hash: f3a4f3e3c3f40ea96cedb268f2507c4aa92d7cf089ba266e7691892548829ecb
                              • Instruction Fuzzy Hash: B941FFB2318F89D6DB54CFA5E4A579A7B61F388788F84901ADE4E47A14DF38C12AC340
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a7caa211d1805da3631b5417297298fbd746491c9ff13b9b06d3acbe089dc0ae
                              • Instruction ID: 1f6bebfb10a220892d2831274fb9d9e41c253fa787b11ea253d3ff134c5c468f
                              • Opcode Fuzzy Hash: a7caa211d1805da3631b5417297298fbd746491c9ff13b9b06d3acbe089dc0ae
                              • Instruction Fuzzy Hash: FF419FB2214F88D2EB54CF55E88478AB7A6F3447C4F94D126EE8D5BA18CF78C15AC740
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9dc054b22e393740934c6599b1190f187be60ae239c821f3ddf288e380813183
                              • Instruction ID: d558cfae5a731fffe16df58c07b62597b32ae423ecf54f032ed4b289fbb168ab
                              • Opcode Fuzzy Hash: 9dc054b22e393740934c6599b1190f187be60ae239c821f3ddf288e380813183
                              • Instruction Fuzzy Hash: 4041D3B2324E4DD2DF48CB15E454B9A7365F748BC8F658216DA4E87768EF39C21AC700
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 711a5f6cc3d39d5f0aef55b7034a878137727931ce5006779a437fec81a29920
                              • Instruction ID: c4b80034388e89da8ffe7b427c8155ba048d36e5b74cf413b7ce4096cc0294b9
                              • Opcode Fuzzy Hash: 711a5f6cc3d39d5f0aef55b7034a878137727931ce5006779a437fec81a29920
                              • Instruction Fuzzy Hash: AC4126B2728E48A2DB14CF25E69878E7762F3443C4F45A206EE4E57328DF39C225C700
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c02ea177d7df7be9d47921f817159e6b389a93a74e3aee8d1a395a9d44e4e98a
                              • Instruction ID: 30f2c0aa2bc627d33595a3753288768bcaf23473739ac437f1ff85fbf168e941
                              • Opcode Fuzzy Hash: c02ea177d7df7be9d47921f817159e6b389a93a74e3aee8d1a395a9d44e4e98a
                              • Instruction Fuzzy Hash: FA31CFB2764E8987EB94CFA4E4657EA3B21F384398F84911BDE4F47A14DE68C01AC341
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c43f2c2cbd10ab131c97a87bfb9a8d77e076664a556218998fa3f3ff93ba8f25
                              • Instruction ID: 42c4d16a0e0d136c5a94160c46d85d5892129638e54f14ca30ac4ff8e229c4e5
                              • Opcode Fuzzy Hash: c43f2c2cbd10ab131c97a87bfb9a8d77e076664a556218998fa3f3ff93ba8f25
                              • Instruction Fuzzy Hash: 65310DF9654B9892EB55DBB8F8697C62322F74D7D8F81B502CE0E27624DE38D209C740
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2bce6376752d693395b932a5d9318ffbe6d4c9bed5557d96fc3b5228a6ed1993
                              • Instruction ID: 91db3ca7ca736f51b2b9f4a1fdda40ff6b442f2c49d3b76bc6f7bd54feb42801
                              • Opcode Fuzzy Hash: 2bce6376752d693395b932a5d9318ffbe6d4c9bed5557d96fc3b5228a6ed1993
                              • Instruction Fuzzy Hash: 2531FBB5314E8481EF99CF66ECA93A66362FB88BE4F54E1168E0F57B64CE3DC1458304
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 11c12f5db1e7ae7d88fc0262756b9d0bf6622ca984ac394aaf837a3336d7d9a4
                              • Instruction ID: b9540b73c02fa2fd8fd9ed4b04a7558bae6bb2522907684b3f8178f982c6447f
                              • Opcode Fuzzy Hash: 11c12f5db1e7ae7d88fc0262756b9d0bf6622ca984ac394aaf837a3336d7d9a4
                              • Instruction Fuzzy Hash: 3F215EF53159A882EB95CF65E8787972322FB49BD8F81E112CD1E57764DE38C209C304
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e74b49f80d6d3cffa9bfb68b489edd80f871d1e69f348bd9d5bedd62bb40d514
                              • Instruction ID: 34ebe62695f2a6a6ea2397927167a92a4784dc70ec7df40509b9419055f8788e
                              • Opcode Fuzzy Hash: e74b49f80d6d3cffa9bfb68b489edd80f871d1e69f348bd9d5bedd62bb40d514
