Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2024-12-10#U67e5#U9605_uninst.exe

Overview

General Information

Sample name:2024-12-10#U67e5#U9605_uninst.exe
renamed because original name is a hash value
Original sample name:2024-12-10_uninst.exe
Analysis ID:1572748
MD5:0aa972dc4d2fe4c5f9a7a9d26ea3f51f
SHA1:2e141f8072836b479572b1d7fa468727011601eb
SHA256:bb1d91e8f93a1b08b098969e48a12d2f2b8203a30de0c3d85ec8cd36a3fa8049
Tags:exeSilverFoxuser-NDA0E
Infos:

Detection

ValleyRAT
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Benign windows process drops PE files
Yara detected ValleyRAT
AI detected suspicious sample
Allocates memory in foreign processes
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Deletes itself after installation
Found direct / indirect Syscall (likely to bypass EDR)
Found evasive API chain checking for user administrative privileges
Hijacks the control flow in another process
Modifies the context of a thread in another process (thread injection)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to communicate with device drivers
Contains functionality to create guard pages, often used to hinder reverse usering and debugging
Contains functionality to create new users
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to enumerate network shares
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a process as a different user
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Tries to disable installed Antivirus / HIPS / PFW
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 2024-12-10#U67e5#U9605_uninst.exe (PID: 5044 cmdline: "C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exe" MD5: 0AA972DC4D2FE4C5F9A7A9D26EA3F51F)
    • svchost.exe (PID: 1064 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • svchost.exe (PID: 5164 cmdline: C:\Windows\system32\svchost.exe -k netsvcs MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • dllhost.exe (PID: 4364 cmdline: C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233} MD5: 08EB78E5BE019DF044C26B14703BD1FA)
      • arphaCrashReport64.exe (PID: 2740 cmdline: "C:\Program Files\Windows Mail\arphaCrashReport64.exe" MD5: 8B5D51DF7BBD67AEB51E9B9DEE6BC84A)
      • svchost.exe (PID: 6464 cmdline: C:\Windows\system32\svchost.exe -k netsvcs MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • dllhost.exe (PID: 5196 cmdline: C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233} MD5: 08EB78E5BE019DF044C26B14703BD1FA)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: svchost.exe PID: 1064JoeSecurity_ValleyRATYara detected ValleyRATJoe Security
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule, CommandLine: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exe", ParentImage: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exe, ParentProcessId: 5044, ParentProcessName: 2024-12-10#U67e5#U9605_uninst.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule, ProcessId: 1064, ProcessName: svchost.exe
    Source: Process startedAuthor: vburov: Data: Command: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule, CommandLine: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exe", ParentImage: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exe, ParentProcessId: 5044, ParentProcessName: 2024-12-10#U67e5#U9605_uninst.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule, ProcessId: 1064, ProcessName: svchost.exe
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
    Source: C:\Windows\System32\svchost.exeDirectory created: C:\Program Files\Windows Mail\arphaCrashReport64.exeJump to behavior
    Source: C:\Windows\System32\svchost.exeDirectory created: C:\Program Files\Windows Mail\arphaDump64.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeDirectory created: C:\Program Files\Windows Mail\arphaDump64.binJump to behavior
    Source: 2024-12-10#U67e5#U9605_uninst.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: Binary string: D:\Build\PX\A\PoisonX\nvsphelperplugin64\x64\Release\arphaDump64.pdb source: 2024-12-10#U67e5#U9605_uninst.exe, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2146480784.000001BCF0610000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.3987451786.00000200A2530000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3982177497.0000000180001000.00000020.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe, 00000005.00000002.2164041872.0000000180039000.00000002.00000001.01000000.00000005.sdmp, arphaDump64.dll.2.dr
    Source: Binary string: D:\jenkins\workspace\ci.arphasdk.build\qtc_out\Release_X64\arphaCrashReport64.exe.pdb source: 2024-12-10#U67e5#U9605_uninst.exe, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2146480784.000001BCF0610000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.3987451786.00000200A2530000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3982177497.0000000180001000.00000020.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe, 00000005.00000002.2172528768.00007FF6DD4A2000.00000002.00000001.01000000.00000004.sdmp, arphaCrashReport64.exe, 00000005.00000000.2156482490.00007FF6DD4A2000.00000002.00000001.01000000.00000004.sdmp, arphaCrashReport64.exe.2.dr
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2706810 NetUserEnum,lstrlenW,NetApiBufferFree,malloc,VirtualFree,VirtualFree,free,VirtualFree,VirtualFree,2_2_00000200A2706810
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B86810 NetUserEnum,lstrlenW,NetApiBufferFree,malloc,VirtualFree,VirtualFree,free,VirtualFree,VirtualFree,2_2_00000200A2B86810
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180026810 NetUserEnum,lstrlenW,NetApiBufferFree,malloc,VirtualFree,VirtualFree,free,VirtualFree,VirtualFree,3_2_0000000180026810
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_0000000180026810 NetUserEnum,lstrlenW,NetApiBufferFree,malloc,VirtualFree,VirtualFree,free,VirtualFree,VirtualFree,4_2_0000000180026810
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FE210 __chkstk,memset,memset,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,memset,lstrcatW,lstrcatW,lstrcatW,Sleep,lstrlenW,wcsstr,GetCurrentThread,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,LeaveCriticalSection,WaitForSingleObject,VirtualFree,VirtualFree,2_2_00000200A26FE210
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FC850 memset,lstrcatW,lstrcatW,memset,FindFirstFileW,FindNextFileW,FindNextFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_00000200A26FC850
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FCCF0 memset,memset,memset,memset,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,memset,memset,wsprintfW,wsprintfW,FindFirstFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,memset,memset,wsprintfW,FindFirstFileW,FindNextFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,memset,memset,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,FindNextFileW,FindNextFileW,lstrlenW,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_00000200A26FCCF0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FDDD0 malloc,memset,FindFirstFileW,free,2_2_00000200A26FDDD0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B7CCF0 memset,memset,memset,memset,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,memset,memset,wsprintfW,wsprintfW,FindFirstFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,memset,memset,wsprintfW,FindFirstFileW,FindNextFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,memset,memset,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,FindNextFileW,FindNextFileW,lstrlenW,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_00000200A2B7CCF0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B7DDD0 malloc,memset,FindFirstFileW,free,2_2_00000200A2B7DDD0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B7E210 __chkstk,memset,memset,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,memset,lstrcatW,lstrcatW,lstrcatW,Sleep,lstrlenW,wcsstr,GetCurrentThread,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,LeaveCriticalSection,WaitForSingleObject,VirtualFree,VirtualFree,2_2_00000200A2B7E210
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B7C850 memset,lstrcatW,lstrcatW,memset,FindFirstFileW,FindNextFileW,FindNextFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_00000200A2B7C850
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018001E210 __chkstk,memset,memset,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,memset,lstrcatW,lstrcatW,lstrcatW,Sleep,lstrlenW,wcsstr,GetCurrentThread,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,LeaveCriticalSection,WaitForSingleObject,VirtualFree,VirtualFree,3_2_000000018001E210
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018001C850 memset,lstrcatW,lstrcatW,memset,FindFirstFileW,FindNextFileW,FindNextFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000000018001C850
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018001CCF0 memset,memset,memset,memset,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,memset,memset,wsprintfW,wsprintfW,FindFirstFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,memset,memset,wsprintfW,FindFirstFileW,FindNextFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,memset,memset,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,FindNextFileW,FindNextFileW,lstrlenW,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000000018001CCF0
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018001DDD0 malloc,memset,FindFirstFileW,free,3_2_000000018001DDD0
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_000000018001E210 __chkstk,memset,memset,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,memset,lstrcatW,lstrcatW,lstrcatW,Sleep,lstrlenW,wcsstr,GetCurrentThread,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,LeaveCriticalSection,WaitForSingleObject,VirtualFree,VirtualFree,4_2_000000018001E210
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_000000018001C850 memset,lstrcatW,lstrcatW,memset,FindFirstFileW,FindNextFileW,FindNextFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,4_2_000000018001C850
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_000000018001CCF0 memset,memset,memset,memset,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,memset,memset,wsprintfW,wsprintfW,FindFirstFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,memset,memset,wsprintfW,FindFirstFileW,FindNextFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,memset,memset,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,FindNextFileW,FindNextFileW,lstrlenW,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,4_2_000000018001CCF0
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_000000018001DDD0 malloc,memset,FindFirstFileW,free,4_2_000000018001DDD0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2709300 __chkstk,memset,memset,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CreateToolhelp32Snapshot,Process32FirstW,OpenProcess,memset,lstrcpyW,GetPriorityClass,memset,memset,OpenProcessToken,GetTokenInformation,GlobalAlloc,GetTokenInformation,LookupAccountSidW,LookupAccountSidW,lstrcpyW,GlobalFree,CloseHandle,ProcessIdToSessionId,K32GetProcessMemoryInfo,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,CreateFileW,GetFileSize,CloseHandle,lstrcpyW,lstrcatW,CloseHandle,Process32NextW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_00000200A2709300
    Source: Joe Sandbox ViewIP Address: 103.235.47.188 103.235.47.188
    Source: Joe Sandbox ViewIP Address: 103.235.47.188 103.235.47.188
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownTCP traffic detected without corresponding DNS query: 43.154.172.193
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9A2D9D0 WSARecv,WSAGetLastError,0_2_00007FF7D9A2D9D0
    Source: global trafficDNS traffic detected: DNS query: www.baidu.com
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2146480784.000001BCF0610000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3987451786.00000200A2530000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3982177497.0000000180001000.00000020.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2146480784.000001BCF0610000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3987451786.00000200A2530000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3982177497.0000000180001000.00000020.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2146480784.000001BCF0610000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3987451786.00000200A2530000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3982177497.0000000180001000.00000020.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2146480784.000001BCF0610000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3987451786.00000200A2530000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3982177497.0000000180001000.00000020.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2146480784.000001BCF0610000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3987451786.00000200A2530000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3982177497.0000000180001000.00000020.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2146480784.000001BCF0610000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3987451786.00000200A2530000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3982177497.0000000180001000.00000020.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2146480784.000001BCF0610000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3987451786.00000200A2530000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3982177497.0000000180001000.00000020.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
    Source: arphaCrashReport64.exe.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2146480784.000001BCF0610000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3987451786.00000200A2530000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3982177497.0000000180001000.00000020.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe.2.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2146480784.000001BCF0610000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3987451786.00000200A2530000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3982177497.0000000180001000.00000020.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe.2.drString found in binary or memory: http://ocsp.digicert.com0
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2146480784.000001BCF0610000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3987451786.00000200A2530000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3982177497.0000000180001000.00000020.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe.2.drString found in binary or memory: http://ocsp.digicert.com0A
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2146480784.000001BCF0610000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3987451786.00000200A2530000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3982177497.0000000180001000.00000020.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe.2.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2146480784.000001BCF0610000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3987451786.00000200A2530000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3982177497.0000000180001000.00000020.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe.2.drString found in binary or memory: http://ocsp.digicert.com0X
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2146480784.000001BCF0610000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3987451786.00000200A2530000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3982177497.0000000180001000.00000020.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe.2.drString found in binary or memory: http://www.digicert.com/CPS0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2706200 VirtualFree,VirtualFree,OpenClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,VirtualFree,VirtualFree,2_2_00000200A2706200
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2706200 VirtualFree,VirtualFree,OpenClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,VirtualFree,VirtualFree,2_2_00000200A2706200
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26F99F0 lstrlenW,WideCharToMultiByte,VirtualAlloc,lstrlenW,lstrlenW,WideCharToMultiByte,VirtualAlloc,lstrlenW,WideCharToMultiByte,WideCharToMultiByte,lstrlenA,memcpy,OpenClipboard,EmptyClipboard,lstrlenA,GlobalAlloc,GlobalLock,lstrlenA,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,VirtualFree,VirtualFree,2_2_00000200A26F99F0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26F97D0 EnterCriticalSection,LeaveCriticalSection,EnterCriticalSection,LeaveCriticalSection,lstrlenW,memcmp,lstrlenW,lstrlenW,lstrlenW,memcpy,OpenClipboard,CloseClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,2_2_00000200A26F97D0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A270F1B0 OpenClipboard,Sleep,GetLastError,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,2_2_00000200A270F1B0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B86200 VirtualFree,VirtualFree,OpenClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,VirtualFree,VirtualFree,2_2_00000200A2B86200
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B8F1B0 OpenClipboard,Sleep,GetLastError,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,2_2_00000200A2B8F1B0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B799F0 lstrlenW,WideCharToMultiByte,VirtualAlloc,lstrlenW,lstrlenW,WideCharToMultiByte,VirtualAlloc,lstrlenW,WideCharToMultiByte,WideCharToMultiByte,lstrlenA,memcpy,OpenClipboard,EmptyClipboard,lstrlenA,GlobalAlloc,GlobalLock,lstrlenA,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,VirtualFree,VirtualFree,2_2_00000200A2B799F0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B797D0 EnterCriticalSection,LeaveCriticalSection,EnterCriticalSection,LeaveCriticalSection,lstrlenW,memcmp,lstrlenW,lstrlenW,lstrlenW,memcpy,OpenClipboard,CloseClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,2_2_00000200A2B797D0
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018002F1B0 OpenClipboard,Sleep,GetLastError,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,3_2_000000018002F1B0
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180026200 VirtualFree,VirtualFree,OpenClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,VirtualFree,VirtualFree,3_2_0000000180026200
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800197D0 EnterCriticalSection,LeaveCriticalSection,EnterCriticalSection,LeaveCriticalSection,lstrlenW,memcmp,lstrlenW,lstrlenW,lstrlenW,memcpy,OpenClipboard,CloseClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,3_2_00000001800197D0
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800199F0 lstrlenW,WideCharToMultiByte,VirtualAlloc,lstrlenW,lstrlenW,WideCharToMultiByte,VirtualAlloc,lstrlenW,WideCharToMultiByte,WideCharToMultiByte,lstrlenA,memcpy,OpenClipboard,EmptyClipboard,lstrlenA,GlobalAlloc,GlobalLock,lstrlenA,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,VirtualFree,VirtualFree,3_2_00000001800199F0
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_000000018002F1B0 OpenClipboard,Sleep,GetLastError,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,4_2_000000018002F1B0
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_0000000180026200 VirtualFree,VirtualFree,OpenClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,VirtualFree,VirtualFree,4_2_0000000180026200
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_00000001800197D0 EnterCriticalSection,LeaveCriticalSection,EnterCriticalSection,LeaveCriticalSection,lstrlenW,memcmp,lstrlenW,lstrlenW,lstrlenW,memcpy,OpenClipboard,CloseClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,4_2_00000001800197D0
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_00000001800199F0 lstrlenW,WideCharToMultiByte,VirtualAlloc,lstrlenW,lstrlenW,WideCharToMultiByte,VirtualAlloc,lstrlenW,WideCharToMultiByte,WideCharToMultiByte,lstrlenA,memcpy,OpenClipboard,EmptyClipboard,lstrlenA,GlobalAlloc,GlobalLock,lstrlenA,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,VirtualFree,VirtualFree,4_2_00000001800199F0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FAC60 DefWindowProcW,SendMessageW,OpenClipboard,GetClipboardData,GlobalLock,lstrlenW,lstrlenW,lstrlenW,GlobalUnlock,CloseClipboard,VirtualFree,VirtualFree,CloseClipboard,SendMessageW,PostQuitMessage,2_2_00000200A26FAC60
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FA410 GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,2_2_00000200A26FA410
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2146340194.000001BCF03BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevicesmemstr_5acba35a-4
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800080F2 VirtualAllocEx,WriteProcessMemory,memset,memcpy,NtAlpcConnectPort,0_2_00000001800080F2
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180005824 realloc,NtQuerySystemInformation,0_2_0000000180005824
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26F2830 NtQuerySystemInformation,GetModuleHandleW,GetModuleHandleW,GetModuleHandleW,VirtualProtect,VirtualProtect,2_2_00000200A26F2830
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26F1C70 CreateEventW,VirtualAlloc,WaitForSingleObject,NtQuerySystemInformation,VirtualFree,VirtualAlloc,memset,NtQuerySystemInformation,lstrcmpiW,WaitForSingleObject,CloseHandle,2_2_00000200A26F1C70
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26F1AE0 CreateEventW,VirtualAlloc,WaitForSingleObject,NtQuerySystemInformation,VirtualFree,VirtualAlloc,memset,NtQuerySystemInformation,lstrcmpiW,WaitForSingleObject,CloseHandle,2_2_00000200A26F1AE0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B71C70 CreateEventW,VirtualAlloc,WaitForSingleObject,NtQuerySystemInformation,VirtualFree,VirtualAlloc,memset,NtQuerySystemInformation,lstrcmpiW,WaitForSingleObject,CloseHandle,2_2_00000200A2B71C70
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B71AE0 CreateEventW,VirtualAlloc,WaitForSingleObject,NtQuerySystemInformation,VirtualFree,VirtualAlloc,memset,NtQuerySystemInformation,lstrcmpiW,WaitForSingleObject,CloseHandle,2_2_00000200A2B71AE0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B72830 NtQuerySystemInformation,GetModuleHandleW,GetModuleHandleW,GetModuleHandleW,VirtualProtect,VirtualProtect,2_2_00000200A2B72830
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180011AE0 CreateEventW,VirtualAlloc,WaitForSingleObject,NtQuerySystemInformation,VirtualFree,VirtualAlloc,memset,NtQuerySystemInformation,lstrcmpiW,WaitForSingleObject,CloseHandle,3_2_0000000180011AE0
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180011C70 CreateEventW,VirtualAlloc,WaitForSingleObject,NtQuerySystemInformation,VirtualFree,VirtualAlloc,memset,NtQuerySystemInformation,lstrcmpiW,WaitForSingleObject,CloseHandle,3_2_0000000180011C70
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180012830 NtQuerySystemInformation,GetModuleHandleW,GetModuleHandleW,GetModuleHandleW,VirtualProtect,VirtualProtect,3_2_0000000180012830
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_0000000180012830 NtQuerySystemInformation,GetModuleHandleW,GetModuleHandleW,GetModuleHandleW,VirtualProtect,VirtualProtect,4_2_0000000180012830
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_0000000180011AE0 CreateEventW,VirtualAlloc,WaitForSingleObject,NtQuerySystemInformation,VirtualFree,VirtualAlloc,memset,NtQuerySystemInformation,lstrcmpiW,WaitForSingleObject,CloseHandle,4_2_0000000180011AE0
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_0000000180011C70 CreateEventW,VirtualAlloc,WaitForSingleObject,NtQuerySystemInformation,VirtualFree,VirtualAlloc,memset,NtQuerySystemInformation,lstrcmpiW,WaitForSingleObject,CloseHandle,4_2_0000000180011C70
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27005A0: CreateFileW,memset,lstrlenA,DeviceIoControl,CloseHandle,2_2_00000200A27005A0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A270D2A0 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,CloseServiceHandle,CloseServiceHandle,2_2_00000200A270D2A0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27001A0 GetCurrentProcess,OpenProcessToken,GetLastError,DuplicateTokenEx,SetTokenInformation,CreateEnvironmentBlock,CreateProcessAsUserW,CreateProcessAsUserW,2_2_00000200A27001A0
    Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\Microsoft\Windows\MicrosoftEdgeUpdateJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9BE0A200_2_00007FF7D9BE0A20
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9A6B9220_2_00007FF7D9A6B922
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9A4ADD00_2_00007FF7D9A4ADD0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9A602E60_2_00007FF7D9A602E6
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9BDE6800_2_00007FF7D9BDE680
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9BDF9A00_2_00007FF7D9BDF9A0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9AB494C0_2_00007FF7D9AB494C
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9A979260_2_00007FF7D9A97926
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9AADC360_2_00007FF7D9AADC36
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9AABE7A0_2_00007FF7D9AABE7A
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9BFDE040_2_00007FF7D9BFDE04
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9A76D540_2_00007FF7D9A76D54
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9BFBD780_2_00007FF7D9BFBD78
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9A9C4300_2_00007FF7D9A9C430
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9C004200_2_00007FF7D9C00420
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9AAD3CC0_2_00007FF7D9AAD3CC
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9AB76F70_2_00007FF7D9AB76F7
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9AAA5E20_2_00007FF7D9AAA5E2
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9AB187C0_2_00007FF7D9AB187C
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800080F20_2_00000001800080F2
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800054D50_2_00000001800054D5
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800015B00_2_00000001800015B0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180009BC00_2_0000000180009BC0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800010100_2_0000000180001010
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800280380_2_0000000180028038
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018002C0800_2_000000018002C080
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800180EE0_2_00000001800180EE
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800041530_2_0000000180004153
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800021700_2_0000000180002170
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000B1AC0_2_000000018000B1AC
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800151E80_2_00000001800151E8
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800032200_2_0000000180003220
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000225E0_2_000000018000225E
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000B2800_2_000000018000B280
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000C2D00_2_000000018000C2D0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800032200_2_0000000180003220
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000435B0_2_000000018000435B
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000C3700_2_000000018000C370
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800033B80_2_00000001800033B8
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800284640_2_0000000180028464
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800034640_2_0000000180003464
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000947B0_2_000000018000947B
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800044C10_2_00000001800044C1
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800025260_2_0000000180002526
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800035300_2_0000000180003530
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800075500_2_0000000180007550
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800045A90_2_00000001800045A9
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000360B0_2_000000018000360B
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000B6200_2_000000018000B620
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800026660_2_0000000180002666
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000469C0_2_000000018000469C
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000B6C00_2_000000018000B6C0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800096E00_2_00000001800096E0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000C6F00_2_000000018000C6F0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800037170_2_0000000180003717
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800027770_2_0000000180002777
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800038330_2_0000000180003833
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800148480_2_0000000180014848
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000284D0_2_000000018000284D
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800038800_2_0000000180003880
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000290C0_2_000000018000290C
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001800069E00_2_00000001800069E0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180002A060_2_0000000180002A06
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180001A100_2_0000000180001A10
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180002A190_2_0000000180002A19
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018001AA6C0_2_000000018001AA6C
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180006AB00_2_0000000180006AB0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180003AE00_2_0000000180003AE0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180023B980_2_0000000180023B98
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018001FC0C0_2_000000018001FC0C
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180002C8A0_2_0000000180002C8A
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180004CB00_2_0000000180004CB0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180003CF20_2_0000000180003CF2
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180001D600_2_0000000180001D60
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180016D880_2_0000000180016D88
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180003DBC0_2_0000000180003DBC
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180002E240_2_0000000180002E24
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180005E580_2_0000000180005E58
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180029E8C0_2_0000000180029E8C
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180024EB00_2_0000000180024EB0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000BEB00_2_000000018000BEB0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180008EC00_2_0000000180008EC0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018001FED80_2_000000018001FED8
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018000DEE80_2_000000018000DEE8
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180010F180_2_0000000180010F18
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180021F440_2_0000000180021F44
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180006F700_2_0000000180006F70
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800010102_2_0000000180001010
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180001A102_2_0000000180001A10
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180001D602_2_0000000180001D60
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800038332_2_0000000180003833
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800280382_2_0000000180028038
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800148482_2_0000000180014848
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000284D2_2_000000018000284D
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018002C0802_2_000000018002C080
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800038802_2_0000000180003880
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800180EE2_2_00000001800180EE
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800080F22_2_00000001800080F2
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000290C2_2_000000018000290C
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800041532_2_0000000180004153
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800021702_2_0000000180002170
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000B1AC2_2_000000018000B1AC
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800069E02_2_00000001800069E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800151E82_2_00000001800151E8
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180002A062_2_0000000180002A06
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180002A192_2_0000000180002A19
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800032202_2_0000000180003220
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000225E2_2_000000018000225E
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018001AA6C2_2_000000018001AA6C
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000B2802_2_000000018000B280
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180006AB02_2_0000000180006AB0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000C2D02_2_000000018000C2D0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180003AE02_2_0000000180003AE0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800032202_2_0000000180003220
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000435B2_2_000000018000435B
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000C3702_2_000000018000C370
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180023B982_2_0000000180023B98
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800033B82_2_00000001800033B8
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180009BC02_2_0000000180009BC0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018001FC0C2_2_000000018001FC0C
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800284642_2_0000000180028464
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800034642_2_0000000180003464
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000947B2_2_000000018000947B
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180002C8A2_2_0000000180002C8A
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180004CB02_2_0000000180004CB0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800044C12_2_00000001800044C1
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800054D52_2_00000001800054D5
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180003CF22_2_0000000180003CF2
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800025262_2_0000000180002526
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800035302_2_0000000180003530
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800075502_2_0000000180007550
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180016D882_2_0000000180016D88
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800045A92_2_00000001800045A9
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800015B02_2_00000001800015B0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180003DBC2_2_0000000180003DBC
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000360B2_2_000000018000360B
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000B6202_2_000000018000B620
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180002E242_2_0000000180002E24
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180005E582_2_0000000180005E58
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800026662_2_0000000180002666
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180029E8C2_2_0000000180029E8C
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000469C2_2_000000018000469C
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180024EB02_2_0000000180024EB0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000BEB02_2_000000018000BEB0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000B6C02_2_000000018000B6C0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180008EC02_2_0000000180008EC0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018001FED82_2_000000018001FED8
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800096E02_2_00000001800096E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000DEE82_2_000000018000DEE8
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_000000018000C6F02_2_000000018000C6F0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800037172_2_0000000180003717
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180010F182_2_0000000180010F18
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180021F442_2_0000000180021F44
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_0000000180006F702_2_0000000180006F70
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001800027772_2_0000000180002777
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FF9E02_2_00000200A26FF9E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27006802_2_00000200A2700680
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27034642_2_00000200A2703464
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E34702_2_00000200A26E3470
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FD4202_2_00000200A26FD420
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A272C4102_2_00000200A272C410
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26F44102_2_00000200A26F4410
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27134F02_2_00000200A27134F0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E54E02_2_00000200A26E54E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27024E02_2_00000200A27024E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27044B02_2_00000200A27044B0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E656A2_2_00000200A26E656A
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FE5502_2_00000200A26FE550
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27065302_2_00000200A2706530
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26EF5E02_2_00000200A26EF5E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26EC5F02_2_00000200A26EC5F0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E75D22_2_00000200A26E75D2
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FB5A02_2_00000200A26FB5A0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27055902_2_00000200A2705590
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E95882_2_00000200A26E9588
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27112702_2_00000200A2711270
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E12642_2_00000200A26E1264
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E227C2_2_00000200A26E227C
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26F82302_2_00000200A26F8230
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E62E62_2_00000200A26E62E6
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27442E02_2_00000200A27442E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E62F92_2_00000200A26E62F9
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26ED2F02_2_00000200A26ED2F0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A270B2D02_2_00000200A270B2D0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27072902_2_00000200A2707290
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27053402_2_00000200A2705340
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27423272_2_00000200A2742327
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E33002_2_00000200A26E3300
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27093002_2_00000200A2709300
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E83E02_2_00000200A26E83E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E13F72_2_00000200A26E13F7
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E73C02_2_00000200A26E73C0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26F73D02_2_00000200A26F73D0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A273B3802_2_00000200A273B380
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27078702_2_00000200A2707870
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FC8502_2_00000200A26FC850
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26EB8222_2_00000200A26EB822
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27108102_2_00000200A2710810
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26EE8DC2_2_00000200A26EE8DC
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26F38D02_2_00000200A26F38D0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A271A8BC2_2_00000200A271A8BC
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A270F8902_2_00000200A270F890
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27088802_2_00000200A2708880
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E29712_2_00000200A26E2971
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27049302_2_00000200A2704930
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26F99F02_2_00000200A26F99F0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26EE9B02_2_00000200A26EE9B0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27366702_2_00000200A2736670
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27126602_2_00000200A2712660
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A271664B2_2_00000200A271664B
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E16302_2_00000200A26E1630
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26F66302_2_00000200A26F6630
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26F76E02_2_00000200A26F76E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27286E02_2_00000200A27286E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26EA6A02_2_00000200A26EA6A0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E769C2_2_00000200A26E769C
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E176F2_2_00000200A26E176F
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27437702_2_00000200A2743770
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27137602_2_00000200A2713760
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FF7102_2_00000200A26FF710
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E67042_2_00000200A26E6704
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27047002_2_00000200A2704700
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E271A2_2_00000200A26E271A
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A270A7F02_2_00000200A270A7F0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27057C02_2_00000200A27057C0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27167B82_2_00000200A27167B8
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27327902_2_00000200A2732790
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26F87802_2_00000200A26F8780
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2745C602_2_00000200A2745C60
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A270FC542_2_00000200A270FC54
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A270FC5D2_2_00000200A270FC5D