                              • Instruction Fuzzy Hash: 7D31C1F6715A499AEB14CF60E46478AB3A5F3447C8F48E226EA4E47A1CDF78C219C304
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 29ed0da8da41128ee95df92606b628508953cd21a2e597ae56ff743980468b27
                              • Instruction ID: ea228047f8abccb8f34d8cb69d0855da280cee6fe6b78123f25de321abaee775
                              • Opcode Fuzzy Hash: 29ed0da8da41128ee95df92606b628508953cd21a2e597ae56ff743980468b27
                              • Instruction Fuzzy Hash: BD2101B2724E8885EB95CF62E828B9A7361F38CBD4F419126DE4E47B54CE3CC10AC700
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 659e1158283c071cac0272366369d00d1cfa562a966f2f5affa459bf10e8deba
                              • Instruction ID: 6d7058e35041f85eefca8006119c3596d2fa62747ef7dd2be534be946fff4e46
                              • Opcode Fuzzy Hash: 659e1158283c071cac0272366369d00d1cfa562a966f2f5affa459bf10e8deba
                              • Instruction Fuzzy Hash: BB21D5B2764E5892DB59CFB6E864BC63761E759BD4F40A116EE0D57324EE38CA06C300
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 879b8cc6a287b552be2b8c7838c9cf5361018535551b3c5eae2337da7c2a05c9
                              • Instruction ID: 64e956f36281cdf23b4cab459502cafc9c3b83219f603c2a53f066b43bdf7739
                              • Opcode Fuzzy Hash: 879b8cc6a287b552be2b8c7838c9cf5361018535551b3c5eae2337da7c2a05c9
                              • Instruction Fuzzy Hash: 9931A2B2724A49A6DB15CF64D25878E7B62F3443D8F49A206DB0E57628EF39C16AC700
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7643b34bb1144c09516ca8224fed32c138a04b2f755b136cd71388444af2efbb
                              • Instruction ID: 8007ea01a93bf6de8c95f9a16faa5e8d6c04bd6e38d315922757046993a1328b
                              • Opcode Fuzzy Hash: 7643b34bb1144c09516ca8224fed32c138a04b2f755b136cd71388444af2efbb
                              • Instruction Fuzzy Hash: 5F2148F5761EA982EB89CFB5E86979A2321E749BD8F41A112CD0E17724DE2CD6098300
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c104ebe3e0084b9c2d6c68d3b1b1809b1ba36be3a0ef8b7a361271054a232770
                              • Instruction ID: baf3eb62263214422a0973d769ae56c08939dd68f110effc1bb9cb03c9f86de4
                              • Opcode Fuzzy Hash: c104ebe3e0084b9c2d6c68d3b1b1809b1ba36be3a0ef8b7a361271054a232770
                              • Instruction Fuzzy Hash: CE2159F5720AA892EB85CFB4E468BD627A1F74C3A4F81A413DE0D47620EE39C209C300
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f0ba3d73c2f5686b073e58bf77ac5fca37af1a7b10adc11c162e07aac671ca2c
                              • Instruction ID: fb4b37c46674135c9bcda74d3568f44faa2863dc5090cce6e90fb90ae548c0e0
                              • Opcode Fuzzy Hash: f0ba3d73c2f5686b073e58bf77ac5fca37af1a7b10adc11c162e07aac671ca2c
                              • Instruction Fuzzy Hash: 01118EA271498C46FB96DBB4F969BD76322EB4C3A9F80B012DD0D07A55DD3CC24AC700
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0213aaa7a16af12e76c05f13803a6cb1816da3aa76317169f32ff85a43e83aea
                              • Instruction ID: 95480194bb9f6c9ad9d964584a4fad66eb43ce3f3ee230db89eb3e49904c33dd
                              • Opcode Fuzzy Hash: 0213aaa7a16af12e76c05f13803a6cb1816da3aa76317169f32ff85a43e83aea
                              • Instruction Fuzzy Hash: 56210BF2711A5D92EB49DF75D868BD667A2E78CBD4F41E512CD0E5B624DE3CC2098300
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3f85260008f1cca6d719552e34a0840437b2decd6b2aec5b8999dc0ce01bbffe
                              • Instruction ID: 02ba138fbc53fc0a7e206b6c0fccc1f4cb11f22df8a79a790e142c2087e4c986
                              • Opcode Fuzzy Hash: 3f85260008f1cca6d719552e34a0840437b2decd6b2aec5b8999dc0ce01bbffe
                              • Instruction Fuzzy Hash: 48213BB6761A5DC5EF49DF65E868B8A6721F788BD8F41A122CD0E47728DE3CD209C700