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A270FC422_2_00000200A270FC42
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A270FC4B2_2_00000200A270FC4B
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A270FC302_2_00000200A270FC30
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A270FC392_2_00000200A270FC39
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E6B002_2_00000200A26E6B00
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2710C202_2_00000200A2710C20
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E7C3B2_2_00000200A26E7C3B
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A270FC272_2_00000200A270FC27
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E8C052_2_00000200A26E8C05
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FCCF02_2_00000200A26FCCF0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E2CD22_2_00000200A26E2CD2
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E3CA62_2_00000200A26E3CA6
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2741CA72_2_00000200A2741CA7
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26F9CB02_2_00000200A26F9CB0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2705C902_2_00000200A2705C90
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2715C902_2_00000200A2715C90
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26EAC802_2_00000200A26EAC80
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2716C9E2_2_00000200A2716C9E
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E6C982_2_00000200A26E6C98
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2742D702_2_00000200A2742D70
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E6D442_2_00000200A26E6D44
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26EED502_2_00000200A26EED50
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A270AD302_2_00000200A270AD30
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2718D242_2_00000200A2718D24
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26EEDF02_2_00000200A26EEDF0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A270BDC02_2_00000200A270BDC0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26F8DA02_2_00000200A26F8DA0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E7DA12_2_00000200A26E7DA1
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2704D902_2_00000200A2704D90
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E2D8A2_2_00000200A26E2D8A
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E1D802_2_00000200A26E1D80
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FEA402_2_00000200A26FEA40
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E5A502_2_00000200A26E5A50
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A270AA302_2_00000200A270AA30
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E3A322_2_00000200A26E3A32
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E7A332_2_00000200A26E7A33
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2701A102_2_00000200A2701A10
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2705A102_2_00000200A2705A10
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26EFA002_2_00000200A26EFA00
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2733A002_2_00000200A2733A00
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2715AD02_2_00000200A2715AD0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FAAD02_2_00000200A26FAAD0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26EFAA02_2_00000200A26EFAA0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E4A982_2_00000200A26E4A98
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2704B602_2_00000200A2704B60
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26F2B502_2_00000200A26F2B50
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E5B3E2_2_00000200A26E5B3E
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E6B002_2_00000200A26E6B00
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2703BC02_2_00000200A2703BC0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E2BD62_2_00000200A26E2BD6
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26ECBAB2_2_00000200A26ECBAB
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E10702_2_00000200A26E1070
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E60572_2_00000200A26E6057
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A270E0102_2_00000200A270E010
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E20C72_2_00000200A26E20C7
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E71602_2_00000200A26E7160
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E517C2_2_00000200A26E517C
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E517A2_2_00000200A26E517A
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26F21402_2_00000200A26F2140
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27241402_2_00000200A2724140
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26F51502_2_00000200A26F5150
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E612D2_2_00000200A26E612D
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E71132_2_00000200A26E7113
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26EA1102_2_00000200A26EA110
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E61EC2_2_00000200A26E61EC
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26EA1E02_2_00000200A26EA1E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26F11802_2_00000200A26F1180
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E219F2_2_00000200A26E219F
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26F91902_2_00000200A26F9190
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FA1902_2_00000200A26FA190
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FAE402_2_00000200A26FAE40
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26EFE202_2_00000200A26EFE20
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2709E102_2_00000200A2709E10
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E5E062_2_00000200A26E5E06
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A271DE002_2_00000200A271DE00
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E6E102_2_00000200A26E6E10
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26F3E102_2_00000200A26F3E10
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26ECE102_2_00000200A26ECE10
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E6EEB2_2_00000200A26E6EEB
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E3EC72_2_00000200A26E3EC7
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26F9EC02_2_00000200A26F9EC0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2739E902_2_00000200A2739E90
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E7E892_2_00000200A26E7E89
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A273CF702_2_00000200A273CF70
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26F6F602_2_00000200A26F6F60
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E7F7C2_2_00000200A26E7F7C
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E5F462_2_00000200A26E5F46
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2716F5F2_2_00000200A2716F5F
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E6FF72_2_00000200A26E6FF7
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2704FC02_2_00000200A2704FC0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FEFC02_2_00000200A26FEFC0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26F7FA02_2_00000200A26F7FA0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2714FA02_2_00000200A2714FA0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E4FB52_2_00000200A26E4FB5
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26F5FB02_2_00000200A26F5FB0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2724F902_2_00000200A2724F90
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26E1F882_2_00000200A26E1F88
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2701F802_2_00000200A2701F80
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B7F9E02_2_00000200A2B7F9E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B721402_2_00000200A2B72140
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B806802_2_00000200A2B80680
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B79CB02_2_00000200A2B79CB0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B844B02_2_00000200A2B844B0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B63CA62_2_00000200A2B63CA6
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B85C902_2_00000200A2B85C90
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B66C982_2_00000200A2B66C98
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B6AC802_2_00000200A2B6AC80
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B7CCF02_2_00000200A2B7CCF0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B934F02_2_00000200A2B934F0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B654E02_2_00000200A2B654E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B824E02_2_00000200A2B824E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B62CD22_2_00000200A2B62CD2
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B8FC392_2_00000200A2B8FC39
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B8FC302_2_00000200A2B8FC30
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B67C3B2_2_00000200A2B67C3B
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B66B002_2_00000200A2B66B00
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B7D4202_2_00000200A2B7D420
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B90C202_2_00000200A2B90C20
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B8FC272_2_00000200A2B8FC27
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B744102_2_00000200A2B74410
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B68C052_2_00000200A2B68C05
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B634702_2_00000200A2B63470
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B834642_2_00000200A2B83464
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B8FC5D2_2_00000200A2B8FC5D
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B8FC542_2_00000200A2B8FC54
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B8FC4B2_2_00000200A2B8FC4B
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B8FC422_2_00000200A2B8FC42
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B67DA12_2_00000200A2B67DA1
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B78DA02_2_00000200A2B78DA0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B7B5A02_2_00000200A2B7B5A0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B84D902_2_00000200A2B84D90
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B855902_2_00000200A2B85590
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B61D802_2_00000200A2B61D80
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B62D8A2_2_00000200A2B62D8A
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B695882_2_00000200A2B69588
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B6EDF02_2_00000200A2B6EDF0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B6C5F02_2_00000200A2B6C5F0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B6F5E02_2_00000200A2B6F5E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B675D22_2_00000200A2B675D2
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B8BDC02_2_00000200A2B8BDC0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B865302_2_00000200A2B86530
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B8AD302_2_00000200A2B8AD30
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B98D242_2_00000200A2B98D24
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B6656A2_2_00000200A2B6656A
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B6ED502_2_00000200A2B6ED50
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B7E5502_2_00000200A2B7E550
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B66D442_2_00000200A2B66D44
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B6FAA02_2_00000200A2B6FAA0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B872902_2_00000200A2B87290
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B64A982_2_00000200A2B64A98
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B6D2F02_2_00000200A2B6D2F0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B662F92_2_00000200A2B662F9
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B662E62_2_00000200A2B662E6
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B7AAD02_2_00000200A2B7AAD0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B8B2D02_2_00000200A2B8B2D0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B63A322_2_00000200A2B63A32
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B67A332_2_00000200A2B67A33
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B782302_2_00000200A2B78230
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B8AA302_2_00000200A2B8AA30
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B81A102_2_00000200A2B81A10
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B85A102_2_00000200A2B85A10
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B6FA002_2_00000200A2B6FA00
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B912702_2_00000200A2B91270
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B6227C2_2_00000200A2B6227C
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B612642_2_00000200A2B61264
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B65A502_2_00000200A2B65A50
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B7EA402_2_00000200A2B7EA40
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B6CBAB2_2_00000200A2B6CBAB
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B613F72_2_00000200A2B613F7
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B683E02_2_00000200A2B683E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B62BD62_2_00000200A2B62BD6
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B773D02_2_00000200A2B773D0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B673C02_2_00000200A2B673C0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B83BC02_2_00000200A2B83BC0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B65B3E2_2_00000200A2B65B3E
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B633002_2_00000200A2B63300
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B66B002_2_00000200A2B66B00
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B893002_2_00000200A2B89300
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B84B602_2_00000200A2B84B60
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B72B502_2_00000200A2B72B50
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B853402_2_00000200A2B85340
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B9A8BC2_2_00000200A2B9A8BC
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B8F8902_2_00000200A2B8F890
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B888802_2_00000200A2B88880
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B738D02_2_00000200A2B738D0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B6E8DC2_2_00000200A2B6E8DC
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B620C72_2_00000200A2B620C7
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B6B8222_2_00000200A2B6B822
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B8E0102_2_00000200A2B8E010
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B908102_2_00000200A2B90810
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B610702_2_00000200A2B61070
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B878702_2_00000200A2B87870
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B660572_2_00000200A2B66057
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B7C8502_2_00000200A2B7C850
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B6E9B02_2_00000200A2B6E9B0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B791902_2_00000200A2B79190
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B7A1902_2_00000200A2B7A190
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B6219F2_2_00000200A2B6219F
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B711802_2_00000200A2B71180
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B799F02_2_00000200A2B799F0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B6A1E02_2_00000200A2B6A1E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B661EC2_2_00000200A2B661EC
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B849302_2_00000200A2B84930
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B6612D2_2_00000200A2B6612D
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B671132_2_00000200A2B67113
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B6A1102_2_00000200A2B6A110
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B629712_2_00000200A2B62971
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B6517C2_2_00000200A2B6517C
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B6517A2_2_00000200A2B6517A
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B671602_2_00000200A2B67160
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B751502_2_00000200A2B75150
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2BA41402_2_00000200A2BA4140
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B6A6A02_2_00000200A2B6A6A0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B6769C2_2_00000200A2B6769C
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B67E892_2_00000200A2B67E89
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B776E02_2_00000200A2B776E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B66EEB2_2_00000200A2B66EEB
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B63EC72_2_00000200A2B63EC7
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B79EC02_2_00000200A2B79EC0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B616302_2_00000200A2B61630
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B766302_2_00000200A2B76630
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B6FE202_2_00000200A2B6FE20
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B66E102_2_00000200A2B66E10
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B6CE102_2_00000200A2B6CE10
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B73E102_2_00000200A2B73E10
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B89E102_2_00000200A2B89E10
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B65E062_2_00000200A2B65E06
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2BB66702_2_00000200A2BB6670
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B926602_2_00000200A2B92660
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B7AE402_2_00000200A2B7AE40
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B64FB52_2_00000200A2B64FB5
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B75FB02_2_00000200A2B75FB0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B77FA02_2_00000200A2B77FA0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B94FA02_2_00000200A2B94FA0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B787802_2_00000200A2B78780
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B81F802_2_00000200A2B81F80
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B61F882_2_00000200A2B61F88
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B66FF72_2_00000200A2B66FF7
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B8A7F02_2_00000200A2B8A7F0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B7EFC02_2_00000200A2B7EFC0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B84FC02_2_00000200A2B84FC0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B857C02_2_00000200A2B857C0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B7F7102_2_00000200A2B7F710
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B6271A2_2_00000200A2B6271A
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B667042_2_00000200A2B66704
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B847002_2_00000200A2B84700
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B67F7C2_2_00000200A2B67F7C
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B76F602_2_00000200A2B76F60
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B6176F2_2_00000200A2B6176F
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B937602_2_00000200A2B93760
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B65F462_2_00000200A2B65F46
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800121403_2_0000000180012140
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800151503_2_0000000180015150
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800224E03_2_00000001800224E0
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800206803_2_0000000180020680
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800176E03_2_00000001800176E0
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018001F9E03_2_000000018001F9E0
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018001AAD03_2_000000018001AAD0
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180013E103_2_0000000180013E10
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180006FF73_2_0000000180006FF7
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018002E0103_2_000000018002E010
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800060573_2_0000000180006057
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800010703_2_0000000180001070
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800020C73_2_00000001800020C7
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018000A1103_2_000000018000A110
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800071133_2_0000000180007113
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018000612D3_2_000000018000612D
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800441403_2_0000000180044140
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800071603_2_0000000180007160
    Source: Joe Sandbox ViewDropped File: C:\Program Files\Windows Mail\arphaCrashReport64.exe E743E8FAC075A379161E1736388451E0AF0FDE7DA595EA9D15EEB5140E3E8271
    Source: C:\Windows\System32\svchost.exeCode function: String function: 0000000180044F40 appears 61 times
    Source: C:\Windows\System32\svchost.exeCode function: String function: 0000000180041800 appears 91 times
    Source: C:\Windows\System32\svchost.exeCode function: String function: 00000200A2721800 appears 91 times
    Source: C:\Windows\System32\svchost.exeCode function: String function: 00000200A2724F40 appears 61 times
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: String function: 00007FF7D9A16BB0 appears 64 times
    Source: C:\Windows\System32\dllhost.exeCode function: String function: 0000000180044F40 appears 61 times
    Source: C:\Windows\System32\dllhost.exeCode function: String function: 0000000180041800 appears 91 times
    Source: 2024-12-10#U67e5#U9605_uninst.exeBinary or memory string: OriginalFilename vs 2024-12-10#U67e5#U9605_uninst.exe
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2146480784.000001BCF0610000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamearphaCrashReport.exe2 vs 2024-12-10#U67e5#U9605_uninst.exe
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamearphaCrashReport.exe2 vs 2024-12-10#U67e5#U9605_uninst.exe
    Source: classification engineClassification label: mal96.troj.evad.winEXE@11/5@1/2
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2700680 VirtualAlloc,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualAlloc,InitializeCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,2_2_00000200A2700680
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2700480 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualAlloc,GetLastError,memcpy,2_2_00000200A2700480
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2707290 memset,lstrlenW,lstrlenW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetExtendedTcpTable,VirtualAlloc,GetExtendedTcpTable,VirtualFree,memset,lstrlenW,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,memset,lstrlenW,VirtualFree,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_00000200A2707290
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2709300 __chkstk,memset,memset,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CreateToolhelp32Snapshot,Process32FirstW,OpenProcess,memset,lstrcpyW,GetPriorityClass,memset,memset,OpenProcessToken,GetTokenInformation,GlobalAlloc,GetTokenInformation,LookupAccountSidW,LookupAccountSidW,lstrcpyW,GlobalFree,CloseHandle,ProcessIdToSessionId,K32GetProcessMemoryInfo,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,CreateFileW,GetFileSize,CloseHandle,lstrcpyW,lstrcatW,CloseHandle,Process32NextW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_00000200A2709300
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2707870 memset,lstrlenW,lstrlenW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetExtendedUdpTable,VirtualAlloc,GetExtendedUdpTable,VirtualFree,memset,lstrlenW,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,lstrlenA,memset,lstrlenW,VirtualFree,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_00000200A2707870
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FFD10 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,OpenProcess,GetLastError,2_2_00000200A26FFD10
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2709A70 memset,memset,VirtualFree,VirtualFree,GetModuleHandleW,GetProcAddress,GetProcAddress,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,OpenProcess,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,TerminateProcess,Sleep,DeleteFileW,lstrcpyW,lstrcatW,TerminateProcess,CloseHandle,Sleep,2_2_00000200A2709A70
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A270CE70 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,memset,OpenProcess,K32EnumProcessModules,K32GetProcessImageFileNameW,lstrcpyW,CloseHandle,2_2_00000200A270CE70
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B80680 VirtualAlloc,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualAlloc,InitializeCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,2_2_00000200A2B80680
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B80480 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualAlloc,GetLastError,memcpy,2_2_00000200A2B80480
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B7FD10 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,OpenProcess,GetLastError,2_2_00000200A2B7FD10
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B87290 memset,lstrlenW,lstrlenW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetExtendedTcpTable,VirtualAlloc,GetExtendedTcpTable,VirtualFree,memset,lstrlenW,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,memset,lstrlenW,VirtualFree,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_00000200A2B87290
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B89A70 memset,memset,VirtualFree,VirtualFree,GetModuleHandleW,GetProcAddress,GetProcAddress,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,OpenProcess,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,TerminateProcess,Sleep,DeleteFileW,lstrcpyW,lstrcatW,TerminateProcess,CloseHandle,Sleep,2_2_00000200A2B89A70
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B89300 __chkstk,memset,memset,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CreateToolhelp32Snapshot,Process32FirstW,OpenProcess,memset,lstrcpyW,GetPriorityClass,memset,memset,OpenProcessToken,GetTokenInformation,GlobalAlloc,GetTokenInformation,LookupAccountSidW,LookupAccountSidW,lstrcpyW,GlobalFree,CloseHandle,ProcessIdToSessionId,K32GetProcessMemoryInfo,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,CreateFileW,GetFileSize,CloseHandle,lstrcpyW,lstrcatW,CloseHandle,Process32NextW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_00000200A2B89300
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B87870 memset,lstrlenW,lstrlenW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetExtendedUdpTable,VirtualAlloc,GetExtendedUdpTable,VirtualFree,memset,lstrlenW,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,lstrlenA,memset,lstrlenW,VirtualFree,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_00000200A2B87870
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B8CE70 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,memset,OpenProcess,K32EnumProcessModules,K32GetProcessImageFileNameW,lstrcpyW,CloseHandle,2_2_00000200A2B8CE70
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180020680 VirtualAlloc,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualAlloc,InitializeCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,3_2_0000000180020680
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180027290 memset,lstrlenW,lstrlenW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetExtendedTcpTable,VirtualAlloc,GetExtendedTcpTable,VirtualFree,memset,lstrlenW,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,memset,lstrlenW,VirtualFree,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_0000000180027290
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180029300 __chkstk,memset,memset,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CreateToolhelp32Snapshot,Process32FirstW,OpenProcess,memset,lstrcpyW,GetPriorityClass,memset,memset,OpenProcessToken,GetTokenInformation,GlobalAlloc,GetTokenInformation,LookupAccountSidW,LookupAccountSidW,lstrcpyW,GlobalFree,CloseHandle,ProcessIdToSessionId,K32GetProcessMemoryInfo,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,CreateFileW,GetFileSize,CloseHandle,lstrcpyW,lstrcatW,CloseHandle,Process32NextW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_0000000180029300
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180020480 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualAlloc,GetLastError,memcpy,3_2_0000000180020480
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180027870 memset,lstrlenW,lstrlenW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetExtendedUdpTable,VirtualAlloc,GetExtendedUdpTable,VirtualFree,memset,lstrlenW,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,lstrlenA,memset,lstrlenW,VirtualFree,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_0000000180027870
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180029A70 memset,memset,VirtualFree,VirtualFree,GetModuleHandleW,GetProcAddress,GetProcAddress,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,OpenProcess,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,TerminateProcess,Sleep,DeleteFileW,lstrcpyW,lstrcatW,TerminateProcess,CloseHandle,Sleep,3_2_0000000180029A70
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018001FD10 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,OpenProcess,GetLastError,3_2_000000018001FD10
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018002CE70 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,memset,OpenProcess,K32EnumProcessModules,K32GetProcessImageFileNameW,lstrcpyW,CloseHandle,3_2_000000018002CE70
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_0000000180027290 memset,lstrlenW,lstrlenW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetExtendedTcpTable,VirtualAlloc,GetExtendedTcpTable,VirtualFree,memset,lstrlenW,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,memset,lstrlenW,VirtualFree,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,4_2_0000000180027290
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_0000000180029300 __chkstk,memset,memset,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CreateToolhelp32Snapshot,Process32FirstW,OpenProcess,memset,lstrcpyW,GetPriorityClass,memset,memset,OpenProcessToken,GetTokenInformation,GlobalAlloc,GetTokenInformation,LookupAccountSidW,LookupAccountSidW,lstrcpyW,GlobalFree,CloseHandle,ProcessIdToSessionId,K32GetProcessMemoryInfo,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,CreateFileW,GetFileSize,CloseHandle,lstrcpyW,lstrcatW,CloseHandle,Process32NextW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,4_2_0000000180029300
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_0000000180020480 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualAlloc,GetLastError,memcpy,4_2_0000000180020480
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_0000000180020680 VirtualAlloc,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualAlloc,InitializeCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,4_2_0000000180020680
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_0000000180027870 memset,lstrlenW,lstrlenW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetExtendedUdpTable,VirtualAlloc,GetExtendedUdpTable,VirtualFree,memset,lstrlenW,memset,inet_ntoa,lstrcpyA,lstrlenA,htons,lstrlenA,memset,lstrlenW,VirtualFree,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,4_2_0000000180027870
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_0000000180029A70 memset,memset,VirtualFree,VirtualFree,GetModuleHandleW,GetProcAddress,GetProcAddress,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,OpenProcess,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,TerminateProcess,Sleep,DeleteFileW,lstrcpyW,lstrcatW,TerminateProcess,CloseHandle,Sleep,4_2_0000000180029A70
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_000000018001FD10 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,OpenProcess,GetLastError,4_2_000000018001FD10
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_000000018002CE70 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,memset,OpenProcess,K32EnumProcessModules,K32GetProcessImageFileNameW,lstrcpyW,CloseHandle,4_2_000000018002CE70
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FC4E0 memset,memset,memset,QueryDosDeviceW,GetDriveTypeW,lstrlenW,GetVolumeInformationW,lstrlenW,GetDiskFreeSpaceExW,2_2_00000200A26FC4E0
    Source: C:\Windows\System32\svchost.exeCode function: memset,lstrcatW,memset,GetWindowsDirectoryW,GetLastError,lstrcatW,OpenSCManagerW,GetLastError,CreateServiceW,GetLastError,CloseServiceHandle,GetLastError,StartServiceW,CloseServiceHandle,CloseServiceHandle,2_2_00000200A27063C0
    Source: C:\Windows\System32\svchost.exeCode function: memset,lstrcatW,memset,GetWindowsDirectoryW,GetLastError,lstrcatW,OpenSCManagerW,GetLastError,CreateServiceW,GetLastError,CloseServiceHandle,GetLastError,StartServiceW,CloseServiceHandle,CloseServiceHandle,2_2_00000200A2B863C0
    Source: C:\Windows\System32\svchost.exeCode function: memset,lstrcatW,memset,GetWindowsDirectoryW,GetLastError,lstrcatW,OpenSCManagerW,GetLastError,CreateServiceW,GetLastError,CloseServiceHandle,GetLastError,StartServiceW,CloseServiceHandle,CloseServiceHandle,3_2_00000001800263C0
    Source: C:\Windows\System32\dllhost.exeCode function: memset,lstrcatW,memset,GetWindowsDirectoryW,GetLastError,lstrcatW,OpenSCManagerW,GetLastError,CreateServiceW,GetLastError,CloseServiceHandle,GetLastError,StartServiceW,CloseServiceHandle,CloseServiceHandle,4_2_00000001800263C0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A270C950 memset,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,2_2_00000200A270C950
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_0000000180001A10 CoInitialize,CLSIDFromString,IIDFromString,CoCreateInstance,0_2_0000000180001A10
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9A34810 LoadResource,LockResource,SizeofResource,0_2_00007FF7D9A34810
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2710260 OpenSCManagerW,OpenServiceW,QueryServiceStatus,LockServiceDatabase,ChangeServiceConfigW,UnlockServiceDatabase,CloseServiceHandle,CloseServiceHandle,Sleep,VirtualFree,VirtualFree,2_2_00000200A2710260
    Source: C:\Windows\System32\svchost.exeFile created: C:\Program Files\Windows Mail\arphaCrashReport64.exeJump to behavior
    Source: 2024-12-10#U67e5#U9605_uninst.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeSystem information queried: HandleInformationJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: svchost.exeString found in binary or memory: /Processid:{F8284233-48F4-4680-ADDD-F8284233}
    Source: svchost.exeString found in binary or memory: \\.\{F8284233-48F4-4680-ADDD-F8284233}
    Source: svchost.exeString found in binary or memory: /Processid:{F8284233-48F4-4680-ADDD-F8284233}
    Source: svchost.exeString found in binary or memory: \\.\{F8284233-48F4-4680-ADDD-F8284233}
    Source: dllhost.exeString found in binary or memory: /Processid:{F8284233-48F4-4680-ADDD-F8284233}
    Source: dllhost.exeString found in binary or memory: \\.\{F8284233-48F4-4680-ADDD-F8284233}
    Source: unknownProcess created: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exe "C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exe"
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Mail\arphaCrashReport64.exe "C:\Program Files\Windows Mail\arphaCrashReport64.exe"
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcsJump to behavior
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Mail\arphaCrashReport64.exe "C:\Program Files\Windows Mail\arphaCrashReport64.exe"Jump to behavior
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcsJump to behavior
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}Jump to behavior
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}Jump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: taskschd.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: fwpolicyiomgr.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: wtsapi32.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: fwpolicyiomgr.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: napinsp.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: wshbth.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: winrnr.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: devenum.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: msdmo.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: wtsapi32.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: firewallapi.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: fwbase.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: fwpolicyiomgr.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: arphadump64.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: wtsapi32.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: firewallapi.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: fwbase.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeSection loaded: fwpolicyiomgr.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: wtsapi32.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: fwpolicyiomgr.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: napinsp.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: wshbth.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: winrnr.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: devenum.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeSection loaded: msdmo.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: samcli.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: wtsapi32.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: firewallapi.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: fwbase.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: fwpolicyiomgr.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E2B3C97F-6AE1-41AC-817A-F6F92166D7DD}\InprocServer32Jump to behavior
    Source: C:\Windows\System32\svchost.exeDirectory created: C:\Program Files\Windows Mail\arphaCrashReport64.exeJump to behavior
    Source: C:\Windows\System32\svchost.exeDirectory created: C:\Program Files\Windows Mail\arphaDump64.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeDirectory created: C:\Program Files\Windows Mail\arphaDump64.binJump to behavior
    Source: 2024-12-10#U67e5#U9605_uninst.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
    Source: 2024-12-10#U67e5#U9605_uninst.exeStatic PE information: Image base 0x140000000 > 0x60000000
    Source: 2024-12-10#U67e5#U9605_uninst.exeStatic file information: File size 2319360 > 1048576
    Source: 2024-12-10#U67e5#U9605_uninst.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x1fde00
    Source: 2024-12-10#U67e5#U9605_uninst.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: 2024-12-10#U67e5#U9605_uninst.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: D:\Build\PX\A\PoisonX\nvsphelperplugin64\x64\Release\arphaDump64.pdb source: 2024-12-10#U67e5#U9605_uninst.exe, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2146480784.000001BCF0610000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.3987451786.00000200A2530000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3982177497.0000000180001000.00000020.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe, 00000005.00000002.2164041872.0000000180039000.00000002.00000001.01000000.00000005.sdmp, arphaDump64.dll.2.dr
    Source: Binary string: D:\jenkins\workspace\ci.arphasdk.build\qtc_out\Release_X64\arphaCrashReport64.exe.pdb source: 2024-12-10#U67e5#U9605_uninst.exe, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2146480784.000001BCF0610000.00000004.00001000.00020000.00000000.sdmp, 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.3987451786.00000200A2530000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3982177497.0000000180001000.00000020.00000001.00020000.00000000.sdmp, arphaCrashReport64.exe, 00000005.00000002.2172528768.00007FF6DD4A2000.00000002.00000001.01000000.00000004.sdmp, arphaCrashReport64.exe, 00000005.00000000.2156482490.00007FF6DD4A2000.00000002.00000001.01000000.00000004.sdmp, arphaCrashReport64.exe.2.dr
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2704080 VirtualAlloc,LoadLibraryW,GetProcAddress,FreeLibrary,2_2_00000200A2704080
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9AB8B14 push rax; ret 0_2_00007FF7D9AB8B15
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9AB7CA5 push rdi; retf 0_2_00007FF7D9AB7CA6
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9AB8379 push rbx; ret 0_2_00007FF7D9AB837A
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9AB755A push rbx; retf 0_2_00007FF7D9AB7560
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FC3E0 push rcx; ret 2_2_00000200A26FC3E1
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27419F7 push FF491775h; ret 2_2_00000200A27419FC
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B7C3E0 push rcx; ret 2_2_00000200A2B7C3E1
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018001C3E0 push rcx; ret 3_2_000000018001C3E1
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_00000001800619F7 push FF491775h; ret 3_2_00000001800619FC
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_000000018001C3E0 push rcx; ret 4_2_000000018001C3E1
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_00000001800619F7 push FF491775h; ret 4_2_00000001800619FC
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27030FE VirtualFree,VirtualFree,malloc,malloc,VirtualFree,VirtualFree,NetUserAdd,Sleep,NetLocalGroupAddMembers,free,free,2_2_00000200A27030FE
    Source: C:\Windows\System32\svchost.exeFile created: C:\Program Files\Windows Mail\arphaCrashReport64.exeJump to dropped file
    Source: C:\Windows\System32\svchost.exeFile created: C:\Program Files\Windows Mail\arphaDump64.dllJump to dropped file
    Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\Microsoft\Windows\MicrosoftEdgeUpdateJump to behavior
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27103E0 OpenSCManagerW,OpenServiceW,QueryServiceStatus,ControlService,ControlService,ControlService,StartServiceW,CloseServiceHandle,CloseServiceHandle,Sleep,2_2_00000200A27103E0