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 803c451430e3029bb009500dace81e7bc3217c3b4584f2ef31f91a53a698693d
                              • Instruction ID: 4519c20df033b0754d584584f46a47e9c3f61284702b1b178af72c485ed47193
                              • Opcode Fuzzy Hash: 803c451430e3029bb009500dace81e7bc3217c3b4584f2ef31f91a53a698693d
                              • Instruction Fuzzy Hash: E02160F5714F8482EB45CBB5E8593CA63B1FB897A4F40A506DA4E57A24EE3CD20AC700
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 566796d93a591df3f5db1c38c43d6e1f2c58bb1bf9c844d883f4a478785d6911
                              • Instruction ID: bc53908923a101081ac78a2ff91d1596a8a62396a49556bd27b6b69a29ae519e
                              • Opcode Fuzzy Hash: 566796d93a591df3f5db1c38c43d6e1f2c58bb1bf9c844d883f4a478785d6911
                              • Instruction Fuzzy Hash: 6511E3E262096C82FB59DFA6A869F862332E349BD8F01E123DD5E5B714DD39C10BC300
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3a56065663d7f32470598edd8e4c56aa3322786b1e37be48fd2162c7dda414fd
                              • Instruction ID: 8fbfe2caa4e00eb4ae2a73ae29cd16ebba4a4082f14f5113274d96e794981e6d
                              • Opcode Fuzzy Hash: 3a56065663d7f32470598edd8e4c56aa3322786b1e37be48fd2162c7dda414fd
                              • Instruction Fuzzy Hash: 0721A4B2709A9882EB55CF64E4687977761FB8C798F41A116DE4E47A14EF3DC109C700
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4de039b8aeb4dd7a341e305cb49e7d4a566f2f03f9a363aa92138b342856feec
                              • Instruction ID: 9e59c1c7de84271de07ddad5238888e61d5fae15b8e3d2a62c0818bf1ca1a5d9
                              • Opcode Fuzzy Hash: 4de039b8aeb4dd7a341e305cb49e7d4a566f2f03f9a363aa92138b342856feec
                              • Instruction Fuzzy Hash: 2F1151B5714E9882EB54CB74E46839A6361F7887B8F80A316C92E576E4DF39C10AC744
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b00286fc56aac180519fed44c3472dbbed5625b745e2bf1041001a8241787df3
                              • Instruction ID: 453c13d840d8ab8480c25eabad8a5a4e6cf22c2320a7064174f112572a8564ab
                              • Opcode Fuzzy Hash: b00286fc56aac180519fed44c3472dbbed5625b745e2bf1041001a8241787df3
                              • Instruction Fuzzy Hash: 8E113CE171196846FF89CF65D9697665393EB8C7E4F81E426CE0E8B768ED3CC1098304
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3e6f47147aee9d0c5d2e3a57a73bf876d140cefaec2fbc1aba1964aca6a06b7c
                              • Instruction ID: dcb26d1462b17352493136ca1a284502f5bdb4a1f8be4333a819d013a470b478
                              • Opcode Fuzzy Hash: 3e6f47147aee9d0c5d2e3a57a73bf876d140cefaec2fbc1aba1964aca6a06b7c
                              • Instruction Fuzzy Hash: 3311C2B6624A9E42E709DFF4B424FCA3771E389750F00B517DE4A53510DE38C21AC300
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0e8879920a56ce6d951eaa2299e71384d51284fb55c40a98b48f618b07d76cb7
                              • Instruction ID: 1bcc190078e11d5e3502c0fb8cfdf52a8957de65a2b1b8071e9e04ba3849ecfd
                              • Opcode Fuzzy Hash: 0e8879920a56ce6d951eaa2299e71384d51284fb55c40a98b48f618b07d76cb7
                              • Instruction Fuzzy Hash: 9D1100F5721E9841FB49CB75D4683D66362E788794F80A917CA0F57664DD39C2498340
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 62fa84bd9608fd1e2ded7a46ac84a71bf4807f0703b11cbbff9e650931e748d0
                              • Instruction ID: 81b86e7094c320bcc5e7f926c263843823ab5f04b050e6f3beb40bfc522f2c83
                              • Opcode Fuzzy Hash: 62fa84bd9608fd1e2ded7a46ac84a71bf4807f0703b11cbbff9e650931e748d0
                              • Instruction Fuzzy Hash: 4F114FB5614E9882EB54CB78F4687DA6321F78C798F80B113CD0E57625EE39C21AC340
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 169374a88c9bc48999de202173db2c687a39263e6fb74efa0de97639e935559a
                              • Instruction ID: 58ab01e0f729e006e025e3cd5db47f1a357a7dbbf023e6ea43b04656e7f2b6d0
                              • Opcode Fuzzy Hash: 169374a88c9bc48999de202173db2c687a39263e6fb74efa0de97639e935559a
                              • Instruction Fuzzy Hash: 6A113DB1715E6881EB59CF65E9587866362F74C798F82E122CC4E47728EE39C248C700
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6214b3987fdb11ae9af8bb44ed0752c7393761a47505b246c2a752352195c6b7
                              • Instruction ID: 246bc5305b8913a4d01db227893256f8bf5d597bde7be6eae501e461eb4fa0bc
                              • Opcode Fuzzy Hash: 6214b3987fdb11ae9af8bb44ed0752c7393761a47505b246c2a752352195c6b7
                              • Instruction Fuzzy Hash: A4113CB2711E5C91EB49CF25E868B9A67A1F78CB94F41E526DE0E47768DE3CC209C300
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7a304966c8f6e6c63f3b4d1dc84eaa042215815f68f4f7ed99f7cad32e1286f1
                              • Instruction ID: 91f1bf17694832eb7885352137df2ae2a0c82d5e88c9f87b3bad460dc89f63f9
                              • Opcode Fuzzy Hash: 7a304966c8f6e6c63f3b4d1dc84eaa042215815f68f4f7ed99f7cad32e1286f1
                              • Instruction Fuzzy Hash: 451169F531286D82EB89CF65E929B865322E7487D8F82F112CC0E4B718ED39D109C700
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 214099cfcd0ee3826ed9ef66e5b675abfeddc10177d1ca11de6341e968b0d06b
                              • Instruction ID: 39990edd012c80a11a8c246ade81e0b00b1fb03419df7482220b1a2638345046
                              • Opcode Fuzzy Hash: 214099cfcd0ee3826ed9ef66e5b675abfeddc10177d1ca11de6341e968b0d06b
                              • Instruction Fuzzy Hash: 7E11A5F1330A8886FB95CBB5E8683DA6361E78D7D4F84B012CE0E47765CE28C20AC304
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dcce50d7d365edf9bc1dcf0723df82f9ff79db8457ccb87dc38c7b0742b08610
                              • Instruction ID: 15f0b12e67b83b815c9156cfa897ef3110cdd404d207d48cd89176b21f2d8fa0
                              • Opcode Fuzzy Hash: dcce50d7d365edf9bc1dcf0723df82f9ff79db8457ccb87dc38c7b0742b08610
                              • Instruction Fuzzy Hash: 06015EB5751E6D82EB89DF75E4697DA2320EB48B94F82B512CC0E57320ED3CDA0AC300
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6f73bb3cb6f5cf5abec075b9014cb563e06a4567c89c5d20f7171c5a4b410b69
                              • Instruction ID: 22dcafcaff4b78d83aaf35a6f31f5da21172cbe544e4bfae6083fdcba81ddec3
                              • Opcode Fuzzy Hash: 6f73bb3cb6f5cf5abec075b9014cb563e06a4567c89c5d20f7171c5a4b410b69
                              • Instruction Fuzzy Hash: 080152F5611E9D82EB45CBB9E8A83D76325E78D7E8F40E1128E0E67625DE38C2098300
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 797ab2e302fecb4ee9151d5ec147357b9b6b8374a5a73c2aa17e4c7710b83c27
                              • Instruction ID: c05fe9916e29f3615726ac8ab40efd06a7f832fe150a5180127c36e0d361f74a
                              • Opcode Fuzzy Hash: 797ab2e302fecb4ee9151d5ec147357b9b6b8374a5a73c2aa17e4c7710b83c27
                              • Instruction Fuzzy Hash: 130125F1652E5E82FB59CBA4E569BC66362EB487D8F40F1179D0D07618EE3CD219C304
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c92cc2c6b8134dcd1d90e81fd4ee0dc0e69cf849aebd7e5d77ccca44f26df776
                              • Instruction ID: c5723c18dcfd40d5e26eb64c6513ed8ad7c8279d3e69258c72aec0d621b19a73
                              • Opcode Fuzzy Hash: c92cc2c6b8134dcd1d90e81fd4ee0dc0e69cf849aebd7e5d77ccca44f26df776
                              • Instruction Fuzzy Hash: 15F06871714A548AEBD5CF2CA44276A77D0F30C3C4FA0C519E68983B04D63D8165CF04
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: Handle$AddressCriticalModuleProcSection$CloseConcurrency::cancel_current_taskCountCreateDeleteEventInitializeSpin