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Windows\System32\svchost.exeFile deleted: c:\users\user\desktop\2024-12-10#u67e5#u9605_uninst.exeJump to behavior
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FBFC0 OpenEventLogW,ClearEventLogW,CloseEventLog,OpenEventLogW,ClearEventLogW,CloseEventLog,OpenEventLogW,ClearEventLogW,CloseEventLog,OpenEventLogW,ClearEventLogW,CloseEventLog,2_2_00000200A26FBFC0
    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Windows\System32\dllhost.exeCheck user administrative privileges: IsUserAndAdmin, DecisionNode
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCheck user administrative privileges: IsUserAndAdmin, DecisionNodegraph_0-50007
    Source: C:\Windows\System32\svchost.exeCheck user administrative privileges: IsUserAndAdmin, DecisionNode
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26F6F60 GetCurrentProcessId,ProcessIdToSessionId,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,CloseHandle,WTSGetActiveConsoleSessionId,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,CreateThread,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_00000200A26F6F60
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: malloc,memcpy,malloc,memset,memcpy,memset,GetModuleFileNameW,malloc,memset,memcpy,OpenSCManagerW,EnumServicesStatusExW,malloc,memset,EnumServicesStatusExW,CloseServiceHandle,free,CloseServiceHandle,lstrcmpiW,free,0_2_00000001800015B0
    Source: C:\Windows\System32\svchost.exeCode function: malloc,memcpy,malloc,memset,memcpy,memset,GetModuleFileNameW,malloc,memset,memcpy,OpenSCManagerW,EnumServicesStatusExW,malloc,memset,EnumServicesStatusExW,CloseServiceHandle,free,CloseServiceHandle,lstrcmpiW,free,2_2_00000001800015B0
    Source: C:\Windows\System32\svchost.exeCode function: OpenSCManagerW,EnumServicesStatusExW,malloc,memset,EnumServicesStatusExW,CloseServiceHandle,free,CloseServiceHandle,lstrcmpiW,free,2_2_00000200A270D140
    Source: C:\Windows\System32\svchost.exeCode function: OpenSCManagerW,EnumServicesStatusW,LocalAlloc,EnumServicesStatusW,memset,OpenServiceW,lstrlenW,memcpy,lstrlenW,memcpy,VirtualAlloc,QueryServiceConfig2W,lstrlenW,memcpy,lstrcpyW,VirtualAlloc,QueryServiceConfigW,lstrcpyW,lstrlenW,memcpy,lstrlenW,memcpy,lstrlenW,memcpy,CloseServiceHandle,VirtualFree,VirtualFree,CloseServiceHandle,LocalFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_00000200A270F890
    Source: C:\Windows\System32\svchost.exeCode function: OpenSCManagerW,EnumServicesStatusExW,malloc,memset,EnumServicesStatusExW,CloseServiceHandle,free,CloseServiceHandle,lstrcmpiW,free,2_2_00000200A2B8D140
    Source: C:\Windows\System32\svchost.exeCode function: OpenSCManagerW,EnumServicesStatusW,LocalAlloc,EnumServicesStatusW,memset,OpenServiceW,lstrlenW,memcpy,lstrlenW,memcpy,VirtualAlloc,QueryServiceConfig2W,lstrlenW,memcpy,lstrcpyW,VirtualAlloc,QueryServiceConfigW,lstrcpyW,lstrlenW,memcpy,lstrlenW,memcpy,lstrlenW,memcpy,CloseServiceHandle,VirtualFree,VirtualFree,CloseServiceHandle,LocalFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_00000200A2B8F890
    Source: C:\Windows\System32\svchost.exeCode function: OpenSCManagerW,EnumServicesStatusExW,malloc,memset,EnumServicesStatusExW,CloseServiceHandle,free,CloseServiceHandle,lstrcmpiW,free,3_2_000000018002D140
    Source: C:\Windows\System32\svchost.exeCode function: OpenSCManagerW,EnumServicesStatusW,LocalAlloc,EnumServicesStatusW,memset,OpenServiceW,lstrlenW,memcpy,lstrlenW,memcpy,VirtualAlloc,QueryServiceConfig2W,lstrlenW,memcpy,lstrcpyW,VirtualAlloc,QueryServiceConfigW,lstrcpyW,lstrlenW,memcpy,lstrlenW,memcpy,lstrlenW,memcpy,CloseServiceHandle,VirtualFree,VirtualFree,CloseServiceHandle,LocalFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000000018002F890
    Source: C:\Windows\System32\dllhost.exeCode function: OpenSCManagerW,EnumServicesStatusExW,malloc,memset,EnumServicesStatusExW,CloseServiceHandle,free,CloseServiceHandle,lstrcmpiW,free,4_2_000000018002D140
    Source: C:\Windows\System32\dllhost.exeCode function: OpenSCManagerW,EnumServicesStatusW,LocalAlloc,EnumServicesStatusW,memset,OpenServiceW,lstrlenW,memcpy,lstrlenW,memcpy,VirtualAlloc,QueryServiceConfig2W,lstrlenW,memcpy,lstrcpyW,VirtualAlloc,QueryServiceConfigW,lstrcpyW,lstrlenW,memcpy,lstrlenW,memcpy,lstrlenW,memcpy,CloseServiceHandle,VirtualFree,VirtualFree,CloseServiceHandle,LocalFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,4_2_000000018002F890
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\svchost.exeAPI coverage: 3.0 %
    Source: C:\Windows\System32\svchost.exeAPI coverage: 7.5 %
    Source: C:\Windows\System32\dllhost.exeAPI coverage: 3.2 %
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exe TID: 3516Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FE210 __chkstk,memset,memset,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,memset,lstrcatW,lstrcatW,lstrcatW,Sleep,lstrlenW,wcsstr,GetCurrentThread,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,LeaveCriticalSection,WaitForSingleObject,VirtualFree,VirtualFree,2_2_00000200A26FE210
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FC850 memset,lstrcatW,lstrcatW,memset,FindFirstFileW,FindNextFileW,FindNextFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_00000200A26FC850
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FCCF0 memset,memset,memset,memset,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,memset,memset,wsprintfW,wsprintfW,FindFirstFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,memset,memset,wsprintfW,FindFirstFileW,FindNextFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,memset,memset,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,FindNextFileW,FindNextFileW,lstrlenW,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_00000200A26FCCF0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FDDD0 malloc,memset,FindFirstFileW,free,2_2_00000200A26FDDD0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B7CCF0 memset,memset,memset,memset,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,memset,memset,wsprintfW,wsprintfW,FindFirstFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,memset,memset,wsprintfW,FindFirstFileW,FindNextFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,memset,memset,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,FindNextFileW,FindNextFileW,lstrlenW,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_00000200A2B7CCF0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B7DDD0 malloc,memset,FindFirstFileW,free,2_2_00000200A2B7DDD0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B7E210 __chkstk,memset,memset,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,memset,lstrcatW,lstrcatW,lstrcatW,Sleep,lstrlenW,wcsstr,GetCurrentThread,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,LeaveCriticalSection,WaitForSingleObject,VirtualFree,VirtualFree,2_2_00000200A2B7E210
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B7C850 memset,lstrcatW,lstrcatW,memset,FindFirstFileW,FindNextFileW,FindNextFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_00000200A2B7C850
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018001E210 __chkstk,memset,memset,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,memset,lstrcatW,lstrcatW,lstrcatW,Sleep,lstrlenW,wcsstr,GetCurrentThread,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,LeaveCriticalSection,WaitForSingleObject,VirtualFree,VirtualFree,3_2_000000018001E210
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018001C850 memset,lstrcatW,lstrcatW,memset,FindFirstFileW,FindNextFileW,FindNextFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000000018001C850
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018001CCF0 memset,memset,memset,memset,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,memset,memset,wsprintfW,wsprintfW,FindFirstFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,memset,memset,wsprintfW,FindFirstFileW,FindNextFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,memset,memset,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,FindNextFileW,FindNextFileW,lstrlenW,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,3_2_000000018001CCF0
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018001DDD0 malloc,memset,FindFirstFileW,free,3_2_000000018001DDD0
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_000000018001E210 __chkstk,memset,memset,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,memset,lstrcatW,lstrcatW,lstrcatW,Sleep,lstrlenW,wcsstr,GetCurrentThread,IsBadReadPtr,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,LeaveCriticalSection,WaitForSingleObject,VirtualFree,VirtualFree,4_2_000000018001E210
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_000000018001C850 memset,lstrcatW,lstrcatW,memset,FindFirstFileW,FindNextFileW,FindNextFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,4_2_000000018001C850
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_000000018001CCF0 memset,memset,memset,memset,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,memset,memset,wsprintfW,wsprintfW,FindFirstFileW,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,memset,memset,wsprintfW,FindFirstFileW,FindNextFileW,lstrcmpiW,lstrcmpiW,lstrcmpiW,lstrcmpiW,memset,memset,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,FindFirstFileW,FindNextFileW,FindNextFileW,FindNextFileW,lstrlenW,FindClose,VirtualFree,VirtualFree,VirtualFree,VirtualFree,4_2_000000018001CCF0
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_000000018001DDD0 malloc,memset,FindFirstFileW,free,4_2_000000018001DDD0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2709300 __chkstk,memset,memset,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CreateToolhelp32Snapshot,Process32FirstW,OpenProcess,memset,lstrcpyW,GetPriorityClass,memset,memset,OpenProcessToken,GetTokenInformation,GlobalAlloc,GetTokenInformation,LookupAccountSidW,LookupAccountSidW,lstrcpyW,GlobalFree,CloseHandle,ProcessIdToSessionId,K32GetProcessMemoryInfo,K32EnumProcessModules,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,wcsncmp,lstrcpyW,CreateFileW,GetFileSize,CloseHandle,lstrcpyW,lstrcatW,CloseHandle,Process32NextW,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_00000200A2709300
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9A18CF2 GetSystemInfo,0_2_00007FF7D9A18CF2
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: 2024-12-10#U67e5#U9605_uninst.exe, 00000000.00000002.2146108660.000001BCEE8EC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll8
    Source: svchost.exe, 00000002.00000002.3984551119.00000200A122B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: zSCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000_0r
    Source: dllhost.exe, 00000007.00000002.3983091657.0000021412F9C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll%
    Source: dllhost.exe, 00000004.00000002.3983107829.00000256764FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll)
    Source: svchost.exe, 00000002.00000000.2131257301.00000200A1241000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3984636703.00000200A1241000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.3983688737.000001F582013000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3983468674.0000019565613000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: arphaCrashReport64.exe, 00000005.00000002.2164688506.0000027DD1D2C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllDD
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeAPI call chain: ExitProcess graph end nodegraph_0-50013
    Source: C:\Windows\System32\svchost.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A270E276 mouse_event,BlockInput,2_2_00000200A270E276
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9BF6EF8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7D9BF6EF8
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9BF16A4 GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF7D9BF16A4
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26F6F60 GetCurrentProcessId,ProcessIdToSessionId,CreateToolhelp32Snapshot,GetProcessHeap,HeapAlloc,CloseHandle,WTSGetActiveConsoleSessionId,Process32FirstW,lstrcmpiW,Process32NextW,GetProcessHeap,HeapFree,CloseHandle,ProcessIdToSessionId,CreateThread,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_00000200A26F6F60
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180034DA0 VirtualAlloc ?,?,00000000,0000000180035130,?,?,00000000,0000000180014AAC3_2_0000000180034DA0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2704080 VirtualAlloc,LoadLibraryW,GetProcAddress,FreeLibrary,2_2_00000200A2704080
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9A174A0 GetProcessHeap,0_2_00007FF7D9A174A0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\System32\svchost.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\System32\svchost.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\System32\svchost.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\System32\svchost.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9BF6EF8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7D9BF6EF8
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9BF0E60 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7D9BF0E60
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9BF12BC IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7D9BF12BC
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00000001801127E0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00000001801127E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000001801127E0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00000001801127E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2740770 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00000200A2740770
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2740030 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00000200A2740030
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2744130 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00000200A2744130
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2BC0030 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00000200A2BC0030
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180060030 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_0000000180060030
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180064130 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_0000000180064130
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180060770 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0000000180060770
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_0000000180060030 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_0000000180060030
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_0000000180064130 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_0000000180064130
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_0000000180060770 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_0000000180060770

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\System32\svchost.exeFile created: arphaCrashReport64.exe.2.drJump to dropped file
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeMemory allocated: C:\Windows\System32\svchost.exe base: 200A11E0000 protect: page execute and read and writeJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeMemory allocated: C:\Windows\System32\svchost.exe base: 200A2400000 protect: page read and writeJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeMemory allocated: C:\Windows\System32\svchost.exe base: 200A1980000 protect: page execute and read and writeJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeMemory allocated: C:\Windows\System32\svchost.exe base: 200A1990000 protect: page read and writeJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeMemory allocated: C:\Windows\System32\svchost.exe base: 200A2A10000 protect: page execute and read and writeJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeMemory allocated: C:\Windows\System32\svchost.exe base: 200A2A20000 protect: page read and writeJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeMemory allocated: C:\Windows\System32\svchost.exe base: 200A2AB0000 protect: page execute and read and writeJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeMemory allocated: C:\Windows\System32\svchost.exe base: 200A2AC0000 protect: page read and writeJump to behavior
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FF9E0 VirtualAllocEx,GetLastError,VirtualAllocEx,WriteProcessMemory,GetLastError,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualProtectEx,VirtualProtectEx,memset,GetThreadContext,SetThreadContext,memset,Wow64GetThreadContext,Wow64SetThreadContext,ResumeThread,GetLastError,2_2_00000200A26FF9E0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A270E4D0 CreateToolhelp32Snapshot,Process32FirstW,lstrcmpiW,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,Process32NextW,lstrcmpiW,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,Process32NextW,2_2_00000200A270E4D0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A26FF710 VirtualAllocEx,GetLastError,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualProtectEx,GetModuleHandleW,GetProcAddress,CreateRemoteThread,2_2_00000200A26FF710
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2709E10 VirtualAlloc,GetLastError,VirtualFree,VirtualFree,GetLastError,memset,lstrcatW,lstrcatW,lstrcatW,memset,memset,memcpy,VirtualFree,VirtualFree,VirtualFree,VirtualFree,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,VirtualFree,VirtualFree,VirtualFree,GetLastError,VirtualFree,VirtualFree,VirtualFree,GetLastError,VirtualFree,VirtualFree,2_2_00000200A2709E10
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B8E4D0 CreateToolhelp32Snapshot,Process32FirstW,lstrcmpiW,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,Process32NextW,lstrcmpiW,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,Process32NextW,2_2_00000200A2B8E4D0
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B89E10 VirtualAlloc,GetLastError,VirtualFree,VirtualFree,GetLastError,memset,lstrcatW,lstrcatW,lstrcatW,memset,memset,memcpy,VirtualFree,VirtualFree,VirtualFree,VirtualFree,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,VirtualFree,VirtualFree,VirtualFree,GetLastError,VirtualFree,VirtualFree,VirtualFree,GetLastError,VirtualFree,VirtualFree,2_2_00000200A2B89E10
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B7F710 VirtualAllocEx,GetLastError,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualProtectEx,GetModuleHandleW,GetProcAddress,CreateRemoteThread,2_2_00000200A2B7F710
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018002E4D0 CreateToolhelp32Snapshot,Process32FirstW,lstrcmpiW,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,Process32NextW,lstrcmpiW,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,Process32NextW,3_2_000000018002E4D0
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018001F710 VirtualAllocEx,GetLastError,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualProtectEx,GetModuleHandleW,GetProcAddress,CreateRemoteThread,3_2_000000018001F710
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180029E10 VirtualAlloc,GetLastError,VirtualFree,VirtualFree,GetLastError,memset,lstrcatW,lstrcatW,lstrcatW,memset,memset,memcpy,VirtualFree,VirtualFree,VirtualFree,VirtualFree,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,VirtualFree,VirtualFree,VirtualFree,GetLastError,VirtualFree,VirtualFree,VirtualFree,GetLastError,VirtualFree,VirtualFree,3_2_0000000180029E10
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_000000018002E4D0 CreateToolhelp32Snapshot,Process32FirstW,lstrcmpiW,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,Process32NextW,lstrcmpiW,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,Process32NextW,4_2_000000018002E4D0
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_000000018001F710 VirtualAllocEx,GetLastError,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualProtectEx,GetModuleHandleW,GetProcAddress,CreateRemoteThread,4_2_000000018001F710
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_0000000180029E10 VirtualAlloc,GetLastError,VirtualFree,VirtualFree,GetLastError,memset,lstrcatW,lstrcatW,lstrcatW,memset,memset,memcpy,VirtualFree,VirtualFree,VirtualFree,VirtualFree,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,VirtualFree,VirtualFree,VirtualFree,GetLastError,VirtualFree,VirtualFree,VirtualFree,GetLastError,VirtualFree,VirtualFree,4_2_0000000180029E10
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x27DD252B131Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x27DD2518FB0Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtWriteVirtualMemory: Direct from: 0x27DD251E8B1Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtWriteVirtualMemory: Direct from: 0x27DD251E6D2Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtQuerySystemInformation: Direct from: 0x27DD252216DJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtClose: Direct from: 0x27DD253CA47
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAdjustPrivilegesToken: Direct from: 0x27DD2530727Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtQuerySystemInformation: Direct from: 0x27DD252244CJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtProtectVirtualMemory: Direct from: 0x27DD253D4F8Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtProtectVirtualMemory: Direct from: 0x27DD253D89DJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x27DD251E4F4Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x27DD2530544Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtUnmapViewOfSection: Direct from: 0x27DD253C9A7Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtClose: Direct from: 0x27DD2530741
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x27DD2530883Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x27DD252B08CJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtQueryInformationProcess: Direct from: 0x27DD25191B3Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x27DD25221DBJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtWriteVirtualMemory: Direct from: 0x27DD251E065Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x27DD2530A9AJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x27DD252B0C3Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x27DD251D3EBJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x27DD253069DJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x27DD252B0FAJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x27DD2518494Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x27DD2530959Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtQuerySystemInformation: Direct from: 0x27DD2519000Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x27DD2530818Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x27DD2530758Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x27DD25307ADJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtProtectVirtualMemory: Direct from: 0x27DD253D52BJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtQuerySystemInformation: Direct from: 0x27DD253D84BJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x27DD251B8ADJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtProtectVirtualMemory: Direct from: 0x27DD253D88CJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x27DD2530A2FJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAdjustPrivilegesToken: Direct from: 0x27DD2530511Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x27DD25308EEJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x27DD252AFDDJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x27DD25309C4Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAdjustPrivilegesToken: Direct from: 0x27DD251C5C9Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtQuerySystemInformation: Direct from: 0x27DD253C984Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtWriteVirtualMemory: Direct from: 0x27DD251B93EJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x27DD2522212Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x27DD251E173Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtClose: Direct from: 0x27DD253052B
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeNtAllocateVirtualMemory: Direct from: 0x27DD253D1CCJump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeMemory written: PID: 1064 base: 200A11E0000 value: E9Jump to behavior
    Source: C:\Windows\System32\svchost.exeThread register set: target process: 5164Jump to behavior
    Source: C:\Windows\System32\svchost.exeThread register set: target process: 6464Jump to behavior
    Source: C:\Windows\System32\svchost.exeThread register set: target process: 4364Jump to behavior
    Source: C:\Windows\System32\svchost.exeThread register set: target process: 5196Jump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeMemory written: C:\Windows\System32\svchost.exe base: 200A11E0000Jump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeMemory written: C:\Windows\System32\svchost.exe base: 200A2400000Jump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeMemory written: C:\Windows\System32\svchost.exe base: 200A1980000Jump to behavior
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeMemory written: C:\Windows\System32\svchost.exe base: 200A1990000Jump to behavior
    Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\System32\dllhost.exe base: 25676320000Jump to behavior
    Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\System32\dllhost.exe base: 256763B0000Jump to behavior
    Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\System32\dllhost.exe base: 25676310000Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeMemory written: C:\Windows\System32\svchost.exe base: 200A2A10000Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeMemory written: C:\Windows\System32\svchost.exe base: 200A2A20000Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeMemory written: C:\Windows\System32\svchost.exe base: 200A2AB0000Jump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeMemory written: C:\Windows\System32\svchost.exe base: 200A2AC0000Jump to behavior
    Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\System32\dllhost.exe base: 21412E90000Jump to behavior
    Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\System32\dllhost.exe base: 21412F20000Jump to behavior
    Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\System32\dllhost.exe base: 21412E80000Jump to behavior
    Source: C:\Windows\System32\svchost.exeCode function: WSAStartup,GetCommandLineW,CommandLineToArgvW,VirtualAlloc,InitializeCriticalSection,VirtualAlloc,InitializeCriticalSection,memset,GetCurrentProcessId,lstrcmpiW,lstrcmpiW,ExitThread,lstrcmpiW,GetCurrentProcess,TerminateProcess,lstrcmpiW,GetCurrentProcessId,OpenProcess,TerminateProcess,CloseHandle,WaitForSingleObject,GetExitCodeProcess,Sleep,CreateThread,WaitForSingleObject,CloseHandle,memset,GetModuleFileNameW,wcsstr,GetNativeSystemInfo,ExitProcess,memset,GetModuleFileNameW,IsUserAnAdmin,memset,wsprintfW,OpenSCManagerW,GetLastError,OpenServiceW,ChangeServiceConfig2W,GetLastError,CloseServiceHandle,CloseServiceHandle,lstrcmpiW,lstrcmpiW,GetNativeSystemInfo,ExitProcess,GetCurrentProcess,TerminateProcess, svchost.exe2_2_00000200A26F2140
    Source: C:\Windows\System32\svchost.exeCode function: WSAStartup,GetCommandLineW,CommandLineToArgvW,VirtualAlloc,InitializeCriticalSection,VirtualAlloc,InitializeCriticalSection,memset,GetCurrentProcessId,lstrcmpiW,lstrcmpiW,ExitThread,lstrcmpiW,GetCurrentProcess,TerminateProcess,lstrcmpiW,GetCurrentProcessId,OpenProcess,TerminateProcess,CloseHandle,WaitForSingleObject,GetExitCodeProcess,Sleep,CreateThread,WaitForSingleObject,CloseHandle,memset,GetModuleFileNameW,wcsstr,GetNativeSystemInfo,ExitProcess,memset,GetModuleFileNameW,IsUserAnAdmin,memset,wsprintfW,OpenSCManagerW,GetLastError,OpenServiceW,ChangeServiceConfig2W,GetLastError,CloseServiceHandle,CloseServiceHandle,lstrcmpiW,lstrcmpiW,GetNativeSystemInfo,ExitProcess,GetCurrentProcess,TerminateProcess, svchost.exe2_2_00000200A2B72140
    Source: C:\Windows\System32\svchost.exeCode function: WSAStartup,GetCommandLineW,CommandLineToArgvW,VirtualAlloc,InitializeCriticalSection,VirtualAlloc,InitializeCriticalSection,memset,GetCurrentProcessId,lstrcmpiW,lstrcmpiW,ExitThread,lstrcmpiW,GetCurrentProcess,TerminateProcess,lstrcmpiW,GetCurrentProcessId,OpenProcess,TerminateProcess,CloseHandle,WaitForSingleObject,GetExitCodeProcess,Sleep,CreateThread,WaitForSingleObject,CloseHandle,memset,GetModuleFileNameW,wcsstr,GetNativeSystemInfo,ExitProcess,memset,GetModuleFileNameW,IsUserAnAdmin,memset,wsprintfW,OpenSCManagerW,GetLastError,OpenServiceW,ChangeServiceConfig2W,GetLastError,CloseServiceHandle,CloseServiceHandle,lstrcmpiW,lstrcmpiW,GetNativeSystemInfo,ExitProcess,GetCurrentProcess,TerminateProcess, svchost.exe3_2_0000000180012140
    Source: C:\Windows\System32\dllhost.exeCode function: WSAStartup,GetCommandLineW,CommandLineToArgvW,VirtualAlloc,InitializeCriticalSection,VirtualAlloc,InitializeCriticalSection,memset,GetCurrentProcessId,lstrcmpiW,lstrcmpiW,ExitThread,lstrcmpiW,GetCurrentProcess,TerminateProcess,lstrcmpiW,GetCurrentProcessId,OpenProcess,TerminateProcess,CloseHandle,WaitForSingleObject,GetExitCodeProcess,Sleep,CreateThread,WaitForSingleObject,CloseHandle,memset,GetModuleFileNameW,wcsstr,GetNativeSystemInfo,ExitProcess,memset,GetModuleFileNameW,IsUserAnAdmin,memset,wsprintfW,OpenSCManagerW,GetLastError,OpenServiceW,ChangeServiceConfig2W,GetLastError,CloseServiceHandle,CloseServiceHandle,lstrcmpiW,lstrcmpiW,GetNativeSystemInfo,ExitProcess,GetCurrentProcess,TerminateProcess, svchost.exe4_2_0000000180012140
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A270E010 BlockInput,BlockInput,GetDC,GetDeviceCaps,GetDeviceCaps,GetDeviceCaps,GetDeviceCaps,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,mouse_event,BlockInput,2_2_00000200A270E010
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A270E276 mouse_event,BlockInput,2_2_00000200A270E276
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcsJump to behavior
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Mail\arphaCrashReport64.exe "C:\Program Files\Windows Mail\arphaCrashReport64.exe"Jump to behavior
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcsJump to behavior
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}Jump to behavior
    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}Jump to behavior
    Source: C:\Windows\System32\svchost.exeFile opened: Windows Firewall: C:\Windows\System32\FirewallAPI.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeFile opened: Windows Firewall: C:\Windows\System32\FirewallAPI.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeFile opened: Windows Firewall: C:\Windows\System32\FirewallAPI.dllJump to behavior
    Source: C:\Program Files\Windows Mail\arphaCrashReport64.exeFile opened: Windows Firewall: C:\Windows\System32\FirewallAPI.dllJump to behavior
    Source: C:\Windows\System32\svchost.exeFile opened: Windows Firewall: C:\Windows\System32\FirewallAPI.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeFile opened: Windows Firewall: C:\Windows\System32\FirewallAPI.dllJump to behavior
    Source: svchost.exe, 00000003.00000003.2778625577.000001F583580000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2778652049.000001F5835A0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.3382214979.000001F5835A0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Program Manager
    Source: dllhost.exe, 00000004.00000003.3967640147.0000025678A50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Program ManagerP
    Source: svchost.exe, 00000003.00000003.3382469512.000001F583640000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2778672124.000001F5836C0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.3382267879.000001F5836C0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: TCPProgram Manager
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_000000018002BBA8 cpuid 0_2_000000018002BBA8
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\MicrosoftEdgeUpdate VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\MicrosoftEdgeUpdate VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2707E20 CreateNamedPipeW,GetLastError,ConnectNamedPipe,GetLastError,2_2_00000200A2707E20
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9BFF09C GetSystemTimeAsFileTime,0_2_00007FF7D9BFF09C
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A27024E0 memset,memset,memset,memset,gethostname,gethostbyname,inet_ntoa,wsprintfW,lstrcatW,GetForegroundWindow,GetWindowTextW,VirtualAlloc,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,VirtualFree,GetComputerNameW,GetCurrentProcess,IsWow64Process,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,RegCloseKey,GetSystemInfo,wsprintfW,GlobalMemoryStatusEx,wsprintfW,VirtualAlloc,VirtualAlloc,GetUserNameW,GetCurrentProcessId,wsprintfW,VirtualFree,VirtualFree,memset,GetWindowsDirectoryW,GetLastError,GetVolumeInformationW,wsprintfA,wsprintfA,wsprintfW,CoInitialize,CoCreateInstance,SysFreeString,CoUninitialize,GetCurrentProcess,IsWow64Process,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,2_2_00000200A27024E0

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1064, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1064, type: MEMORYSTR
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9A449E0 socket,bind,WSAGetLastError,WSAGetLastError,WSAGetLastError,0_2_00007FF7D9A449E0
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9A48C00 WSAGetLastError,socket,WSAGetLastError,bind,WSAGetLastError,bind,WSAGetLastError,0_2_00007FF7D9A48C00
    Source: C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exeCode function: 0_2_00007FF7D9A36320 socket,bind,SetLastError,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,WSAGetLastError,0_2_00007FF7D9A36320
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2701520 memset,VirtualFree,VirtualFree,socket,setsockopt,htons,inet_addr,htonl,bind,WSAGetLastError,listen,CreateThread,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,2_2_00000200A2701520
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A272A830 socket,socket,htonl,bind,getsockname,2_2_00000200A272A830
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2727630 socket,setsockopt,setsockopt,setsockopt,WSAGetLastError,listen,closesocket,WSAGetLastError,closesocket,closesocket,2_2_00000200A2727630
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2736B30 htons,_unlink,bind,WSAGetLastError,getsockname,htons,2_2_00000200A2736B30
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2B81520 memset,VirtualFree,VirtualFree,socket,setsockopt,htons,inet_addr,htonl,bind,WSAGetLastError,listen,CreateThread,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,2_2_00000200A2B81520
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2BB6B30 htons,_unlink,bind,WSAGetLastError,getsockname,htons,2_2_00000200A2BB6B30
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2BAA830 socket,socket,htonl,bind,getsockname,2_2_00000200A2BAA830
    Source: C:\Windows\System32\svchost.exeCode function: 2_2_00000200A2BA7630 socket,setsockopt,setsockopt,setsockopt,WSAGetLastError,listen,closesocket,WSAGetLastError,closesocket,closesocket,2_2_00000200A2BA7630
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180021520 memset,VirtualFree,VirtualFree,socket,setsockopt,htons,inet_addr,htonl,bind,WSAGetLastError,listen,CreateThread,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,3_2_0000000180021520
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180047630 socket,setsockopt,setsockopt,setsockopt,WSAGetLastError,listen,closesocket,WSAGetLastError,closesocket,closesocket,3_2_0000000180047630
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_000000018004A830 socket,socket,htonl,bind,getsockname,3_2_000000018004A830
    Source: C:\Windows\System32\svchost.exeCode function: 3_2_0000000180056B30 htons,_unlink,bind,WSAGetLastError,getsockname,htons,3_2_0000000180056B30
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_0000000180021520 memset,VirtualFree,VirtualFree,socket,setsockopt,htons,inet_addr,htonl,bind,WSAGetLastError,listen,CreateThread,IsBadReadPtr,EnterCriticalSection,VirtualAlloc,LeaveCriticalSection,4_2_0000000180021520
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_0000000180047630 socket,setsockopt,setsockopt,setsockopt,WSAGetLastError,listen,closesocket,WSAGetLastError,closesocket,closesocket,4_2_0000000180047630
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_000000018004A830 socket,socket,htonl,bind,getsockname,4_2_000000018004A830
    Source: C:\Windows\System32\dllhost.exeCode function: 4_2_0000000180056B30 htons,_unlink,bind,WSAGetLastError,getsockname,htons,4_2_0000000180056B30
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire Infrastructure1
    Valid Accounts
    11
    Native API
    1
    DLL Side-Loading
    1
    Abuse Elevation Control Mechanism
    3
    Disable or Modify Tools
    21
    Input Capture
    1
    System Time Discovery
    Remote Services1
    Archive Collected Data
    1
    Ingress Tool Transfer
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts1
    Exploitation for Client Execution
    1
    Create Account
    1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    LSASS Memory11
    Account Discovery
    Remote Desktop Protocol21
    Input Capture
    1
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain Accounts2
    Command and Scripting Interpreter
    1
    Valid Accounts
    1
    Valid Accounts
    1
    Abuse Elevation Control Mechanism
    Security Account Manager1
    System Service Discovery
    SMB/Windows Admin Shares3
    Clipboard Data
    1
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal Accounts1
    Scheduled Task/Job
    12
    Windows Service
    11
    Access Token Manipulation
    2
    Obfuscated Files or Information
    NTDS2
    File and Directory Discovery
    Distributed Component Object ModelInput Capture1
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud Accounts12
    Service Execution
    1
    Scheduled Task/Job
    12
    Windows Service
    1
    DLL Side-Loading
    LSA Secrets25
    System Information Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts623
    Process Injection
    1
    File Deletion
    Cached Domain Credentials1
    Network Share Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items1
    Scheduled Task/Job
    12
    Masquerading
    DCSync41
    Security Software Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    Valid Accounts
    Proc Filesystem21
    Virtualization/Sandbox Evasion
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
    Virtualization/Sandbox Evasion
    /etc/passwd and /etc/shadow4
    Process Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron11
    Access Token Manipulation
    Network Sniffing1
    System Owner/User Discovery
    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
    Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd623
    Process Injection
    Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
    Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task1
    Indicator Removal
    KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1572748 Sample: 2024-12-10#U67e5#U9605_uninst.exe Startdate: 10/12/2024 Architecture: WINDOWS Score: 96 36 www.wshifen.com 2->36 38 www.baidu.com 2->38 40 www.a.shifen.com 2->40 52 Yara detected ValleyRAT 2->52 54 AI detected suspicious sample 2->54 9 2024-12-10#U67e5#U9605_uninst.exe 2->9         started        signatures3 process4 dnsIp5 42 www.wshifen.com 103.235.47.188, 49707, 80 BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtd Hong Kong 9->42 60 Hijacks the control flow in another process 9->60 62 Writes to foreign memory regions 9->62 64 Allocates memory in foreign processes 9->64 66 Found evasive API chain checking for user administrative privileges 9->66 13 svchost.exe 12 4 9->13 injected signatures6 process7 file8 30 C:\Program Files\...\arphaCrashReport64.exe, PE32+ 13->30 dropped 32 C:\Program Files\...\arphaDump64.dll, PE32+ 13->32 dropped 68 Benign windows process drops PE files 13->68 70 Contains functionality to inject threads in other processes 13->70 72 Contains functionality to inject code into remote processes 13->72 74 3 other signatures 13->74 17 svchost.exe 1 13->17         started        21 arphaCrashReport64.exe 13->21         started        23 svchost.exe 13->23         started        signatures9 process10 dnsIp11 34 43.154.172.193, 49708, 49710, 80 LILLY-ASUS Japan 17->34 44 Writes to foreign memory regions 17->44 46 Modifies the context of a thread in another process (thread injection) 17->46 25 dllhost.exe 17->25         started        48 Allocates memory in foreign processes 21->48 50 Found direct / indirect Syscall (likely to bypass EDR) 21->50 28 dllhost.exe 23->28         started        signatures12 process13 signatures14 56 Contains functionality to inject threads in other processes 25->56 58 Found evasive API chain checking for user administrative privileges 25->58