                              • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                              • API String ID: 3155888939-3242537097
                              • Opcode ID: 456cf0828f244fa9f043f2ede57b6f3d5d42998ea54c165d75fd4badeee2050d
                              • Instruction ID: f45c82c3cf05bd9411ee428b184992a83db84aca43b38369ab4b3b1726be0204
                              • Opcode Fuzzy Hash: 456cf0828f244fa9f043f2ede57b6f3d5d42998ea54c165d75fd4badeee2050d
                              • Instruction Fuzzy Hash: CB31AF2FE0E60791FE55EB21A8911B82390AF49754F5805B5C95EC27E6EF2CE497F300
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: Value$ErrorLast$Heap$AllocFree
                              • String ID:
                              • API String ID: 570795689-0
                              • Opcode ID: f54a537a96ed41447b78bf41fbc5987a757caf62bd4ec07670b16ced26e7dbf1
                              • Instruction ID: 4c9577ffe488af62fc15fc3f23ee083df6bd9995864cf01834d6a7c5105cf8ab
                              • Opcode Fuzzy Hash: f54a537a96ed41447b78bf41fbc5987a757caf62bd4ec07670b16ced26e7dbf1
                              • Instruction Fuzzy Hash: F8418B2EF0C20261FA6CAB76955657951829F847B4F0457B8E93ECA7C7EF2CB443B240
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: __scrt_fastfail__scrt_is_nonwritable_in_current_image$__scrt_get_show_window_mode__scrt_initialize_crt__scrt_is_managed_app__scrt_release_startup_lock__scrt_uninitialize_crt__security_init_cookie__vcrt_initialize
                              • String ID:
                              • API String ID: 1326835672-0
                              • Opcode ID: 428f1bac40111efcf19b2a06b83d8cc5b337c87ddf82bc9150455d955b8395b0
                              • Instruction ID: 20208a98ab850ec38ed8325cc0af7ea2ed5af357558f35f83d8d5c5aa49ef683
                              • Opcode Fuzzy Hash: 428f1bac40111efcf19b2a06b83d8cc5b337c87ddf82bc9150455d955b8395b0
                              • Instruction Fuzzy Hash: C631923160994C86FBE7BBA5D4523EA2391AB4E3C4F45C425B94A473D7DE28CB4E8350
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: __scrt_fastfail$__scrt_initialize_onexit_tables
                              • String ID: `eh vector vbase constructor iterator'$`local vftable'$`udt returning'$onstructor closure'
                              • API String ID: 2273495996-2419032777
                              • Opcode ID: 371735c951b6f4861318f081dd214222249cf913f5a589c2fbc766e687f75775
                              • Instruction ID: 430d6e6a62d8c94c9c04e7e52013dca82c213aedb955d9ad44379b1780147ad5
                              • Opcode Fuzzy Hash: 371735c951b6f4861318f081dd214222249cf913f5a589c2fbc766e687f75775
                              • Instruction Fuzzy Hash: FF416D35206B4C82FBA79B20E9503EA2361AB4EBD0F54D525E90E477A4DF3CC68E8304
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: ErrorLast$getaddrinfo
                              • String ID:
                              • API String ID: 1863150271-0
                              • Opcode ID: 3ab7f3789c69d25759ce1e405d840cee4a9b37aad97f97ef63cdf665af4b50e3
                              • Instruction ID: 545d9f7bfe54ea0cfbb609cb49ffc59526ca60577e558afeeb5ed3a06b599543
                              • Opcode Fuzzy Hash: 3ab7f3789c69d25759ce1e405d840cee4a9b37aad97f97ef63cdf665af4b50e3
                              • Instruction Fuzzy Hash: BCD1F97AA046C28EE764CF68DC957FC33A0EB05308F104176DA8ADBB99DE38A545F750
                              APIs
                              • GetLastError.KERNEL32(?,?,0000AB33D6134830,00007FF63AA06DC1,?,?,?,?,00007FF63AA118D2,?,?,00000000,00007FF63AA06A8B,?,?,?), ref: 00007FF63AA11F67
                              • FlsSetValue.KERNEL32(?,?,0000AB33D6134830,00007FF63AA06DC1,?,?,?,?,00007FF63AA118D2,?,?,00000000,00007FF63AA06A8B,?,?,?), ref: 00007FF63AA11F9D