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    No Antivirus matches
    SourceDetectionScannerLabelLink
    C:\Program Files\Windows Mail\arphaCrashReport64.exe4%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    www.wshifen.com
    103.235.47.188
    truefalse
      high
      www.baidu.com
      unknown
      unknownfalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        43.154.172.193
        unknownJapan4249LILLY-ASUSfalse
        103.235.47.188
        www.wshifen.comHong Kong
        55967BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtdfalse
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1572748
        Start date and time:2024-12-10 20:56:16 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 8m 54s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Run name:Run with higher sleep bypass
        Number of analysed new started processes analysed:9
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:1
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:2024-12-10#U67e5#U9605_uninst.exe
        renamed because original name is a hash value
        Original Sample Name:2024-12-10_uninst.exe
        Detection:MAL
        Classification:mal96.troj.evad.winEXE@11/5@1/2
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 94%
        • Number of executed functions: 37
        • Number of non-executed functions: 82
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
        • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
        • Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.245.163.56
        • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Report creation exceeded maximum time and may have missing disassembly code information.
        • Report size exceeded maximum capacity and may have missing disassembly code.
        • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
        • VT rate limit hit for: 2024-12-10#U67e5#U9605_uninst.exe
        TimeTypeDescription
        20:57:11Task SchedulerRun new task: MicrosoftEdgeUpdate path: C:\Program Files\Windows Mail\arphaCrashReport64.exe
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        103.235.47.188VIP-#U4f1a#U5458#U7248.exeGet hashmaliciousBlackMoonBrowse
        • www.baidu.com/
        Iifpj4i2kC.exeGet hashmaliciousFormBookBrowse
        • www.zruypj169g.top/md02/?oHH8=VZUPDXU8mXkToFn&0PG4QdD=KBMih/6UmjMCLIvQj8A+JVJ0ZduXlvkac/jrKRN7UGcA2YCWIWeuvW479UURmW6VwJBRFqK2PA==
        3.exeGet hashmaliciousBlackMoon, XRedBrowse
        • www.baidu.com/
        CZyOWoN2hiszA6d.exeGet hashmaliciousFormBookBrowse
        • www.vicmvm649n.top/v15n/?Yn=UsBn8mn1PUl4czyMQZxenuqc6dPBc+Q3khu6MN2NNQj7YA4ug5lWpId+R/K0fD87Hm6v&mv=Y4QppplhSjwxWBd
        f2.exeGet hashmaliciousBlackMoonBrowse
        • www.baidu.com/
        f1.exeGet hashmaliciousUnknownBrowse
        • www.baidu.com/
        SecuriteInfo.com.FileRepMalware.29184.31872.exeGet hashmaliciousUnknownBrowse
        • www.baidu.com/
        chAJcIK6ZO.exeGet hashmaliciousUnknownBrowse
        • www.baidu.com/
        LisectAVT_2403002A_489.exeGet hashmaliciousUnknownBrowse
        • www.baidu.com/
        d48c236503a4d2e54e23d9ebc9aa48e86300fd24955c871a7b8792656c47fb6a.exeGet hashmaliciousBdaejecBrowse
        • www.baidu.com/
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        www.wshifen.comSetup.exeGet hashmaliciousLummaC StealerBrowse
        • 103.235.47.188
        b6FArHy7yA.exeGet hashmaliciousLummaC StealerBrowse
        • 103.235.47.188
        VIP-#U4f1a#U5458#U7248.exeGet hashmaliciousBlackMoonBrowse
        • 103.235.46.96
        360safe.exeGet hashmaliciousUnknownBrowse
        • 103.235.47.188
        XiaobingOnekey.exeGet hashmaliciousUnknownBrowse
        • 103.235.46.96
        DNF#U604b#U62180224a.exeGet hashmaliciousUnknownBrowse
        • 103.235.46.96
        http://profdentalcare.comGet hashmaliciousUnknownBrowse
        • 103.235.46.96
        Iifpj4i2kC.exeGet hashmaliciousFormBookBrowse
        • 103.235.47.188
        https://www.baidu.com/link?url=7AgUGxkCgEsQdPm9T1PXcA0XghaPOWMLvdhGyyVngg844uS4x-KZy4IMqs1ov0OgdFqhAB-_X2oOV9exK4hWC_&wd=ZWxraW58WTI5eVpUUmpaUzVqYjIwPXxNYkdVSlpkdVROdWNyeW1UWU1laElVVW1QbGRGb0F5RmNLcWJadW1CT01YYw==Get hashmaliciousHTMLPhisherBrowse
        • 103.235.46.96
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtdhax.mpsl.elfGet hashmaliciousMiraiBrowse
        • 182.61.224.158
        Fantazy.arm7.elfGet hashmaliciousMiraiBrowse
        • 180.76.229.255
        Setup.exeGet hashmaliciousLummaC StealerBrowse
        • 103.235.47.188
        .akcqrfutuo.elfGet hashmaliciousUnknownBrowse
        • 106.13.55.248
        b6FArHy7yA.exeGet hashmaliciousLummaC StealerBrowse
        • 103.235.47.188
        VIP-#U4f1a#U5458#U7248.exeGet hashmaliciousBlackMoonBrowse
        • 103.235.46.96
        360safe.exeGet hashmaliciousUnknownBrowse
        • 103.235.47.188
        XiaobingOnekey.exeGet hashmaliciousUnknownBrowse
        • 103.235.46.96
        arm7.elfGet hashmaliciousMiraiBrowse
        • 106.13.224.235
        LILLY-ASUSJosho.ppc.elfGet hashmaliciousUnknownBrowse
        • 43.153.180.60
        Josho.arm.elfGet hashmaliciousUnknownBrowse
        • 43.75.63.212
        Josho.m68k.elfGet hashmaliciousUnknownBrowse
        • 40.171.24.94
        Josho.mpsl.elfGet hashmaliciousUnknownBrowse
        • 42.139.61.210
        hax.spc.elfGet hashmaliciousMiraiBrowse
        • 42.171.217.5
        http://enteolcl.top/Get hashmaliciousUnknownBrowse
        • 43.175.135.109
        hax.arm7.elfGet hashmaliciousMiraiBrowse
        • 42.175.33.200
        hax.mpsl.elfGet hashmaliciousMiraiBrowse
        • 40.225.254.87
        hax.sh4.elfGet hashmaliciousMiraiBrowse
        • 40.223.139.135
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        C:\Program Files\Windows Mail\arphaCrashReport64.exepng131.exeGet hashmaliciousValleyRATBrowse
          install.exeGet hashmaliciousValleyRATBrowse
            Telegrm2.69.exeGet hashmaliciousUnknownBrowse
              Telegrm2.69.exeGet hashmaliciousUnknownBrowse
                file_6c73ff4553d147e39fc35434c1e9e972_2024-07-30_02_54_11_351000.zipGet hashmaliciousUnknownBrowse
                  SvpnLong2.exeGet hashmaliciousUnknownBrowse
                    SvpnLong2.exeGet hashmaliciousUnknownBrowse
                      Cbrome1.0.exeGet hashmaliciousUnknownBrowse
                        Supe.exeGet hashmaliciousUnknownBrowse
                          Process:C:\Windows\System32\svchost.exe
                          File Type:PE32+ executable (GUI) x86-64, for MS Windows
                          Category:dropped
                          Size (bytes):238384
                          Entropy (8bit):6.278635939854228
                          Encrypted:false
                          SSDEEP:3072:fN9rZ5vuFomptSepjTxUPjfOgwXCtRLDya09M9EvoHmkQ/2Y8L6vVefD:rZ5qomPSeCx7tRNQjSfD
                          MD5:8B5D51DF7BBD67AEB51E9B9DEE6BC84A
                          SHA1:DD63C3D4ACF0CE27F71CCE44B8950180E48E36FA
                          SHA-256:E743E8FAC075A379161E1736388451E0AF0FDE7DA595EA9D15EEB5140E3E8271
                          SHA-512:1B4350D51C2107D0AA22EB01D64E1F1AB73C28114045C388BAF9547CC39A902C8A274A24479C7C2599F94C96F8772E438F21A2849316B5BD7F5D47C26A1E483B
                          Malicious:true
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 4%
                          Joe Sandbox View:
                          • Filename: png131.exe, Detection: malicious, Browse
                          • Filename: install.exe, Detection: malicious, Browse
                          • Filename: Telegrm2.69.exe, Detection: malicious, Browse
                          • Filename: Telegrm2.69.exe, Detection: malicious, Browse
                          • Filename: file_6c73ff4553d147e39fc35434c1e9e972_2024-07-30_02_54_11_351000.zip, Detection: malicious, Browse
                          • Filename: SvpnLong2.exe, Detection: malicious, Browse
                          • Filename: SvpnLong2.exe, Detection: malicious, Browse
                          • Filename: Cbrome1.0.exe, Detection: malicious, Browse
                          • Filename: Supe.exe, Detection: malicious, Browse
                          Reputation:moderate, very likely benign file
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........i...:...:...:...;...:...;)..:...;...:...;...:...;...:...;...:...;...:3..;...:...:...:3..;...:3.4:...:..\:...:3..;...:Rich...:........................PE..d......`.........."..........t......$..........@....................................j.....`..........................................................p...-...P.......h..0;......l...P...8.......................(.................... ..@............................text............................... ..`.rdata..F.... ......................@..@.data...L&... ......................@....pdata.......P......................@..@.rsrc....-...p.......2..............@..@.reloc..l............`..............@..B........................................................................................................................................................................................................................
                          Process:C:\Windows\System32\svchost.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):546252
                          Entropy (8bit):6.544066734855226
                          Encrypted:false
                          SSDEEP:12288:awnKbeNO/thmmWIK3z9rG3U9szzrHUPRxG0+UfYlrYS:flXDp9HPYlr5
                          MD5:41A525ADD2B2B33FB9681C0E65E57B55
                          SHA1:FC90352608D96D0454A2F51D7EEC7B6ECA687505
                          SHA-256:3EE9E55C4C469042C3622D84CB4DA2EBCFA77C1D2517564AC289BA5D17264D64
                          SHA-512:4CEB617727D6CF40E81E715BA2FBDB440859B3DC2DAC592FDAE93EB5577CDE341191AA98A87D3CFF3AF9D2CE95C465A71D7FC0CF004243C947F781BB0C263CD1
                          Malicious:false
                          Reputation:low
                          Preview:4...H..(H...D$8run.H.L$8.O...H..(...eH..%`......D..3.L..E..t"A........A..a.J..L.I....A..D....u..H.A.....H.\$.H.l$.H.t$.WAVAWH.. D......H.P.H.j L..I.......M..L.P0M..tLIcB<B.........t<I.<..O.I...j....w 3.I..D..9_.v...I...P...A..D;.t+..H...;_.r.L;.u.3.H.\$@H.l$HH.t$PH.. A_A^_.O$I..D...Y.O.I..B...I.......@SH.. H.......%...H..H.. [H....H.\$.WH.. H..H...........H..H..H.\$0H.. _H.....H.\$.UVWATAUAVAWH.. L..M..3.Z.H........2=..L.......-A..H.D$x....M..M.f.H.D$p3...A..y.H..(fA;A.s|I..9.u29E8~ZHc]8A......O.H..I..A.....A..L..G.3.H...T$p.-.O.A.......I..A.....A..W.H..D..I..H...T$x._.I....H..(..H......;.|.H.\$`H.. A_A^A]A\_^].H.\$.H.l$.H.t$ WATAUAVAWH..@L..-A........ ...H.L$ D..H..3...D.g.E..H.L$ A....E..W.H.L$$..E..W.H.L$(..E..W.H.L$,..E..W.H.L$0..E..W`H.L$4..E..H.L$8....E..W H.L$<....O.B....../.H...5...M..E3.L..A..H.........A..Y.I.q0H..(H#.fE;i.......I..D.C.A.....A.....E..A#.A...A#.A....s..K.A..@....H.....OH..B..I..RD.T. A....A....D.CT. ..u.A..@t.A.A ..E..y.A.A$..t..K.L.L$pH...E.
                          Process:C:\Windows\System32\svchost.exe
                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                          Category:dropped
                          Size (bytes):286720
                          Entropy (8bit):6.3893906748659095
                          Encrypted:false
                          SSDEEP:3072:HxZrTgN6uyqfkqc53wuY+OrGW2LRKK9+R/BsP3VkxQO6yOxaXLNC3dvMvuTYpr:fsxkmyLRKiM/BsNd3yGaXpruT2r
                          MD5:A0DDABA09C3626E07A748C662B83BE19
                          SHA1:C28FA5C63075CD8846143F417A0C0D4874675B0F
                          SHA-256:31E1AA8C30756D56F8E0038D37AAAC5A53976D1DB05D3534B8B2E1AA21407B4B
                          SHA-512:59BAD78B84C4DA7097E87BA67CEB3CEB6F72774FEA78FBD7E2168E548A7860197708AD96CC5010A2D5669427BC916F5CC24F5F27AF8B474AC62DE620C757B41F
                          Malicious:false
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K+...Js..Js..Js.D2p..Js.D2v..Js.D2w..Js...p..Js...w..Js...v.,Js.D2r..Js..Jr.jJs...z..Js...s..Js.....Js...q..Js.Rich.Js.................PE..d....DDg.........." ...*.............^....................................................`..........................................,.......-..<............p..........................p.......................(.......@............................................text...P~.......................... ..`.rdata.............................@..@.data....&...@.......,..............@....pdata.......p.......B..............@..@.reloc...............X..............@..B................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\System32\svchost.exe
                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):3188
                          Entropy (8bit):3.559862861079417
                          Encrypted:false
                          SSDEEP:48:yei1q9tNTPQOYZj9c9V9Lbra+iaiudupRCRvA9ufAuRa7T5XhPsV8ic4dTCp+++:t7U4diaigVA9ll7dhFFb+
                          MD5:53DCF71FCE78EA4C7B41FB4D973E5815
                          SHA1:46FB4C836823ABC49A153F6385D66C5F9E0CA30D
                          SHA-256:464DAC2210C387ADA19C7DF46AE18B628E1D8F9EA34DD7EDF812289CFECAF4DB
                          SHA-512:BF9C4DBEC061FE85A099C4D8E31C09B75F9B8CDDD554CA0F241A63E08B463242A30272B423C0ED9F5A38844A89924530C358442EB898837CC00B1368C439008B
                          Malicious:false
                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...2.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.A.u.t.h.o.r.>.S.Y.S.T.E.M.<./.A.u.t.h.o.r.>..... . . . .<.D.e.s.c.r.i.p.t.i.o.n.>.M.i.c.r.o.s.o.f.t. .E.d.g.e. .U.p.d.a.t.e. .T.a.s.k. .M.a.c.h.i.n.e.C.o.r.e.<./.D.e.s.c.r.i.p.t.i.o.n.>..... . . . .<.U.R.I.>.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.M.i.c.r.o.s.o.f.t.E.d.g.e.U.p.d.a.t.e.<./.U.R.I.>..... . .<./.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . .<.T.r.i.g.g.e.r.s.>..... . . . .<.B.o.o.t.T.r.i.g.g.e.r.>..... . . . . . .<.E.n.a.b.l.e.d.>.t.r.u.e.<./.E.n.a.b.l.e.d.>..... . . . .<./.B.o.o.t.T.r.i.g.g.e.r.>..... . .<./.T.r.i.g.g.e.r.s.>..... . .<.P.r.i.n.c.i.p.a.l.s.>..... . . . .<.P.r.i.n.c.i.p.a.l. .i.d.=.".A.u.t.h.o.r.".>..... . . . . . .<.U.s.e.r.I.d.>.S.-.1.-.5.-.1.8.<./.U.s.e.r.I.d.
                          Process:C:\Windows\System32\svchost.exe
                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                          Category:modified
                          Size (bytes):4680
                          Entropy (8bit):3.711501029615035
                          Encrypted:false
                          SSDEEP:96:pYMguQII4isJ6h4aGdinipV9ll7UY5HAmzQ+:9A44/xne7HO+
                          MD5:35DA4616E8C91EFD9EBE0B34A8632CC7
                          SHA1:83A37A92682DF838A1573F1407A053E3CF0147A1
                          SHA-256:71A642C890B1EC0409F68C6A81DEF12B82FB3F5EAC9031B6E520107DF5CF66BD
                          SHA-512:20AAD70F8B11239230367E486EDA1E10ED22B5E629F0FF925B73B391BA230050CD365000A8D02127E9BD80A0046B2C329198C9F436274E7960F0672EE92A0099
                          Malicious:false
                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...6.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.S.o.u.r.c.e.>.$.(.@.%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.p.p.c...d.l.l.,.-.2.0.0.).<./.S.o.u.r.c.e.>..... . . . .<.A.u.t.h.o.r.>.$.(.@.%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.p.p.c...d.l.l.,.-.2.0.0.).<./.A.u.t.h.o.r.>..... . . . .<.V.e.r.s.i.o.n.>.1...0.<./.V.e.r.s.i.o.n.>..... . . . .<.D.e.s.c.r.i.p.t.i.o.n.>.$.(.@.%.s.y.s.t.e.m.r.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.p.p.c...d.l.l.,.-.2.0.1.).<./.D.e.s.c.r.i.p.t.i.o.n.>..... . . . .<.U.R.I.>.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.S.o.f.t.w.a.r.e.P.r.o.t.e.c.t.i.o.n.P.l.a.t.f.o.r.m.\.S.v.c.R.e.s.t.a.r.t.T.a.s.k.<./.U.R.I.>..... . . . .<.S.e.c.u.r.i.t.y.D.e.s.c.r.i.p.t.o.r.>.D.:.P.(.A.;.;.F.A.;.;.;.S.Y.).(.A.;.;.F.A.;.;.;.B.A.).
                          File type:PE32+ executable (GUI) x86-64, for MS Windows
                          Entropy (8bit):7.132204010116387
                          TrID:
                          • Win64 Executable GUI (202006/5) 92.65%
                          • Win64 Executable (generic) (12005/4) 5.51%
                          • Generic Win/DOS Executable (2004/3) 0.92%
                          • DOS Executable Generic (2002/1) 0.92%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:2024-12-10#U67e5#U9605_uninst.exe
                          File size:2'319'360 bytes
                          MD5:0aa972dc4d2fe4c5f9a7a9d26ea3f51f
                          SHA1:2e141f8072836b479572b1d7fa468727011601eb
                          SHA256:bb1d91e8f93a1b08b098969e48a12d2f2b8203a30de0c3d85ec8cd36a3fa8049
                          SHA512:fcfad174c11e8085161afeebb0b4380bf82105ff3e108f09e115be7e51ef53a24159f12637862cdca4f770019fdaf78972966a81d406eedcc75a1b104fa072a0
                          SSDEEP:49152:soQVMCMbSwPwOTINyDiSym2GBKhrKhpYVNw:WZoPZI0D3yLGB6wpYVNw
                          TLSH:94B58D58258E8EA1F56F70B8990092D2DF22F52442B087FB37C5D655352A26CC8FFBC6
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......M..)...z...z...zB..{...zB..{...zB..{...z[..{...z[..{...z[..{;..z...z...z...{...zB..{...z...z...z...{...z...{...zRich...z.......
                          Icon Hash:00928e8e8686b000
                          Entrypoint:0x1401e0afc
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x140000000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                          Time Stamp:0x6757D86F [Tue Dec 10 05:58:07 2024 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:6
                          OS Version Minor:0
                          File Version Major:6
                          File Version Minor:0
                          Subsystem Version Major:6
                          Subsystem Version Minor:0
                          Import Hash:30e5e37178bcd33feee09c46955e53d9
                          Instruction
                          dec eax
                          sub esp, 28h
                          call 00007F5DAD409B3Ch
                          dec eax
                          add esp, 28h
                          jmp 00007F5DAD408FAFh
                          int3
                          int3
                          inc eax
                          push ebx
                          dec eax
                          sub esp, 20h
                          dec eax
                          mov ebx, ecx
                          jmp 00007F5DAD409141h
                          dec eax
                          mov ecx, ebx
                          call 00007F5DAD419272h
                          test eax, eax
                          je 00007F5DAD409145h
                          dec eax
                          mov ecx, ebx
                          call 00007F5DAD40F01Ah
                          dec eax
                          test eax, eax
                          je 00007F5DAD409119h
                          dec eax
                          add esp, 20h
                          pop ebx
                          ret
                          dec eax
                          cmp ebx, FFFFFFFFh
                          je 00007F5DAD409138h
                          call 00007F5DAD409C74h
                          int3
                          call 00007F5DAD409C8Eh
                          int3
                          dec eax
                          mov dword ptr [esp+08h], ebx
                          push edi
                          dec eax
                          sub esp, 20h
                          mov edx, 00000FA0h
                          dec eax
                          lea ecx, dword ptr [00050A06h]
                          call dword ptr [0001E510h]
                          dec eax
                          lea ecx, dword ptr [00025401h]
                          call dword ptr [0001E6A3h]
                          dec eax
                          mov ebx, eax
                          dec eax
                          test eax, eax
                          jne 00007F5DAD409147h
                          dec eax
                          lea ecx, dword ptr [00025434h]
                          call dword ptr [0001E68Eh]
                          dec eax
                          mov ebx, eax
                          dec eax
                          test eax, eax
                          je 00007F5DAD4091B1h
                          dec eax
                          lea edx, dword ptr [0002543Fh]
                          dec eax
                          mov ecx, ebx
                          call dword ptr [0001E5A6h]
                          dec eax
                          lea edx, dword ptr [0002544Fh]
                          dec eax
                          mov ecx, ebx
                          dec eax
                          mov edi, eax
                          call dword ptr [0001E593h]
                          dec eax
                          test edi, edi
                          je 00007F5DAD409147h
                          dec eax
                          test eax, eax
                          je 00007F5DAD409142h
                          dec eax
                          mov dword ptr [000009CAh], edi
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x217cb40x8c.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x2330000x7e78.pdata
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x23b0000x18d4.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x2107500x38.rdata
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x2109000x28.rdata
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2107900x138.rdata
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x1ff0000x590.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x1fdc400x1fde00abc775d348f8fcdba8ba056dc90b6a66unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x1ff0000x19e0c0x1a000ad081c80f064c5b3d90710fd215ad089False0.3142841045673077data4.61868901075285IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0x2190000x1986c0x1480065b50643df565d23f37475f99d8a275aFalse0.8717487614329268DIY-Thermocam raw data (Lepton 2.x), scale 20575-8256, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 214.2548687.671876601140216IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .pdata0x2330000x7e780x8000b714e5ad635fdebcddda0a616c83f649False0.45068359375data5.558361042678715IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0x23b0000x18d40x1a00a68bb8e43de5a6407a0e583bf4cb460cFalse0.3073918269230769data5.379536810924863IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          DLLImport
                          KERNEL32.dllSleep, LocalFree, WriteConsoleW, InitializeCriticalSectionEx, GetLastError, DecodePointer, DeleteCriticalSection, RaiseException, GetProcessHeap, HeapDestroy, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, CreateEventA, InitializeCriticalSectionAndSpinCount, InitializeConditionVariable, CloseHandle, GetSystemInfo, ResetEvent, PostQueuedCompletionStatus, WaitForSingleObject, EnterCriticalSection, SetEvent, GetQueuedCompletionStatus, GetCurrentThreadId, LeaveCriticalSection, GetExitCodeThread, TerminateThread, SetLastError, CreateTimerQueue, InitializeSRWLock, DeleteTimerQueueEx, lstrlenA, CreateFileA, GetFileSize, CreateFileMappingA, MapViewOfFileEx, MultiByteToWideChar, WideCharToMultiByte, GetModuleHandleA, GetProcAddress, GetCurrentThread, WakeConditionVariable, CreateIoCompletionPort, WakeAllConditionVariable, SwitchToThread, SleepConditionVariableCS, FindResourceExW, LoadResource, LockResource, SizeofResource, FindResourceW, GetNativeSystemInfo, CreateTimerQueueTimer, WaitForMultipleObjects, UnmapViewOfFile, AcquireSRWLockShared, ReleaseSRWLockShared, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, lstrcatA, lstrcatW, VirtualAlloc, GetCurrentProcessId, WaitForSingleObjectEx, CreateEventW, GetModuleHandleW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetSystemTimeAsFileTime, InitializeSListHead, OutputDebugStringW, RtlUnwindEx, RtlPcToFileHeader, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, CreateThread, ExitThread, FreeLibraryAndExitThread, GetModuleHandleExW, ExitProcess, GetModuleFileNameW, GetStdHandle, WriteFile, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, CompareStringW, LCMapStringW, GetFileType, GetTimeZoneInformation, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, GetStringTypeW, SetFilePointerEx, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, CreateFileW
                          SHLWAPI.dllStrChrA
                          USER32.dllMsgWaitForMultipleObjects, TranslateMessage, UnregisterClassA, PeekMessageA, DispatchMessageA
                          WS2_32.dllgetsockname, getpeername, ntohl, htonl, WSAIoctl, setsockopt, getsockopt, ioctlsocket, send, shutdown, closesocket, WSASend, WSASetLastError, inet_pton, ntohs, __WSAFDIsSet, WSAStartup, WSACleanup, socket, bind, listen, WSAGetOverlappedResult, connect, WSACreateEvent, WSAEventSelect, WSAWaitForMultipleEvents, WSAEnumNetworkEvents, recv, WSAResetEvent, WSACloseEvent, WSAGetLastError, freeaddrinfo, getaddrinfo, inet_ntop, htons, select, WSAStringToAddressA, WSARecv
                          WINMM.dlltimeGetTime
                          SHELL32.dllCommandLineToArgvW
                          TimestampSource PortDest PortSource IPDest IP
                          Dec 10, 2024 20:57:09.232709885 CET4970780192.168.2.6103.235.47.188
                          Dec 10, 2024 20:57:09.352664948 CET8049707103.235.47.188192.168.2.6
                          Dec 10, 2024 20:57:09.352744102 CET4970780192.168.2.6103.235.47.188
                          Dec 10, 2024 20:57:11.190124989 CET4970780192.168.2.6103.235.47.188
                          Dec 10, 2024 20:57:11.462136030 CET4970880192.168.2.643.154.172.193
                          Dec 10, 2024 20:57:11.581598997 CET804970843.154.172.193192.168.2.6
                          Dec 10, 2024 20:57:11.581671953 CET4970880192.168.2.643.154.172.193
                          Dec 10, 2024 20:57:11.597552061 CET4970880192.168.2.643.154.172.193
                          Dec 10, 2024 20:57:11.716922045 CET804970843.154.172.193192.168.2.6
                          Dec 10, 2024 20:57:13.171914101 CET804970843.154.172.193192.168.2.6
                          Dec 10, 2024 20:57:13.218350887 CET4970880192.168.2.643.154.172.193
                          Dec 10, 2024 20:57:13.503958941 CET4970880192.168.2.643.154.172.193
                          Dec 10, 2024 20:57:13.623404980 CET804970843.154.172.193192.168.2.6
                          Dec 10, 2024 20:57:13.855581045 CET4971080192.168.2.643.154.172.193
                          Dec 10, 2024 20:57:13.974951982 CET804971043.154.172.193192.168.2.6
                          Dec 10, 2024 20:57:13.975054979 CET4971080192.168.2.643.154.172.193
                          Dec 10, 2024 20:57:13.975209951 CET4971080192.168.2.643.154.172.193
                          Dec 10, 2024 20:57:14.094429970 CET804971043.154.172.193192.168.2.6
                          Dec 10, 2024 20:57:15.501208067 CET804971043.154.172.193192.168.2.6
                          Dec 10, 2024 20:57:15.544945955 CET4971080192.168.2.643.154.172.193
                          Dec 10, 2024 20:57:15.578440905 CET4971080192.168.2.643.154.172.193
                          Dec 10, 2024 20:57:15.697978020 CET804971043.154.172.193192.168.2.6
                          Dec 10, 2024 20:57:23.624608994 CET4970880192.168.2.643.154.172.193
                          Dec 10, 2024 20:57:23.743875980 CET804970843.154.172.193192.168.2.6
                          Dec 10, 2024 20:57:25.702755928 CET4971080192.168.2.643.154.172.193
                          Dec 10, 2024 20:57:25.822446108 CET804971043.154.172.193192.168.2.6
                          Dec 10, 2024 20:57:33.749607086 CET4970880192.168.2.643.154.172.193
                          Dec 10, 2024 20:57:33.868994951 CET804970843.154.172.193192.168.2.6
                          Dec 10, 2024 20:57:35.827774048 CET4971080192.168.2.643.154.172.193
                          Dec 10, 2024 20:57:35.949265003 CET804971043.154.172.193192.168.2.6
                          Dec 10, 2024 20:57:43.874610901 CET4970880192.168.2.643.154.172.193
                          Dec 10, 2024 20:57:43.994211912 CET804970843.154.172.193192.168.2.6
                          Dec 10, 2024 20:57:45.952790976 CET4971080192.168.2.643.154.172.193
                          Dec 10, 2024 20:57:46.072066069 CET804971043.154.172.193192.168.2.6
                          Dec 10, 2024 20:57:53.999696970 CET4970880192.168.2.643.154.172.193
                          Dec 10, 2024 20:57:54.119518042 CET804970843.154.172.193192.168.2.6
                          Dec 10, 2024 20:57:56.077753067 CET4971080192.168.2.643.154.172.193
                          Dec 10, 2024 20:57:56.197503090 CET804971043.154.172.193192.168.2.6
                          Dec 10, 2024 20:58:04.124643087 CET4970880192.168.2.643.154.172.193
                          Dec 10, 2024 20:58:04.243915081 CET804970843.154.172.193192.168.2.6
                          Dec 10, 2024 20:58:06.202764034 CET4971080192.168.2.643.154.172.193
                          Dec 10, 2024 20:58:06.322051048 CET804971043.154.172.193192.168.2.6
                          Dec 10, 2024 20:58:14.249644995 CET4970880192.168.2.643.154.172.193
                          Dec 10, 2024 20:58:14.368870020 CET804970843.154.172.193192.168.2.6
                          Dec 10, 2024 20:58:14.378014088 CET4970880192.168.2.643.154.172.193
                          Dec 10, 2024 20:58:14.498291016 CET804970843.154.172.193192.168.2.6
                          Dec 10, 2024 20:58:16.327792883 CET4971080192.168.2.643.154.172.193
                          Dec 10, 2024 20:58:16.447204113 CET804971043.154.172.193192.168.2.6
                          Dec 10, 2024 20:58:16.862456083 CET4971080192.168.2.643.154.172.193
                          Dec 10, 2024 20:58:16.982110023 CET804971043.154.172.193192.168.2.6
                          Dec 10, 2024 20:58:24.499644995 CET4970880192.168.2.643.154.172.193
                          Dec 10, 2024 20:58:24.619369030 CET804970843.154.172.193192.168.2.6
                          Dec 10, 2024 20:58:26.984107018 CET4971080192.168.2.643.154.172.193
                          Dec 10, 2024 20:58:27.105360031 CET804971043.154.172.193192.168.2.6
                          Dec 10, 2024 20:58:34.624677896 CET4970880192.168.2.643.154.172.193
                          Dec 10, 2024 20:58:34.744251013 CET804970843.154.172.193192.168.2.6
                          Dec 10, 2024 20:58:37.109074116 CET4971080192.168.2.643.154.172.193
                          Dec 10, 2024 20:58:37.229079008 CET804971043.154.172.193192.168.2.6
                          Dec 10, 2024 20:58:44.749665976 CET4970880192.168.2.643.154.172.193
                          Dec 10, 2024 20:58:44.870816946 CET804970843.154.172.193192.168.2.6
                          Dec 10, 2024 20:58:47.234070063 CET4971080192.168.2.643.154.172.193
                          Dec 10, 2024 20:58:47.353444099 CET804971043.154.172.193192.168.2.6
                          Dec 10, 2024 20:58:54.874821901 CET4970880192.168.2.643.154.172.193
                          Dec 10, 2024 20:58:54.994086027 CET804970843.154.172.193192.168.2.6
                          Dec 10, 2024 20:58:57.359031916 CET4971080192.168.2.643.154.172.193
                          Dec 10, 2024 20:58:57.482988119 CET804971043.154.172.193192.168.2.6
                          Dec 10, 2024 20:59:04.999684095 CET4970880192.168.2.643.154.172.193
                          Dec 10, 2024 20:59:05.120052099 CET804970843.154.172.193192.168.2.6
                          Dec 10, 2024 20:59:07.484136105 CET4971080192.168.2.643.154.172.193
                          Dec 10, 2024 20:59:07.603691101 CET804971043.154.172.193192.168.2.6
                          Dec 10, 2024 20:59:14.738495111 CET4970880192.168.2.643.154.172.193
                          Dec 10, 2024 20:59:14.858305931 CET804970843.154.172.193192.168.2.6
                          Dec 10, 2024 20:59:17.239583015 CET4971080192.168.2.643.154.172.193
                          Dec 10, 2024 20:59:17.361779928 CET804971043.154.172.193192.168.2.6
                          Dec 10, 2024 20:59:24.859066963 CET4970880192.168.2.643.154.172.193
                          Dec 10, 2024 20:59:24.978475094 CET804970843.154.172.193192.168.2.6
                          Dec 10, 2024 20:59:27.374701023 CET4971080192.168.2.643.154.172.193
                          Dec 10, 2024 20:59:27.495471954 CET804971043.154.172.193192.168.2.6
                          Dec 10, 2024 20:59:34.984070063 CET4970880192.168.2.643.154.172.193
                          Dec 10, 2024 20:59:35.103465080 CET804970843.154.172.193192.168.2.6
                          Dec 10, 2024 20:59:37.499758959 CET4971080192.168.2.643.154.172.193
                          Dec 10, 2024 20:59:37.620651007 CET804971043.154.172.193192.168.2.6
                          Dec 10, 2024 20:59:45.109174967 CET4970880192.168.2.643.154.172.193
                          Dec 10, 2024 20:59:45.228841066 CET804970843.154.172.193192.168.2.6
                          Dec 10, 2024 20:59:47.624700069 CET4971080192.168.2.643.154.172.193
                          Dec 10, 2024 20:59:47.747801065 CET804971043.154.172.193192.168.2.6
                          Dec 10, 2024 20:59:55.234095097 CET4970880192.168.2.643.154.172.193
                          Dec 10, 2024 20:59:55.353646040 CET804970843.154.172.193192.168.2.6
                          Dec 10, 2024 20:59:57.749695063 CET4971080192.168.2.643.154.172.193
                          Dec 10, 2024 20:59:57.869338989 CET804971043.154.172.193192.168.2.6
                          Dec 10, 2024 21:00:05.359257936 CET4970880192.168.2.643.154.172.193
                          Dec 10, 2024 21:00:05.478781939 CET804970843.154.172.193192.168.2.6
                          Dec 10, 2024 21:00:07.874706984 CET4971080192.168.2.643.154.172.193
                          Dec 10, 2024 21:00:07.994079113 CET804971043.154.172.193192.168.2.6
                          Dec 10, 2024 21:00:15.484078884 CET4970880192.168.2.643.154.172.193
                          Dec 10, 2024 21:00:15.603648901 CET804970843.154.172.193192.168.2.6
                          Dec 10, 2024 21:00:15.612907887 CET4970880192.168.2.643.154.172.193
                          Dec 10, 2024 21:00:15.732475042 CET804970843.154.172.193192.168.2.6
                          Dec 10, 2024 21:00:15.828195095 CET4971080192.168.2.643.154.172.193
                          Dec 10, 2024 21:00:15.951997042 CET804971043.154.172.193192.168.2.6
                          TimestampSource PortDest PortSource IPDest IP
                          Dec 10, 2024 20:57:09.048140049 CET6446253192.168.2.61.1.1.1
                          Dec 10, 2024 20:57:09.187827110 CET53644621.1.1.1192.168.2.6
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Dec 10, 2024 20:57:09.048140049 CET192.168.2.61.1.1.10x8283Standard query (0)www.baidu.comA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Dec 10, 2024 20:57:09.187827110 CET1.1.1.1192.168.2.60x8283No error (0)www.baidu.comwww.a.shifen.comCNAME (Canonical name)IN (0x0001)false
                          Dec 10, 2024 20:57:09.187827110 CET1.1.1.1192.168.2.60x8283No error (0)www.a.shifen.comwww.wshifen.comCNAME (Canonical name)IN (0x0001)false
                          Dec 10, 2024 20:57:09.187827110 CET1.1.1.1192.168.2.60x8283No error (0)www.wshifen.com103.235.47.188A (IP address)IN (0x0001)false
                          Dec 10, 2024 20:57:09.187827110 CET1.1.1.1192.168.2.60x8283No error (0)www.wshifen.com103.235.46.96A (IP address)IN (0x0001)false
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.64970843.154.172.193805164C:\Windows\System32\svchost.exe
                          TimestampBytes transferredDirectionData
                          Dec 10, 2024 20:57:11.597552061 CET56OUTData Raw: 02 24 27 25 0c 02 14 07 14 1a 10 02 23 0f 2f 10 0a 08 25 24 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 1e 1a 3d 38
                          Data Ascii: $'%#/%$::::::::::::::::::::::::::::::::=8
                          Dec 10, 2024 20:57:13.171914101 CET85INData Raw: 05 1c 07 14 16 1f 25 04 07 22 18 0a 25 10 2f 24 1e 2e 17 02 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3b 3a 3a 3a 5e 3a 3a 3a 27 3a 3a 3a 3a 3a 3a 3a 1e 1a 3d 38 78 9c 63 b2 12 b1 e2 b3 e2 01 92 dc 56 1c 56 9c 60 9a d7 8a df 8a 9a 00 00 bc
                          Data Ascii: %"%/$.::::::::::::::::;:::^:::':::::::=8xcVV`a
                          Dec 10, 2024 20:57:13.503958941 CET796OUTData Raw: 05 1c 07 14 16 1f 25 04 07 22 18 0a 25 10 2f 24 1e 2e 17 02 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3b 3a 3a 3a 90 1c 3a 3a de 38 3a 3a 3a 3a 3a 3a 1e 1a 3d 38 78 9c ed 59 df 6f 12 41 10 36 f0 d2 16 c4 3e f0 d0 10 63 4c 63 d4 18 e3 93 4f
                          Data Ascii: %"%/$.::::::::::::::::;:::::8::::::=8xYoA6>cLcOzHeRS4_7shq(4d{;mS@[Z>Db2LY@/$1RHRHNxRO:bicx(m6K13J6#pK=)~7RCJat
                          Dec 10, 2024 20:57:23.624608994 CET6OUTData Raw: 00
                          Data Ascii:
                          Dec 10, 2024 20:57:33.749607086 CET6OUTData Raw: 00
                          Data Ascii:
                          Dec 10, 2024 20:57:43.874610901 CET6OUTData Raw: 00
                          Data Ascii:
                          Dec 10, 2024 20:57:53.999696970 CET6OUTData Raw: 00
                          Data Ascii:
                          Dec 10, 2024 20:58:04.124643087 CET6OUTData Raw: 00
                          Data Ascii:
                          Dec 10, 2024 20:58:14.249644995 CET6OUTData Raw: 00
                          Data Ascii:
                          Dec 10, 2024 20:58:14.378014088 CET624OUTData Raw: 2c 11 1a 2e 1b 1a 08 21 1e 1a 2e 15 0c 12 25 2f 27 0d 2c 1f 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 32 1a 3a 3a 36 25 3a 3a 02 38 3a 3a 3a 3a 3a 3a 1e 1a 3d 38 78 9c ed 58 5d 6b 1a 41 14 85 3e 15 9a 87 3e f8 10 a4 94 22 a5 29 25 14 1f fa
                          Data Ascii: ,.!.%/',::::::::::::::::2::6%::8::::::=8xX]kA>>")%tSaw1[BAkbcGrE[+w;s{g|0=<x_4}|G!_#XX2`w2kJ"zD'.-J7QN/M%\SxJFle:


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          1192.168.2.64971043.154.172.193806464C:\Windows\System32\svchost.exe
                          TimestampBytes transferredDirectionData
                          Dec 10, 2024 20:57:13.975209951 CET56OUTData Raw: 05 1c 07 14 16 1f 25 04 07 22 18 0a 25 10 2f 24 1e 2e 17 02 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 1e 1a 3d 38
                          Data Ascii: %"%/$.::::::::::::::::::::::::::::::::=8
                          Dec 10, 2024 20:57:15.501208067 CET85INData Raw: 22 16 2c 26 11 20 02 2b 26 16 2d 1f 0a 1b 0c 16 10 2a 2b 0c 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3b 3a 3a 3a 5e 3a 3a 3a 27 3a 3a 3a 3a 3a 3a 3a 1e 1a 3d 38 78 9c 63 b2 12 b1 e2 b3 e2 01 92 dc 56 1c 56 9c 60 9a d7 8a df 8a 9a 00 00 bc
                          Data Ascii: ",& +&-*+::::::::::::::::;:::^:::':::::::=8xcVV`a
                          Dec 10, 2024 20:57:15.578440905 CET768OUTData Raw: 2f 15 14 16 0b 29 2a 2a 26 2a 21 13 2f 25 2c 28 12 2c 00 0b 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3b 3a 3a 3a 42 1c 3a 3a f2 38 3a 3a 3a 3a 3a 3a 1e 1a 3d 38 78 9c ed 58 df 6f 12 41 10 36 f0 d2 16 c4 3e f0 d0 5c 8c 69 1a a3 c6 18 9f 7c
                          Data Ascii: /)**&*!/%,(,::::::::::::::::;:::B::8::::::=8xXoA6>\i|&G8C4_9G)9f2~3{vGd%,2H-^(9RHRHN|RO:ci(y866`Oxww8-| 2
                          Dec 10, 2024 20:57:25.702755928 CET6OUTData Raw: 00
                          Data Ascii:
                          Dec 10, 2024 20:57:35.827774048 CET6OUTData Raw: 00
                          Data Ascii:
                          Dec 10, 2024 20:57:45.952790976 CET6OUTData Raw: 00
                          Data Ascii:
                          Dec 10, 2024 20:57:56.077753067 CET6OUTData Raw: 00
                          Data Ascii:
                          Dec 10, 2024 20:58:06.202764034 CET6OUTData Raw: 00
                          Data Ascii:
                          Dec 10, 2024 20:58:16.327792883 CET6OUTData Raw: 00
                          Data Ascii:
                          Dec 10, 2024 20:58:16.862456083 CET624OUTData Raw: 26 0e 1a 29 2c 07 19 06 09 02 06 1d 16 26 0a 00 1b 03 1e 24 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 3a 32 1a 3a 3a 36 25 3a 3a 02 38 3a 3a 3a 3a 3a 3a 1e 1a 3d 38 78 9c ed 58 5d 6b 1a 41 14 85 3e 15 9a 87 3e f8 10 a4 94 22 a5 29 25 14 1f fa
                          Data Ascii: &),&$::::::::::::::::2::6%::8::::::=8xX]kA>>")%tSaw1[BAkbcGrE[+w;s{g|0=<x_4}|G!_#XX2`w2kJ"zD'.-J7QN/M%\SxJFle:


                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:14:57:07
                          Start date:10/12/2024
                          Path:C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Users\user\Desktop\2024-12-10#U67e5#U9605_uninst.exe"
                          Imagebase:0x7ff7d9a10000
                          File size:2'319'360 bytes
                          MD5 hash:0AA972DC4D2FE4C5F9A7A9D26EA3F51F
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:true

                          Target ID:2
                          Start time:14:57:08
                          Start date:10/12/2024
                          Path:C:\Windows\System32\svchost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                          Imagebase:0x7ff7403e0000
                          File size:55'320 bytes
                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          Target ID:3
                          Start time:14:57:10
                          Start date:10/12/2024
                          Path:C:\Windows\System32\svchost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\svchost.exe -k netsvcs
                          Imagebase:0x7ff7403e0000
                          File size:55'320 bytes
                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          Target ID:4
                          Start time:14:57:10
                          Start date:10/12/2024
                          Path:C:\Windows\System32\dllhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}
                          Imagebase:0x7ff642ec0000
                          File size:21'312 bytes
                          MD5 hash:08EB78E5BE019DF044C26B14703BD1FA
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:moderate
                          Has exited:false

                          Target ID:5
                          Start time:14:57:11
                          Start date:10/12/2024
                          Path:C:\Program Files\Windows Mail\arphaCrashReport64.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Program Files\Windows Mail\arphaCrashReport64.exe"
                          Imagebase:0x7ff6dd480000
                          File size:238'384 bytes
                          MD5 hash:8B5D51DF7BBD67AEB51E9B9DEE6BC84A
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Antivirus matches:
                          • Detection: 4%, ReversingLabs
                          Reputation:moderate
                          Has exited:true

                          Target ID:6
                          Start time:14:57:11
                          Start date:10/12/2024
                          Path:C:\Windows\System32\svchost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\svchost.exe -k netsvcs
                          Imagebase:0x7ff7403e0000
                          File size:55'320 bytes
                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          Target ID:7
                          Start time:14:57:12
                          Start date:10/12/2024
                          Path:C:\Windows\System32\dllhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}
                          Imagebase:0x7ff642ec0000
                          File size:21'312 bytes
                          MD5 hash:08EB78E5BE019DF044C26B14703BD1FA
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:moderate
                          Has exited:false