                              • FlsSetValue.KERNEL32(?,?,0000AB33D6134830,00007FF63AA06DC1,?,?,?,?,00007FF63AA118D2,?,?,00000000,00007FF63AA06A8B,?,?,?), ref: 00007FF63AA11FCA
                              • FlsSetValue.KERNEL32(?,?,0000AB33D6134830,00007FF63AA06DC1,?,?,?,?,00007FF63AA118D2,?,?,00000000,00007FF63AA06A8B,?,?,?), ref: 00007FF63AA11FDB
                              • FlsSetValue.KERNEL32(?,?,0000AB33D6134830,00007FF63AA06DC1,?,?,?,?,00007FF63AA118D2,?,?,00000000,00007FF63AA06A8B,?,?,?), ref: 00007FF63AA11FEC
                              • SetLastError.KERNEL32(?,?,0000AB33D6134830,00007FF63AA06DC1,?,?,?,?,00007FF63AA118D2,?,?,00000000,00007FF63AA06A8B,?,?,?), ref: 00007FF63AA12007
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: Value$ErrorLast
                              • String ID:
                              • API String ID: 2506987500-0
                              • Opcode ID: e949273b2c3ea89ca499fa59f06e19895faa38472840ef02cd909f44e0e6d6b5
                              • Instruction ID: 262700523e9251b850b684e31714bcfc174c6027b5af03f9f4ba045d6852b806
                              • Opcode Fuzzy Hash: e949273b2c3ea89ca499fa59f06e19895faa38472840ef02cd909f44e0e6d6b5
                              • Instruction Fuzzy Hash: E1115E2AF0C64262FA58A735955507951529F887B0F0457B9E93E8A7C6EF2CE443B240
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 02607e3ea6a6cbde8c449cd7ea7a6c92e19837db6bf69292a951a97f045f3720
                              • Instruction ID: 8d07993580eb316db12cacc2ad889aa3ae3eb761326deed1bfbfd3a2dc7918dd
                              • Opcode Fuzzy Hash: 02607e3ea6a6cbde8c449cd7ea7a6c92e19837db6bf69292a951a97f045f3720
                              • Instruction Fuzzy Hash: 8D512C3AE0964186D760DB19E84032DB7E0FB89B94F500176EA8DC7B65DF3DD945EB00
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: _set_statfp
                              • String ID:
                              • API String ID: 1156100317-0
                              • Opcode ID: a2ede21bcdb1ffc6f849cceea62f3b27e54c7ac4f1c2c35b27aa84f998c663a0
                              • Instruction ID: 3b9bd57b40fff3d8961f464b14179896b260d9c17b5d0c480fa0c6cf32fa7499
                              • Opcode Fuzzy Hash: a2ede21bcdb1ffc6f849cceea62f3b27e54c7ac4f1c2c35b27aa84f998c663a0
                              • Instruction Fuzzy Hash: CB117732690A4D01F7E72129D4553F93340AB6D3F4F45C634BA76976D6CE248BC94302
                              APIs
                              • FlsGetValue.KERNEL32(?,?,?,00007FF63AA06E87,?,?,00000000,00007FF63AA07122,?,?,?,?,?,00007FF63AA070AE), ref: 00007FF63AA1203F
                              • FlsSetValue.KERNEL32(?,?,?,00007FF63AA06E87,?,?,00000000,00007FF63AA07122,?,?,?,?,?,00007FF63AA070AE), ref: 00007FF63AA1205E
                              • FlsSetValue.KERNEL32(?,?,?,00007FF63AA06E87,?,?,00000000,00007FF63AA07122,?,?,?,?,?,00007FF63AA070AE), ref: 00007FF63AA12086
                              • FlsSetValue.KERNEL32(?,?,?,00007FF63AA06E87,?,?,00000000,00007FF63AA07122,?,?,?,?,?,00007FF63AA070AE), ref: 00007FF63AA12097
                              • FlsSetValue.KERNEL32(?,?,?,00007FF63AA06E87,?,?,00000000,00007FF63AA07122,?,?,?,?,?,00007FF63AA070AE), ref: 00007FF63AA120A8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: 508e6e9c78b503bd6e6858421807a47fabaaeab8f9327a6f5af0b34ee76a4e74
                              • Instruction ID: b2b937397c3d0b59c2c747940914341afc0a8a281b0995e1719e8c5c08baf456
                              • Opcode Fuzzy Hash: 508e6e9c78b503bd6e6858421807a47fabaaeab8f9327a6f5af0b34ee76a4e74
                              • Instruction Fuzzy Hash: B2115E2AF0C64261FA9C9B36955117AA1519F843F0F0457B4E93ECA7D6EE2CE847B200
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID: *$ko-KR
                              • API String ID: 3215553584-1095117856
                              • Opcode ID: 86bec7efc410530c5bc9a2fbb52b1d77945cde645c424444667ef471f83eee53
                              • Instruction ID: 247b425bc4075f99800c1718c7ffe54540729addd1f222e63731e205efc231c0
                              • Opcode Fuzzy Hash: 86bec7efc410530c5bc9a2fbb52b1d77945cde645c424444667ef471f83eee53
                              • Instruction Fuzzy Hash: B0718F72504E58C6E7FA9F2980443BC3BA0F34DBD8F649216EA4646399DF31CA8AC750
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID: __swift_1$__swift_2
                              • API String ID: 0-2914474356
                              • Opcode ID: 032175703d403af43845841e7270c54589e151d9aabe520c8013fad0eb530d90
                              • Instruction ID: e36f902788c0381efdc077c6dc949100de42eee437ea8b415927d241f746463c
                              • Opcode Fuzzy Hash: 032175703d403af43845841e7270c54589e151d9aabe520c8013fad0eb530d90
                              • Instruction Fuzzy Hash: CF618E32300A8882EF96DB29E5447E963A1FB4CBD4F488525EF6D4779ADF38D645C340
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: CurrentEventThread$CompletionQueuedStatus
                              • String ID:
                              • API String ID: 4264545264-0
                              • Opcode ID: 1b28333e9a064f05924e3232a690e3fe8b8fb33e4e0023a33cbc503318eeb41a
                              • Instruction ID: db36a01fbf330bd4f8b63ba9ac1a0e58735f2ca7652e446d4af2f89aab2b64fc
                              • Opcode Fuzzy Hash: 1b28333e9a064f05924e3232a690e3fe8b8fb33e4e0023a33cbc503318eeb41a
                              • Instruction Fuzzy Hash: 5841F73AE08A46DEEB10DF65D8502BC3770AB48758F100176DE1ED77A9DE38D445E700
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID:
                              • String ID: izS
                              • API String ID: 0-2683680911
                              • Opcode ID: d21331b86481145414d3d1cfdf5b5b21ff80e7c9c5733e4e61133430bfb5b53e
                              • Instruction ID: b68dc50ac5b9bda971b7cb2adfa468a4a3bc1ff2c621cd421741ca7f6ab28ccc
                              • Opcode Fuzzy Hash: d21331b86481145414d3d1cfdf5b5b21ff80e7c9c5733e4e61133430bfb5b53e
                              • Instruction Fuzzy Hash: 62F1F97AE095028FE754CF68D8906BC37A0FB44348B10447AE65ED7799DF38E896EB40
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID: gfff$o-l1-2-1
                              • API String ID: 3215553584-1082851355
                              • Opcode ID: 12dcbdbdd5235fb1b6ab94a0cc892e5fb23d71a1fe9ba5ecef1039a303d64847
                              • Instruction ID: 4e08fe91d50fd43471445e9309ac5ad4362738dffbe45d8770cad9fb3b789804
                              • Opcode Fuzzy Hash: 12dcbdbdd5235fb1b6ab94a0cc892e5fb23d71a1fe9ba5ecef1039a303d64847
                              • Instruction Fuzzy Hash: 5951F4737147C886E7A78B35E9413997B91E399BD0F48D221EB944BAD6CE38C698C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID: api-ms-win-core-sysinfo-l1-2-1$synch-l1-2-0
                              • API String ID: 3215553584-688204690
                              • Opcode ID: 0f102de843e7ec0c7a5e751bb160ca61ca373fda3eee5e3f3a8aa3db407457e4
                              • Instruction ID: 9d4985de47fc3aa1ddc341b920f7898ed377652abc42465d74999370fa1411ca
                              • Opcode Fuzzy Hash: 0f102de843e7ec0c7a5e751bb160ca61ca373fda3eee5e3f3a8aa3db407457e4
                              • Instruction Fuzzy Hash: 86418E72705F888AE782CF65E8507CE73A5F7193C8F518126EA9807B99DF38C629C340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: DestructExceptionObject$__vcrt_getptd_noexit
                              • String ID: csm
                              • API String ID: 3780691363-1018135373