                          Reset < >

                            Execution Graph

                            Execution Coverage:4.3%
                            Dynamic/Decrypted Code Coverage:18.6%
                            Signature Coverage:25.6%
                            Total number of Nodes:441
                            Total number of Limit Nodes:22
                            execution_graph 49464 1bcee860000 49465 1bcee860114 49464->49465 49466 1bcee86016b VirtualAlloc 49465->49466 49467 1bcee860191 49466->49467 49470 1bcee860214 49467->49470 49469 1bcee8601a4 49473 1bcee860224 49470->49473 49472 1bcee86021d 49472->49469 49474 1bcee860254 49473->49474 49475 1bcee8602e1 VirtualAlloc 49474->49475 49482 1bcee860336 49474->49482 49476 1bcee8602fe 49475->49476 49477 1bcee860361 VirtualAlloc 49476->49477 49476->49482 49478 1bcee8603b3 49477->49478 49483 1bcee860544 49478->49483 49480 1bcee8603cf 49487 1bcee8608d0 49480->49487 49482->49472 49486 1bcee86056b 49483->49486 49484 1bcee860623 49484->49480 49485 1bcee8605e0 VirtualAlloc 49485->49486 49486->49484 49486->49485 49490 1bcee8608f4 49487->49490 49488 1bcee860ac2 49488->49482 49489 1bcee8609e5 LoadLibraryA 49489->49488 49489->49490 49490->49488 49490->49489 49491 180005824 realloc NtQuerySystemInformation 49492 7ff7d9a13c50 49493 7ff7d9a13c73 49492->49493 49496 7ff7d9a4add0 49493->49496 49497 7ff7d9a4adda 49496->49497 49500 7ff7d9a4af0d 49497->49500 49602 7ff7d9a5c98a SwitchToThread SetLastError 49497->49602 49502 7ff7d9a4b629 49500->49502 49536 7ff7d9a4cbdd 49500->49536 49538 7ff7d9a602e6 49500->49538 49501 7ff7d9a4b800 49503 7ff7d9a4bb59 49501->49503 49510 7ff7d9a5902e 49501->49510 49610 7ff7d9bf0600 49502->49610 49503->49536 49565 7ff7d9a68d5a 49503->49565 49504 7ff7d9a5c58e GetLastError 49508 7ff7d9a5c5a9 SetLastError 49504->49508 49508->49502 49509 7ff7d9a4bc0f 49513 7ff7d9a4bf68 49509->49513 49514 7ff7d9a55f1c 49509->49514 49511 7ff7d9a59e82 WSAGetLastError 49510->49511 49510->49536 49519 7ff7d9a59ea4 49511->49519 49517 7ff7d9a4c3c2 49513->49517 49521 7ff7d9a52dff 49513->49521 49513->49536 49515 7ff7d9a56d70 WSAGetLastError 49514->49515 49514->49536 49526 7ff7d9a56d92 49515->49526 49517->49536 49573 7ff7d9a6b922 49517->49573 49609 7ff7d9a7166a SetLastError 49519->49609 49520 7ff7d9a4c46f 49523 7ff7d9a4c7c8 49520->49523 49530 7ff7d9a4fced 49520->49530 49521->49536 49606 7ff7d9a2dde0 GetLastError 49521->49606 49523->49536 49599 7ff7d9a71260 49523->49599 49608 7ff7d9a7166a SetLastError 49526->49608 49527 7ff7d9a4c865 49528 7ff7d9a4cbba 49527->49528 49537 7ff7d9a4cbe2 49527->49537 49603 7ff7d9a33200 ResetEvent 49528->49603 49531 7ff7d9a50b41 WSAGetLastError 49530->49531 49530->49536 49535 7ff7d9a50b63 49531->49535 49533 7ff7d9a53c64 49607 7ff7d9a7166a SetLastError 49533->49607 49605 7ff7d9a7166a SetLastError 49535->49605 49536->49502 49536->49504 49537->49536 49604 7ff7d9a7166a SetLastError 49537->49604 49539 7ff7d9a602f1 49538->49539 49619 7ff7d9a48ab0 StrChrA 49539->49619 49541 7ff7d9a603fb 49545 7ff7d9a6049f 49541->49545 49622 7ff7d9a2a8c0 49541->49622 49543 7ff7d9a61ef1 socket 49549 7ff7d9a61f40 49543->49549 49545->49543 49547 7ff7d9a6101f 49545->49547 49552 7ff7d9a61b4f 49545->49552 49562 7ff7d9a60b63 49545->49562 49667 7ff7d9a2b700 56 API calls 49545->49667 49548 7ff7d9a61b2c WSASetLastError 49547->49548 49547->49552 49547->49562 49548->49552 49553 7ff7d9a6325a 49549->49553 49549->49562 49630 7ff7d9a2cbf0 WSAIoctl 49549->49630 49668 7ff7d9a18ae0 RtlPcToFileHeader RaiseException std::_Xinvalid_argument 49549->49668 49552->49543 49552->49562 49556 7ff7d9a63d71 49553->49556 49635 7ff7d9a2ced0 49553->49635 49669 7ff7d9a18ae0 RtlPcToFileHeader RaiseException std::_Xinvalid_argument 49553->49669 49558 7ff7d9a6488c 49556->49558 49645 7ff7d9a2ca80 setsockopt 49556->49645 49670 7ff7d9a18ae0 RtlPcToFileHeader RaiseException std::_Xinvalid_argument 49556->49670 49648 7ff7d9a7a24e 49558->49648 49560 7ff7d9a66942 VirtualAlloc 49564 7ff7d9a669a9 49560->49564 49562->49501 49563 7ff7d9a648b4 49563->49560 49651 7ff7d9a7acf8 49564->49651 49569 7ff7d9a68dc6 49565->49569 49566 7ff7d9bf0600 _invalid_parameter_noinfo_noreturn 8 API calls 49567 7ff7d9a6b915 49566->49567 49567->49509 49568 7ff7d9a691f4 49568->49566 49569->49568 49570 7ff7d9a6acdf 49569->49570 49786 7ff7d9a49720 9 API calls 49569->49786 49787 7ff7d9a2a660 htons 49570->49787 49574 7ff7d9a6b9d5 49573->49574 49575 7ff7d9a6bdae 49574->49575 49582 7ff7d9a6c2d9 49574->49582 49598 7ff7d9a6c2d2 49574->49598 49576 7ff7d9a6c202 49575->49576 49575->49598 49577 7ff7d9a6c223 connect 49576->49577 49579 7ff7d9a6c26e 49577->49579 49580 7ff7d9a6c2b1 49577->49580 49579->49580 49581 7ff7d9a6c293 WSAGetLastError 49579->49581 49580->49598 49581->49580 49584 7ff7d9a6dcd1 49582->49584 49582->49598 49788 7ff7d9a2ca20 ioctlsocket 49582->49788 49805 7ff7d9a18ae0 RtlPcToFileHeader RaiseException std::_Xinvalid_argument 49582->49805 49585 7ff7d9a6dcf2 connect 49584->49585 49586 7ff7d9a6dd2e 49585->49586 49587 7ff7d9a6ddca GetLastError 49586->49587 49588 7ff7d9a6dde8 49586->49588 49586->49598 49587->49588 49590 7ff7d9a6e556 49588->49590 49588->49598 49791 7ff7d9a2dad0 49588->49791 49591 7ff7d9a6e957 49590->49591 49593 7ff7d9a700a6 49590->49593 49590->49598 49592 7ff7d9a6e9e7 WSAEventSelect 49591->49592 49591->49598 49595 7ff7d9a6ea3b 49592->49595 49594 7ff7d9a70ee5 WSASetLastError 49593->49594 49593->49598 49594->49598 49595->49598 49806 7ff7d9a2dde0 GetLastError 49595->49806 49597 7ff7d9a6f227 WSASetLastError 49597->49598 49598->49520 49810 7ff7d9bf6bfc 49599->49810 49601 7ff7d9a712b8 49601->49527 49602->49500 49603->49536 49604->49536 49605->49536 49606->49533 49607->49536 49608->49536 49609->49536 49611 7ff7d9bf0609 49610->49611 49612 7ff7d9a13cae 49611->49612 49613 7ff7d9bf0e94 IsProcessorFeaturePresent 49611->49613 49614 7ff7d9bf0eac 49613->49614 49847 7ff7d9bf1088 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 49614->49847 49616 7ff7d9bf0ebf 49848 7ff7d9bf0e60 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 49616->49848 49620 7ff7d9a48b1b lstrlenA 49619->49620 49621 7ff7d9a48af1 49619->49621 49620->49621 49621->49541 49671 7ff7d9a2a160 49622->49671 49625 7ff7d9a2a91a 49679 7ff7d9a2aa80 49625->49679 49626 7ff7d9a2a900 49694 7ff7d9a2a510 11 API calls _invalid_parameter_noinfo_noreturn 49626->49694 49629 7ff7d9a2a914 49629->49545 49631 7ff7d9a2ccb7 WSAGetLastError 49630->49631 49632 7ff7d9a2ccd5 49630->49632 49631->49632 49633 7ff7d9bf0600 _invalid_parameter_noinfo_noreturn 8 API calls 49632->49633 49634 7ff7d9a2ccfe 49633->49634 49634->49549 49636 7ff7d9a2cf31 setsockopt setsockopt 49635->49636 49637 7ff7d9a2cfb4 49635->49637 49638 7ff7d9a2d108 49636->49638 49639 7ff7d9a2cfcc setsockopt setsockopt 49637->49639 49640 7ff7d9a2d04f 49637->49640 49643 7ff7d9bf0600 _invalid_parameter_noinfo_noreturn 8 API calls 49638->49643 49639->49638 49641 7ff7d9a2d0e7 SetLastError 49640->49641 49642 7ff7d9a2d067 setsockopt setsockopt 49640->49642 49641->49638 49642->49638 49644 7ff7d9a2d121 49643->49644 49644->49553 49646 7ff7d9bf0600 _invalid_parameter_noinfo_noreturn 8 API calls 49645->49646 49647 7ff7d9a2cae6 49646->49647 49647->49556 49708 7ff7d9a344c0 49648->49708 49655 7ff7d9a7ad02 49651->49655 49653 7ff7d9a7cff5 49654 7ff7d9bde680 15 API calls 49653->49654 49663 7ff7d9a7d017 49654->49663 49735 7ff7d9bde680 49655->49735 49657 7ff7d9bde680 15 API calls 49658 7ff7d9a85a12 49657->49658 49659 7ff7d9bde680 15 API calls 49658->49659 49660 7ff7d9a85a35 49659->49660 49661 7ff7d9bf0600 _invalid_parameter_noinfo_noreturn 8 API calls 49660->49661 49662 7ff7d9a85a45 49661->49662 49662->49562 49739 7ff7d9c01954 49663->49739 49664 7ff7d9a7f299 49746 7ff7d9ab6d7e 49664->49746 49665 7ff7d9a837dd 49665->49657 49667->49547 49672 7ff7d9a2a18c 49671->49672 49678 7ff7d9a2a1a7 49671->49678 49673 7ff7d9a2a1bf StrChrA 49672->49673 49672->49678 49674 7ff7d9a2a1f7 49673->49674 49673->49678 49695 7ff7d9a2a400 52 API calls _invalid_parameter_noinfo_noreturn 49674->49695 49675 7ff7d9bf0600 _invalid_parameter_noinfo_noreturn 8 API calls 49676 7ff7d9a2a3e8 49675->49676 49676->49625 49676->49626 49678->49675 49680 7ff7d9a2aab2 _invalid_parameter_noinfo_noreturn 49679->49680 49696 7ff7d9a2ac80 49680->49696 49682 7ff7d9a2aafd 49683 7ff7d9a2ab0a getaddrinfo 49682->49683 49684 7ff7d9a2ab35 49683->49684 49685 7ff7d9a2ab51 WSASetLastError 49684->49685 49693 7ff7d9a2ab6f 49684->49693 49692 7ff7d9a2ac3b 49685->49692 49686 7ff7d9bf0600 _invalid_parameter_noinfo_noreturn 8 API calls 49690 7ff7d9a2ac6f 49686->49690 49687 7ff7d9a2ac0a freeaddrinfo 49688 7ff7d9a2ac3d WSASetLastError 49687->49688 49689 7ff7d9a2ac2c 49687->49689 49688->49692 49699 7ff7d9a2a660 htons 49689->49699 49690->49629 49692->49686 49693->49687 49694->49629 49695->49678 49700 7ff7d9a30c70 49696->49700 49699->49692 49701 7ff7d9a30ca1 49700->49701 49702 7ff7d9a2acc0 49700->49702 49706 7ff7d9a30d40 RtlPcToFileHeader RaiseException __std_exception_copy 49701->49706 49702->49682 49704 7ff7d9a30cf4 49707 7ff7d9a30f40 54 API calls 49704->49707 49706->49704 49707->49702 49711 7ff7d9a34b70 49708->49711 49714 7ff7d9a34ba0 49711->49714 49715 7ff7d9a34bc2 49714->49715 49718 7ff7d9a34be0 49715->49718 49719 7ff7d9a34c29 49718->49719 49720 7ff7d9a34c1a 49718->49720 49724 7ff7d9a34c42 49719->49724 49731 7ff7d9a18ae0 RtlPcToFileHeader RaiseException std::_Xinvalid_argument 49719->49731 49730 7ff7d9a34d70 RtlPcToFileHeader RaiseException 49720->49730 49722 7ff7d9a344e2 49722->49563 49732 7ff7d9a34200 RtlPcToFileHeader RaiseException 49724->49732 49726 7ff7d9a34c85 49728 7ff7d9a34cd3 49726->49728 49733 7ff7d9a34e50 52 API calls 49726->49733 49734 7ff7d9a34270 RtlPcToFileHeader RaiseException 49728->49734 49730->49722 49732->49726 49733->49728 49734->49722 49736 7ff7d9bde6be 49735->49736 49738 7ff7d9bde830 49736->49738 49751 7ff7d9be0a20 49736->49751 49738->49653 49740 7ff7d9c0199f 49739->49740 49744 7ff7d9c01963 __std_exception_copy 49739->49744 49784 7ff7d9bf6db8 11 API calls __std_exception_copy 49740->49784 49741 7ff7d9c01986 HeapAlloc 49743 7ff7d9c0199d 49741->49743 49741->49744 49743->49664 49744->49740 49744->49741 49783 7ff7d9c00c60 EnterCriticalSection LeaveCriticalSection __std_exception_copy 49744->49783 49747 7ff7d9ab6dec 49746->49747 49748 7ff7d9ab7252 49747->49748 49785 7ff7d9ab72c0 8 API calls _invalid_parameter_noinfo_noreturn 49747->49785 49748->49665 49750 7ff7d9ab72b9 49750->49665 49752 7ff7d9be0a60 49751->49752 49753 7ff7d9be2437 49752->49753 49754 7ff7d9be182c 49752->49754 49755 7ff7d9be0d75 49752->49755 49753->49738 49759 7ff7d9c01954 12 API calls 49754->49759 49761 7ff7d9c0189c 49755->49761 49756 7ff7d9be1827 Concurrency::cancel_current_task 49756->49753 49773 7ff7d9bf2f54 RtlPcToFileHeader RaiseException 49756->49773 49758 7ff7d9be3a5e 49759->49756 49762 7ff7d9c018b1 49761->49762 49763 7ff7d9c018bb 49761->49763 49764 7ff7d9c01954 12 API calls 49762->49764 49765 7ff7d9c018c0 49763->49765 49771 7ff7d9c018c7 __std_exception_copy 49763->49771 49770 7ff7d9c018b9 49764->49770 49774 7ff7d9c01918 49765->49774 49766 7ff7d9c018cd 49780 7ff7d9bf6db8 11 API calls __std_exception_copy 49766->49780 49767 7ff7d9c018fa RtlReAllocateHeap 49767->49770 49767->49771 49770->49756 49771->49766 49771->49767 49781 7ff7d9c00c60 EnterCriticalSection LeaveCriticalSection __std_exception_copy 49771->49781 49773->49758 49775 7ff7d9c0191d HeapFree 49774->49775 49776 7ff7d9c0194c 49774->49776 49775->49776 49777 7ff7d9c01938 GetLastError 49775->49777 49776->49770 49778 7ff7d9c01945 __free_lconv_mon 49777->49778 49782 7ff7d9bf6db8 11 API calls __std_exception_copy 49778->49782 49780->49770 49781->49771 49782->49776 49783->49744 49784->49743 49785->49750 49786->49570 49787->49568 49789 7ff7d9bf0600 _invalid_parameter_noinfo_noreturn 8 API calls 49788->49789 49790 7ff7d9a2ca69 49789->49790 49790->49582 49792 7ff7d9a2db6f select 49791->49792 49794 7ff7d9a2dd12 49792->49794 49795 7ff7d9a2dcd2 49792->49795 49797 7ff7d9a2dd31 49794->49797 49798 7ff7d9a2dd90 __WSAFDIsSet 49794->49798 49803 7ff7d9a2dce6 49795->49803 49807 7ff7d9a2dde0 GetLastError 49795->49807 49808 7ff7d9a2d1a0 9 API calls _invalid_parameter_noinfo_noreturn 49797->49808 49798->49803 49800 7ff7d9bf0600 _invalid_parameter_noinfo_noreturn 8 API calls 49802 7ff7d9a2ddc9 49800->49802 49801 7ff7d9a2dd3b 49801->49803 49809 7ff7d9a2dde0 GetLastError 49801->49809 49802->49590 49803->49800 49806->49597 49807->49803 49808->49801 49809->49803 49811 7ff7d9bf6c33 49810->49811 49812 7ff7d9bf6c1c 49810->49812 49828 7ff7d9bf6b98 49811->49828 49835 7ff7d9bf6db8 11 API calls __std_exception_copy 49812->49835 49815 7ff7d9bf6c21 49836 7ff7d9bf71c4 52 API calls _invalid_parameter_noinfo 49815->49836 49818 7ff7d9bf6c46 CreateThread 49819 7ff7d9bf6c2c 49818->49819 49820 7ff7d9bf6c76 GetLastError 49818->49820 49819->49601 49837 7ff7d9bf6d2c 11 API calls 2 library calls 49820->49837 49822 7ff7d9bf6c83 49823 7ff7d9bf6c92 49822->49823 49824 7ff7d9bf6c8c CloseHandle 49822->49824 49825 7ff7d9bf6ca1 49823->49825 49826 7ff7d9bf6c9b FreeLibrary 49823->49826 49824->49823 49827 7ff7d9c01918 __free_lconv_mon 11 API calls 49825->49827 49826->49825 49827->49819 49838 7ff7d9c019b4 49828->49838 49831 7ff7d9c01918 __free_lconv_mon 11 API calls 49832 7ff7d9bf6bc4 49831->49832 49833 7ff7d9bf6bcd GetModuleHandleExW 49832->49833 49834 7ff7d9bf6bc9 49832->49834 49833->49834 49834->49818 49834->49819 49835->49815 49836->49819 49837->49822 49843 7ff7d9c019c5 __std_exception_copy 49838->49843 49839 7ff7d9c01a16 49846 7ff7d9bf6db8 11 API calls __std_exception_copy 49839->49846 49840 7ff7d9c019fa HeapAlloc 49841 7ff7d9bf6bba 49840->49841 49840->49843 49841->49831 49843->49839 49843->49840 49845 7ff7d9c00c60 EnterCriticalSection LeaveCriticalSection __std_exception_copy 49843->49845 49845->49843 49846->49841 49847->49616 49849 7ff7d9a8ff49 49850 7ff7d9a8ff66 49849->49850 49852 7ff7d9a903fa 49850->49852 49855 7ff7d9a90336 49850->49855 49857 7ff7d9aa4d5c 49850->49857 49852->49855 49870 7ff7d9a248e0 EnterCriticalSection 49852->49870 49854 7ff7d9a90e34 49871 7ff7d9a24990 LeaveCriticalSection 49854->49871 49858 7ff7d9aa4d67 49857->49858 49872 7ff7d9bdf810 49858->49872 49860 7ff7d9aa4de1 49876 7ff7d9bd78a4 49860->49876 49862 7ff7d9aa4e00 49879 7ff7d9bd7932 49862->49879 49864 7ff7d9aa645e 49864->49852 49865 7ff7d9aa4e57 49869 7ff7d9aa56fe 49865->49869 49882 7ff7d9bd7cb0 49865->49882 49869->49864 49885 7ff7d9a248e0 EnterCriticalSection 49869->49885 49886 7ff7d9a24990 LeaveCriticalSection 49869->49886 49870->49854 49871->49855 49873 7ff7d9bdf83b 49872->49873 49874 7ff7d9bdf986 49873->49874 49875 7ff7d9be0a20 15 API calls 49873->49875 49874->49860 49875->49874 49887 7ff7d9bf05c4 49876->49887 49878 7ff7d9bd78b2 49878->49862 49921 7ff7d9bd8ba0 49879->49921 49925 7ff7d9bd9660 49882->49925 49885->49869 49886->49869 49890 7ff7d9bff958 49887->49890 49889 7ff7d9bf05d2 49891 7ff7d9bff961 49890->49891 49892 7ff7d9bff978 49890->49892 49907 7ff7d9bf6db8 11 API calls __std_exception_copy 49891->49907 49902 7ff7d9c02744 49892->49902 49895 7ff7d9bff966 49908 7ff7d9bf71c4 52 API calls _invalid_parameter_noinfo 49895->49908 49898 7ff7d9bff971 49898->49889 49911 7ff7d9c02140 49902->49911 49907->49895 49908->49898 49912 7ff7d9c0219d 49911->49912 49913 7ff7d9c02198 __vcrt_FlsGetValue 49911->49913 49920 7ff7d9bff900 52 API calls 2 library calls 49912->49920 49913->49912 49914 7ff7d9c021cd LoadLibraryExW 49913->49914 49915 7ff7d9c022c2 GetProcAddressForCaller 49913->49915 49919 7ff7d9c0222c LoadLibraryExW 49913->49919 49916 7ff7d9c022a2 49914->49916 49917 7ff7d9c021f2 GetLastError 49914->49917 49915->49912 49916->49915 49918 7ff7d9c022b9 FreeLibrary 49916->49918 49917->49913 49918->49915 49919->49913 49919->49916 49922 7ff7d9bd8bd6 49921->49922 49923 7ff7d9bf0600 _invalid_parameter_noinfo_noreturn 8 API calls 49922->49923 49924 7ff7d9bd7956 49923->49924 49924->49865 49926 7ff7d9bd7ccd 49925->49926 49927 7ff7d9bd967f 49925->49927 49926->49869 49929 7ff7d9bd8890 49927->49929 49932 7ff7d9be08a0 49929->49932 49931 7ff7d9bd88c5 49931->49926 49934 7ff7d9be08be 49932->49934 49933 7ff7d9be0a09 49933->49931 49934->49933 49935 7ff7d9be0a20 15 API calls 49934->49935 49935->49933 49936 7ff7d9a8e2cb 49937 7ff7d9a8e33a 49936->49937 49939 7ff7d9a8e64a 49937->49939 49947 7ff7d9a97926 RtlPcToFileHeader RaiseException 49937->49947 49941 7ff7d9a8eadd 49939->49941 49948 7ff7d9a9c430 WSAGetLastError 49939->49948 49943 7ff7d9a8ef3f 49941->49943 49949 7ff7d9a9e138 49941->49949 49944 7ff7d9a8fb72 49943->49944 49945 7ff7d9bf0600 _invalid_parameter_noinfo_noreturn 8 API calls 49943->49945 49946 7ff7d9a8fb43 49945->49946 49947->49939 49948->49941 49950 7ff7d9a9e1ad 49949->49950 49952 7ff7d9a9e5d5 49950->49952 49953 7ff7d9a91222 GetLastError 49950->49953 49952->49943 49953->49952 49954 180005a0d GetProcessId 49955 180005a8c 49954->49955 49956 180008e30 RtlAdjustPrivilege 49957 180008eb4 49956->49957 49958 180008eaf 49956->49958 49961 180112460 49957->49961 49962 180112469 49961->49962 49963 180008eb9 49962->49963 49964 180112814 IsProcessorFeaturePresent 49962->49964 49965 18011282c 49964->49965 49970 1801128e8 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 49965->49970 49967 18011283f 49971 1801127e0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 49967->49971 49970->49967 49972 1800080f2 VirtualAllocEx WriteProcessMemory 49973 180008273 memset memcpy NtAlpcConnectPort 49972->49973 49975 18000a8b2 WriteProcessMemory 49976 18000a939 49975->49976 49977 1800054d5 49978 180005524 DuplicateHandle 49977->49978 49979 1800055a7 49978->49979 49980 1bcee86070d 49981 1bcee8607c7 49980->49981 49984 1bcee860728 49980->49984 49982 1bcee86074f VirtualFree 49982->49984 49983 1bcee86079d VirtualProtect 49983->49984 49984->49981 49984->49982 49984->49983 49985 7ff7d9a41140 49988 7ff7d9a35ae0 49985->49988 49993 7ff7d9a35b20 49988->49993 49992 7ff7d9a35b16 49994 7ff7d9a35b77 WSAStartup 49993->49994 49995 7ff7d9a35b63 49993->49995 49996 7ff7d9bf0600 _invalid_parameter_noinfo_noreturn 8 API calls 49994->49996 49995->49994 49997 7ff7d9a35b0a 49996->49997 49998 7ff7d9bf088c 55 API calls 49997->49998 49998->49992 50005 180001920 memset GetModuleFileNameW wcsstr 50006 1800019a8 50005->50006 50007 18000197a IsUserAnAdmin 50005->50007 50038 180001010 59 API calls 50006->50038 50009 180001984 50007->50009 50010 180001995 50007->50010 50017 1800015b0 50009->50017 50013 18000199f ExitProcess 50010->50013 50011 1800019b0 50014 180112460 8 API calls 50011->50014 50016 1800019c0 50014->50016 50018 1800015db malloc 50017->50018 50019 180001893 50017->50019 50018->50019 50021 1800015f7 memcpy malloc 50018->50021 50020 180112460 8 API calls 50019->50020 50022 18000190e ExitProcess 50020->50022 50021->50019 50023 180001625 memset 50021->50023 50024 180001656 50023->50024 50025 18000165b 50023->50025 50026 18000169b memset GetModuleFileNameW malloc 50024->50026 50025->50024 50027 180001682 memcpy 50025->50027 50026->50019 50028 1800016df memset memcpy 50026->50028 50027->50026 50029 180001720 50028->50029 50029->50029 50030 180001773 OpenSCManagerW 50029->50030 50030->50019 50031 18000179b EnumServicesStatusExW malloc 50030->50031 50031->50019 50032 1800017f4 memset EnumServicesStatusExW 50031->50032 50033 180001845 CloseServiceHandle free 50032->50033 50034 180001856 CloseServiceHandle 50032->50034 50033->50019 50034->50019 50035 180001865 50034->50035 50035->50019 50036 180001870 lstrcmpiW 50035->50036 50036->50035 50037 180001895 free 50036->50037 50037->50019 50038->50011 50039 180009bc0 VirtualAllocEx 50040 180009da0 50039->50040 50041 7ff7d9a8e15e WSAEnumNetworkEvents 50042 7ff7d9a8e21a 50041->50042 50044 7ff7d9a8eadd 50042->50044 50050 7ff7d9a9c430 WSAGetLastError 50042->50050 50045 7ff7d9a9e138 GetLastError 50044->50045 50046 7ff7d9a8ef3f 50044->50046 50045->50046 50047 7ff7d9a8fb72 50046->50047 50048 7ff7d9bf0600 _invalid_parameter_noinfo_noreturn 8 API calls 50046->50048 50049 7ff7d9a8fb43 50048->50049 50050->50044

                            Control-flow Graph

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: mallocmemset$CloseEnumHandleServiceServicesStatusmemcpy$FileManagerModuleNameOpenfreelstrcmpi
                            • String ID: Schedule
                            • API String ID: 3636854120-2739827629
                            • Opcode ID: 70ccbce7ac579554b00e68964982556cd3487ef553e62ff7290f06c43de960f4
                            • Instruction ID: 77915f136d28d9010cc6e861f3bfda285807add5c1f84c5dca0c70953a9b4365
                            • Opcode Fuzzy Hash: 70ccbce7ac579554b00e68964982556cd3487ef553e62ff7290f06c43de960f4
                            • Instruction Fuzzy Hash: A3A1AE36705B8486EBA5CB19E4883EDB7A4F78DB94F54D128EE8903755EF38D648C700
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146728696.00007FF7D9A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9A10000, based on PE: true
                            • Associated: 00000000.00000002.2146715400.00007FF7D9A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146835220.00007FF7D9C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146853847.00007FF7D9C29000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C40000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146899907.00007FF7D9C43000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7d9a10000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: ErrorLast$EventReset
                            • String ID: bh5('$,4=H
                            • API String ID: 3410914340-298069639
                            • Opcode ID: 8bf2926e3c4078e62d6db7854044052cef78856126e4dd2c86e2c5eb1fe41bbb
                            • Instruction ID: 27d166f31a6485c67fa56c765b65b2d428ee2a2706200183a824a1b9b51f250a
                            • Opcode Fuzzy Hash: 8bf2926e3c4078e62d6db7854044052cef78856126e4dd2c86e2c5eb1fe41bbb
                            • Instruction Fuzzy Hash: EC743E72A0C5D24BD328EF74A8A15FEB7F1AB85341F84523BD58DC7A5ACA2CA105CF50
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146728696.00007FF7D9A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9A10000, based on PE: true
                            • Associated: 00000000.00000002.2146715400.00007FF7D9A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146835220.00007FF7D9C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146853847.00007FF7D9C29000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C40000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146899907.00007FF7D9C43000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7d9a10000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: ErrorLast$connect$EventSelectselect
                            • String ID:
                            • API String ID: 2159918928-0
                            • Opcode ID: 02f99bb89bd9bec302923d8007e00a99b7d901f9d53df09aa5ed8d383f7659a2
                            • Instruction ID: 04dacf0082d31d55581e7ea7c6011f2037f19f8058ce84548089152ed89f9230
                            • Opcode Fuzzy Hash: 02f99bb89bd9bec302923d8007e00a99b7d901f9d53df09aa5ed8d383f7659a2
                            • Instruction Fuzzy Hash: 51B34172A0C5D24BD328EF74A8A16BEB7F19BC5341F84523BD58DC7A5ACA2CA504CF50
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146728696.00007FF7D9A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9A10000, based on PE: true
                            • Associated: 00000000.00000002.2146715400.00007FF7D9A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146835220.00007FF7D9C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146853847.00007FF7D9C29000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C40000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146899907.00007FF7D9C43000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7d9a10000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: AllocErrorLastVirtualsocket
                            • String ID:
                            • API String ID: 2017719348-0
                            • Opcode ID: e88fd56ae137a1c74461e8097582d2c5e2c0598196ac759611b4794dc1e3bd91
                            • Instruction ID: 65ebfcde5ac431803fb8fcc1fd922b9128bcac249ce2f2d42f285abde188b001
                            • Opcode Fuzzy Hash: e88fd56ae137a1c74461e8097582d2c5e2c0598196ac759611b4794dc1e3bd91
                            • Instruction Fuzzy Hash: 90045072A085D24FD328EF74D8A16FD77F1AB85349F84523BD54DCBA5ACA2CA204CB50

                            Control-flow Graph

                            APIs
                            Strings
                            • 0, xrefs: 000000018000828B
                            • Dive right in and make a splash,We're throwing a pool party in a flash!Bring your swimsuits and sunscreen galore,We'll turn up the heat and let the good times pour!, xrefs: 0000000180008315
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: AllocAlpcConnectMemoryPortProcessVirtualWritememcpymemset
                            • String ID: 0$Dive right in and make a splash,We're throwing a pool party in a flash!Bring your swimsuits and sunscreen galore,We'll turn up the heat and let the good times pour!
                            • API String ID: 2322259470-3460289035
                            • Opcode ID: 7606ac36fa39d5fba01efb1612d82c7ec8bc058541244c139688a313f2a7d181
                            • Instruction ID: 0b600ae3a3e83453483b19f834bfc71158cd70f74abece231445517b9c63723b
                            • Opcode Fuzzy Hash: 7606ac36fa39d5fba01efb1612d82c7ec8bc058541244c139688a313f2a7d181
                            • Instruction Fuzzy Hash: 35713DB5324EC891EFA5CF65E8587DA6362F788798F80A216DE4D07668DF3CC249C700