                              • Opcode ID: d49d3c1e60c3354247970e5f405f23988a7ea1f58b6bb3f0a1cf52d8215e401e
                              • Instruction ID: 011c5e600e2baba1b5aebe761702f78806dc8dec4a9d5acc90072a234146c346
                              • Opcode Fuzzy Hash: d49d3c1e60c3354247970e5f405f23988a7ea1f58b6bb3f0a1cf52d8215e401e
                              • Instruction Fuzzy Hash: 40212D76204A4887E7B2DF15E05079E7760F39DBE4F008206EEA943795CF39DA8ACB01
                              APIs
                              • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF63AA016C3), ref: 00007FF63AA02F98
                              • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF63AA016C3), ref: 00007FF63AA02FDE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1687846460.00007FF63A821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63A820000, based on PE: true
                              • Associated: 00000000.00000002.1687810796.00007FF63A820000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688096510.00007FF63AA1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688135047.00007FF63AA39000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688172175.00007FF63AA50000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1688228946.00007FF63AA53000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff63a820000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: ExceptionFileHeaderRaise
                              • String ID: csm
                              • API String ID: 2573137834-1018135373
                              • Opcode ID: c69def4a9b69ec68cdadcbf7e6dc0b15355863e04cf7ca90672bcfc62912cc36
                              • Instruction ID: 7ae7bffd96e33fc05cd03e21e9b737bda3e4a8f9f456e0076dbadc6be4e3b7e0
                              • Opcode Fuzzy Hash: c69def4a9b69ec68cdadcbf7e6dc0b15355863e04cf7ca90672bcfc62912cc36
                              • Instruction Fuzzy Hash: 2E118F37608B8182EB158F25E400269B7E1FB88B98F184275EF8D47B58DF3CC566DB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: __std_exception_copy
                              • String ID: `vector destructor iterator'$nt delete closure'
                              • API String ID: 592178966-1611991873
                              • Opcode ID: 180211b27f776a29354646e6639c5d344605f4a19a09db6ac079198205e274bc
                              • Instruction ID: c8ada3eb98077b3e77d28a4839308a809c4d6d91d1a7368aad5ed78790c858ba
                              • Opcode Fuzzy Hash: 180211b27f776a29354646e6639c5d344605f4a19a09db6ac079198205e274bc
                              • Instruction Fuzzy Hash: 9EE01AB1200B0490DB068F65E8513E873A4EB4CB90F48C032AA5C47354EF38C6A9C301
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1681341231.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                              • Associated: 00000000.00000002.1681121772.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681676774.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681702262.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                              • Associated: 00000000.00000002.1681724362.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                              Similarity
                              • API ID: ExceptionThrowstd::bad_alloc::bad_alloc
                              • String ID: File
                              • API String ID: 932687459-749574446
                              • Opcode ID: 5cc107604c7e858ffc48b5ed233f99d9330b9e91bd1076a405a7e456ecbb9fc9
                              • Instruction ID: 9145d171dbcecb2188c45693134888adfda474ee1ae56853841174419c243042
                              • Opcode Fuzzy Hash: 5cc107604c7e858ffc48b5ed233f99d9330b9e91bd1076a405a7e456ecbb9fc9
                              • Instruction Fuzzy Hash: 49C08C3221488D91EB62EB10E8917DA5330B7A8384F818111F19C824B69F1CC30ECB00