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 8957 180009bc0-180009d4a VirtualAllocEx 8958 180009da0-180009da9 8957->8958 8959 180009db1-180009e16 8958->8959 8960 180009dab 8958->8960 8960->8959
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: AllocVirtual
                            • String ID: @
                            • API String ID: 4275171209-2766056989
                            • Opcode ID: 08567cc30074b475b331b46d2cc87d554941ba0be2af3992f720d6e759045faf
                            • Instruction ID: 13e2f726a9112c9c31c995d983c9da114070f7450b087ebba6d3042457f4b947
                            • Opcode Fuzzy Hash: 08567cc30074b475b331b46d2cc87d554941ba0be2af3992f720d6e759045faf
                            • Instruction Fuzzy Hash: 8F41CF32318B9881EB65CF62F854BD67764F788784F519116EE8D43B14DF38C61AC700
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: InformationQuerySystemrealloc
                            • String ID:
                            • API String ID: 4089764311-0
                            • Opcode ID: aa0bfc6469bc17d5eeda48fd87731ce22d6874c3ca3fc959c4416cf641374c4d
                            • Instruction ID: b0525076bbbf58c043072cd616ac76dc382e5d39b6996fcf6a95a9be821e6ce1
                            • Opcode Fuzzy Hash: aa0bfc6469bc17d5eeda48fd87731ce22d6874c3ca3fc959c4416cf641374c4d
                            • Instruction Fuzzy Hash: 27015EB632498485FB55CBA6E86839BB362E38CBD4F44E0269E0D47758CE28C1098700
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146728696.00007FF7D9A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9A10000, based on PE: true
                            • Associated: 00000000.00000002.2146715400.00007FF7D9A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146835220.00007FF7D9C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146853847.00007FF7D9C29000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C40000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146899907.00007FF7D9C43000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7d9a10000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: ExceptionFileHeaderRaise
                            • String ID:
                            • API String ID: 2573137834-0
                            • Opcode ID: 002b99e58013bd091bb3f1efd12dfbcd04e87f10befed7b9ccd1c4f08ecaca4e
                            • Instruction ID: 05f1b38f87a68ac30ce8f32d72f0e813ed29c0387e72794011613f755a2f12f9
                            • Opcode Fuzzy Hash: 002b99e58013bd091bb3f1efd12dfbcd04e87f10befed7b9ccd1c4f08ecaca4e
                            • Instruction Fuzzy Hash: DD63D962E0C99119E30ADF3498E013DFFF69F85785BC88337E54EA6515EA2DA243CB50
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: de33ea6b4f9ce6d4b4402c8e18623ba837b56d9b22b6662e0c33dbf5e61d8208
                            • Instruction ID: 9c50cbf5d08d3b6d4a605893f6b359a3682b26f1feaf6ace4ca51b493498b96a
                            • Opcode Fuzzy Hash: de33ea6b4f9ce6d4b4402c8e18623ba837b56d9b22b6662e0c33dbf5e61d8208
                            • Instruction Fuzzy Hash: 9211BFB1614B8885FB61CFA5E8187C773A0E38D794F45A116DE4E17B64CF38C209C704
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146728696.00007FF7D9A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9A10000, based on PE: true
                            • Associated: 00000000.00000002.2146715400.00007FF7D9A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146835220.00007FF7D9C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146853847.00007FF7D9C29000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C40000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146899907.00007FF7D9C43000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7d9a10000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0746b3e73b7ebd77920953652783f00b32297ebf0d4588ce81e063e50ea78c0e
                            • Instruction ID: f9948e6b10f57569a271de6b5e98297d51e6ee7c72d4d38a06dc9e0423820610
                            • Opcode Fuzzy Hash: 0746b3e73b7ebd77920953652783f00b32297ebf0d4588ce81e063e50ea78c0e
                            • Instruction Fuzzy Hash: 23A2C862D1C9D105D316EF3498E023EFEB6AF85785FC98337E18E92515EE2DA142CB50

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 3158 1bcee8608d0-1bcee8609b2 call 1bcee86004c * 2 call 1bcee8601c4 call 1bcee8601e4 call 1bcee8601c4 call 1bcee8601e4 3171 1bcee860ae3-1bcee860afc 3158->3171 3172 1bcee8609b8-1bcee8609cc 3158->3172 3172->3171 3174 1bcee8609d2-1bcee8609d3 3172->3174 3175 1bcee8609d6-1bcee8609df 3174->3175 3175->3171 3176 1bcee8609e5-1bcee8609f8 LoadLibraryA 3175->3176 3177 1bcee860ae0-1bcee860ae1 3176->3177 3178 1bcee8609fe-1bcee860a17 3176->3178 3177->3171 3180 1bcee860a19-1bcee860a24 3178->3180 3181 1bcee860a26-1bcee860a29 3178->3181 3183 1bcee860a31-1bcee860a37 3180->3183 3181->3183 3184 1bcee860ad2-1bcee860ade 3183->3184 3185 1bcee860a3d-1bcee860a51 3183->3185 3184->3171 3186 1bcee860a53 3185->3186 3187 1bcee860a55-1bcee860a66 3185->3187 3186->3187 3188 1bcee860a68-1bcee860a6b 3187->3188 3189 1bcee860aa7-1bcee860abc 3187->3189 3191 1bcee860a6d-1bcee860a77 3188->3191 3189->3175 3195 1bcee860ac2 3189->3195 3193 1bcee860a7f-1bcee860a87 3191->3193 3194 1bcee860a79-1bcee860a7d 3191->3194 3196 1bcee860a89-1bcee860a92 3193->3196 3194->3196 3195->3171 3198 1bcee860ac4-1bcee860ad0 3196->3198 3199 1bcee860a94-1bcee860aa2 3196->3199 3198->3171 3199->3191 3200 1bcee860aa4 3199->3200 3200->3189
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146085707.000001BCEE860000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001BCEE860000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bcee860000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID: RtlA$RtlR$ateH$eAll$eHea$eap$l.dl$l.dl$lloc$ntdl$ntdl$ocat
                            • API String ID: 1029625771-3994871222
                            • Opcode ID: b11f4f2f506f70575e309f4ee35f27514d2eccd09e92f81734cd8165a29d1a1f
                            • Instruction ID: 874fac5e5ab5e50c7f0e8f4854b0a1ab3dba0b9a304f7676fb5438b42d02453e
                            • Opcode Fuzzy Hash: b11f4f2f506f70575e309f4ee35f27514d2eccd09e92f81734cd8165a29d1a1f
                            • Instruction Fuzzy Hash: 9671D031614A0ACBEBA89F5CD8457EE7BE1FF94390F104119D84AC728ADB34D842CBD9

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 5865 7ff7d9c02140-7ff7d9c02192 5866 7ff7d9c02283 5865->5866 5867 7ff7d9c02198-7ff7d9c0219b 5865->5867 5870 7ff7d9c02285-7ff7d9c022a1 5866->5870 5868 7ff7d9c021a5-7ff7d9c021a8 5867->5868 5869 7ff7d9c0219d-7ff7d9c021a0 5867->5869 5871 7ff7d9c021ae-7ff7d9c021bd 5868->5871 5872 7ff7d9c02268-7ff7d9c0227b 5868->5872 5869->5870 5873 7ff7d9c021bf-7ff7d9c021c2 5871->5873 5874 7ff7d9c021cd-7ff7d9c021ec LoadLibraryExW 5871->5874 5872->5866 5875 7ff7d9c022c2-7ff7d9c022d1 GetProcAddressForCaller 5873->5875 5876 7ff7d9c021c8 5873->5876 5877 7ff7d9c022a2-7ff7d9c022b7 5874->5877 5878 7ff7d9c021f2-7ff7d9c021fb GetLastError 5874->5878 5881 7ff7d9c022d3-7ff7d9c022fa 5875->5881 5882 7ff7d9c02261 5875->5882 5879 7ff7d9c02254-7ff7d9c0225b 5876->5879 5877->5875 5880 7ff7d9c022b9-7ff7d9c022bc FreeLibrary 5877->5880 5883 7ff7d9c02242-7ff7d9c0224c 5878->5883 5884 7ff7d9c021fd-7ff7d9c02214 call 7ff7d9c01870 5878->5884 5879->5871 5879->5882 5880->5875 5881->5870 5882->5872 5883->5879 5884->5883 5887 7ff7d9c02216-7ff7d9c0222a call 7ff7d9c01870 5884->5887 5887->5883 5890 7ff7d9c0222c-7ff7d9c02240 LoadLibraryExW 5887->5890 5890->5877 5890->5883
                            APIs
                            • FreeLibrary.KERNEL32(?,?,?,00007FF7D9C02772,?,?,00000000,00007FF7D9BFF985), ref: 00007FF7D9C022BC
                            • GetProcAddressForCaller.KERNELBASE(?,?,?,00007FF7D9C02772,?,?,00000000,00007FF7D9BFF985), ref: 00007FF7D9C022C8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146728696.00007FF7D9A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9A10000, based on PE: true
                            • Associated: 00000000.00000002.2146715400.00007FF7D9A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146835220.00007FF7D9C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146853847.00007FF7D9C29000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C40000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146899907.00007FF7D9C43000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7d9a10000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: AddressCallerFreeLibraryProc
                            • String ID: api-ms-$ext-ms-
                            • API String ID: 3520295827-537541572
                            • Opcode ID: 2aad29cd30e0b31b49d84af00daefe6c2f6c56548210d022b1ceaf4a48be1a8b
                            • Instruction ID: 39b25d02f97b21708faeeb6bb797cdf4692a7170df589362b3d9efb1d66758a9
                            • Opcode Fuzzy Hash: 2aad29cd30e0b31b49d84af00daefe6c2f6c56548210d022b1ceaf4a48be1a8b
                            • Instruction Fuzzy Hash: BB411422B19A0281FA95EF629800A7DA2B1BF45BE0FC94237DD0D67799DF3CE444C320

                            Control-flow Graph

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: memset$malloc$ExitFileModuleNameProcessmemcpy$AdminManagerOpenUserwcsstr
                            • String ID: svchost.exe
                            • API String ID: 2075570005-3106260013
                            • Opcode ID: 45f69df0e4fed2e44586dca63e0d8318bfe1b258da8823836d84a3e13a2394f6
                            • Instruction ID: 5c56fdee547d7df19f87fbfca49010fe5bdf447972866224b63b2f3b95cb53d0
                            • Opcode Fuzzy Hash: 45f69df0e4fed2e44586dca63e0d8318bfe1b258da8823836d84a3e13a2394f6
                            • Instruction Fuzzy Hash: 9D015631311A4D81FBAADB21E8993DA2360BB8D795F449115A95E46695DF3CC34CC740

                            Control-flow Graph

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146728696.00007FF7D9A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9A10000, based on PE: true
                            • Associated: 00000000.00000002.2146715400.00007FF7D9A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146835220.00007FF7D9C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146853847.00007FF7D9C29000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C40000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146899907.00007FF7D9C43000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7d9a10000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: setsockopt
                            • String ID:
                            • API String ID: 3981526788-0
                            • Opcode ID: c38cac35fdacff014c4541e6b4e3abd54bb6126dc4ab5a11cef0fb7acfa13688
                            • Instruction ID: d9e057a3e489ce7e55702e5afe8cb9bfa15e468950d099377be95fec55e597e5
                            • Opcode Fuzzy Hash: c38cac35fdacff014c4541e6b4e3abd54bb6126dc4ab5a11cef0fb7acfa13688
                            • Instruction Fuzzy Hash: 07513D76A592018BD750EF68E8419ADB7B0FB88784BD01437EA4E83B19CF3CE4148F24

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 7760 1bcee860224-1bcee8602d0 call 1bcee86004c * 4 call 1bcee8601c4 call 1bcee8601e4 7773 1bcee8602d2-1bcee8602df 7760->7773 7774 1bcee860341 7760->7774 7773->7774 7776 1bcee8602e1-1bcee8602fc VirtualAlloc 7773->7776 7775 1bcee860343-1bcee860360 7774->7775 7777 1bcee8602fe-1bcee860315 7776->7777 7778 1bcee860317-1bcee860334 7776->7778 7777->7774 7777->7778 7782 1bcee860361-1bcee8603d6 VirtualAlloc call 1bcee860544 7778->7782 7783 1bcee860336-1bcee86033e 7778->7783 7787 1bcee8603e0-1bcee8603e3 call 1bcee8608d0 7782->7787 7788 1bcee8603d8-1bcee8603db call 1bcee860834 7782->7788 7783->7774 7791 1bcee8603e8-1bcee8603ea 7787->7791 7788->7787 7791->7774 7792 1bcee8603f0-1bcee860407 call 1bcee860638 call 1bcee8607e8 7791->7792 7797 1bcee860428-1bcee86042b 7792->7797 7798 1bcee860409-1bcee86041f 7792->7798 7797->7775 7798->7774 7800 1bcee860425 7798->7800 7800->7797
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146085707.000001BCEE860000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001BCEE860000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bcee860000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: AllocVirtual
                            • String ID: RtlAllocateHeap$l$l.dl$ntdl
                            • API String ID: 4275171209-1387368096
                            • Opcode ID: b4c4ed2c585202e7720ad32f940b49e1e34a84d2224b2416f6ee24bbd427b5d8
                            • Instruction ID: 57b79ccb944b2283e2d5180ff3cd273ec5c8b105febcceebda81411fce70d0d1
                            • Opcode Fuzzy Hash: b4c4ed2c585202e7720ad32f940b49e1e34a84d2224b2416f6ee24bbd427b5d8
                            • Instruction Fuzzy Hash: E261A570618A0ACFE7A8EF6CD8456A977E1FB48341F00415ED44AC72A6DF74E842CBD9

                            Control-flow Graph

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146728696.00007FF7D9A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9A10000, based on PE: true
                            • Associated: 00000000.00000002.2146715400.00007FF7D9A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146835220.00007FF7D9C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146853847.00007FF7D9C29000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C40000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146899907.00007FF7D9C43000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7d9a10000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: CloseCreateErrorFreeHandleLastLibraryThread_invalid_parameter_noinfo
                            • String ID:
                            • API String ID: 2067211477-0
                            • Opcode ID: bab2295e073a4f6ace4db4130badd438c31a8126a09a57ee1ca7020adb751a51
                            • Instruction ID: ee5256e6afe145b7c9bed6b7a62cf86b89b4bac64bfa456302b380445ae18fef
                            • Opcode Fuzzy Hash: bab2295e073a4f6ace4db4130badd438c31a8126a09a57ee1ca7020adb751a51
                            • Instruction Fuzzy Hash: 47213D25A0AB4A89EE54AF61A41017DE3B0EF88BD0FC54532DE8D43B55EE3EE4508760

                            Control-flow Graph

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146728696.00007FF7D9A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9A10000, based on PE: true
                            • Associated: 00000000.00000002.2146715400.00007FF7D9A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146835220.00007FF7D9C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146853847.00007FF7D9C29000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C40000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146899907.00007FF7D9C43000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7d9a10000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: ErrorLastfreeaddrinfogetaddrinfo
                            • String ID:
                            • API String ID: 1817844550-0
                            • Opcode ID: a6ae1f46db6b9b4b934caf5453b3632453f573c696a1fdf8df20312b1abb7991
                            • Instruction ID: f59387269c23fa4c17ba10f9394ccbac4a39b4bc6789b82ffad9037c40a35118
                            • Opcode Fuzzy Hash: a6ae1f46db6b9b4b934caf5453b3632453f573c696a1fdf8df20312b1abb7991
                            • Instruction Fuzzy Hash: 92510936A186858BD654EF69E4906AEF3B0FBC4784FC05036EA8E93B55DE3CE444CB10

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 8961 18000ad3e-18000adcc VirtualAllocEx 8962 18000add5 8961->8962 8963 18000adce 8961->8963 8963->8962
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: AllocVirtual
                            • String ID: @
                            • API String ID: 4275171209-2766056989
                            • Opcode ID: 25e8e2e1e41b46ff06f862ad0091e17087f53469a818b64f494525446fc89b42
                            • Instruction ID: 6b845daad974ccd9c6abd76d61111d535f536517db2d34ef27256cbb8d76cfd7
                            • Opcode Fuzzy Hash: 25e8e2e1e41b46ff06f862ad0091e17087f53469a818b64f494525446fc89b42
                            • Instruction Fuzzy Hash: 7B016DB5729A8C41FBA9CBA1F465BD62360A78DBD4F40A21A9D0E17B55DE2CC2068304

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 8964 7ff7d9a2dad0-7ff7d9a2db6b 8965 7ff7d9a2db6f-7ff7d9a2db7a 8964->8965 8966 7ff7d9a2dbab-7ff7d9a2dbb6 8965->8966 8967 7ff7d9a2db7c-7ff7d9a2db8d 8965->8967 8970 7ff7d9a2dbb8-7ff7d9a2dbcd 8966->8970 8971 7ff7d9a2dbfe-7ff7d9a2dc0d 8966->8971 8968 7ff7d9a2db91-7ff7d9a2dba9 8967->8968 8969 7ff7d9a2db8f 8967->8969 8968->8965 8969->8966 8973 7ff7d9a2dbfc 8970->8973 8974 7ff7d9a2dbcf-7ff7d9a2dbf5 8970->8974 8977 7ff7d9a2dc11-7ff7d9a2dc19 8971->8977 8973->8971 8974->8973 8978 7ff7d9a2dc47-7ff7d9a2dc4f 8977->8978 8979 7ff7d9a2dc1b-7ff7d9a2dc29 8977->8979 8980 7ff7d9a2dc8b-7ff7d9a2dcd0 select 8978->8980 8981 7ff7d9a2dc51-7ff7d9a2dc63 8978->8981 8982 7ff7d9a2dc2d-7ff7d9a2dc45 8979->8982 8983 7ff7d9a2dc2b 8979->8983 8988 7ff7d9a2dd12-7ff7d9a2dd2f call 7ff7d9c0df8c 8980->8988 8989 7ff7d9a2dcd2-7ff7d9a2dce4 8980->8989 8984 7ff7d9a2dc89 8981->8984 8985 7ff7d9a2dc65-7ff7d9a2dc85 8981->8985 8982->8977 8983->8978 8984->8980 8985->8984 8998 7ff7d9a2dd31-7ff7d9a2dd51 call 7ff7d9a2d1a0 8988->8998 8999 7ff7d9a2dd90-7ff7d9a2ddad __WSAFDIsSet 8988->8999 8990 7ff7d9a2dcf0-7ff7d9a2dd01 call 7ff7d9a2dde0 8989->8990 8991 7ff7d9a2dce6-7ff7d9a2dcee 8989->8991 8993 7ff7d9a2dd05-7ff7d9a2dd0d 8990->8993 8991->8993 8997 7ff7d9a2ddb1-7ff7d9a2ddd4 call 7ff7d9bf0600 8993->8997 9004 7ff7d9a2dd71-7ff7d9a2dd82 call 7ff7d9a2dde0 8998->9004 9005 7ff7d9a2dd53-7ff7d9a2dd65 8998->9005 8999->8997 9008 7ff7d9a2dd86-7ff7d9a2dd8e 9004->9008 9005->9004 9006 7ff7d9a2dd67-7ff7d9a2dd6f 9005->9006 9006->9008 9008->8997
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146728696.00007FF7D9A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9A10000, based on PE: true
                            • Associated: 00000000.00000002.2146715400.00007FF7D9A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146835220.00007FF7D9C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146853847.00007FF7D9C29000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C40000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146899907.00007FF7D9C43000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7d9a10000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: ErrorLastselect
                            • String ID:
                            • API String ID: 215497628-0
                            • Opcode ID: dc751306dc8cf1236dd36cb09db1014315388741eb5250ea4012c355936f6198
                            • Instruction ID: 6094a64def6830a8021de1cfd0c5092a2acce4d74ba8ee688a6aea0fc540a9d9
                            • Opcode Fuzzy Hash: dc751306dc8cf1236dd36cb09db1014315388741eb5250ea4012c355936f6198
                            • Instruction Fuzzy Hash: 4991EC7290D6418BD658EF28E490AADF3B1EBD4344F905136E68E97B59DA3CE840CF14

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 9010 1bcee86070d-1bcee860722 9011 1bcee860728-1bcee860729 9010->9011 9012 1bcee8607c7-1bcee8607e4 9010->9012 9013 1bcee86072b-1bcee86074d 9011->9013 9014 1bcee860761-1bcee860782 9013->9014 9015 1bcee86074f-1bcee86075f VirtualFree 9013->9015 9017 1bcee86079d-1bcee8607ae VirtualProtect 9014->9017 9018 1bcee860784-1bcee860788 9014->9018 9016 1bcee8607b0-1bcee8607c1 9015->9016 9016->9012 9016->9013 9017->9016 9019 1bcee860790-1bcee860793 9018->9019 9020 1bcee86078a-1bcee86078e 9018->9020 9019->9016 9022 1bcee860795-1bcee860796 9019->9022 9021 1bcee860799-1bcee86079b 9020->9021 9021->9016 9021->9017 9022->9021
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146085707.000001BCEE860000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001BCEE860000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bcee860000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: Virtual$FreeProtect
                            • String ID:
                            • API String ID: 2581862158-0
                            • Opcode ID: 88289986f9ffe6edc648fa77a415d0491739a420f0f8400cd95d764a84c61761
                            • Instruction ID: 092e706ae7ad4c03c15a75e9228587ed599bdad95a692feed2ceae8c4eec13d6
                            • Opcode Fuzzy Hash: 88289986f9ffe6edc648fa77a415d0491739a420f0f8400cd95d764a84c61761
                            • Instruction Fuzzy Hash: 8C31C531658602CBDB6C9A0CE8826B573D1F755344F24015CD987CB18BEB3AE843CED9

                            Control-flow Graph

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146085707.000001BCEE860000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001BCEE860000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bcee860000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: AllocVirtual
                            • String ID: run
                            • API String ID: 4275171209-1349952704
                            • Opcode ID: e5dc8825a7370ff9ec57641739cdc0d48f865f2156bb471bdecd58f16db5c67c
                            • Instruction ID: f282f9b9f4ad56e0a0ff21c07ae6fad356b1666a59e0b5617e3379eb67dcb8d5
                            • Opcode Fuzzy Hash: e5dc8825a7370ff9ec57641739cdc0d48f865f2156bb471bdecd58f16db5c67c
                            • Instruction Fuzzy Hash: 3A11DF3031494D8BDB98FEACC880BEC76D2EB98359F010229A44AC3285CE78C8428BD5

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 9039 7ff7d9a2cbf0-7ff7d9a2ccb5 WSAIoctl 9040 7ff7d9a2ccb7-7ff7d9a2ccd3 WSAGetLastError 9039->9040 9041 7ff7d9a2cce6-7ff7d9a2cd09 call 7ff7d9bf0600 9039->9041 9042 7ff7d9a2ccd5-7ff7d9a2cce0 9040->9042 9043 7ff7d9a2cce4 9040->9043 9042->9043 9043->9041
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146728696.00007FF7D9A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9A10000, based on PE: true
                            • Associated: 00000000.00000002.2146715400.00007FF7D9A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146835220.00007FF7D9C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146853847.00007FF7D9C29000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C40000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146899907.00007FF7D9C43000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7d9a10000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: ErrorIoctlLast
                            • String ID:
                            • API String ID: 4052769934-0
                            • Opcode ID: ed837b09f12dab1b763b41369a70df7f490d427acf7979e47f9f45fbe10ef913
                            • Instruction ID: bb53b035fe32854dc89355549e89f0156b32b2502d22f0a90aaad8155f69cca4
                            • Opcode Fuzzy Hash: ed837b09f12dab1b763b41369a70df7f490d427acf7979e47f9f45fbe10ef913
                            • Instruction Fuzzy Hash: 5131C4729486418BE754EF68E44176AF7B0FB88794F90412AE68D83B18DB7CE458CF14
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146728696.00007FF7D9A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9A10000, based on PE: true
                            • Associated: 00000000.00000002.2146715400.00007FF7D9A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146835220.00007FF7D9C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146853847.00007FF7D9C29000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C40000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146899907.00007FF7D9C43000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7d9a10000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: EnumEventsNetwork
                            • String ID:
                            • API String ID: 1334179165-0
                            • Opcode ID: 4ebcac89412e7efc30e7a2640db87857a87e6e34a58adc62e6712ee0787db7c2
                            • Instruction ID: 2385b439f9f038de0a02d6d47f78f37b38356ececbdb3b850b23a07048fe2a48
                            • Opcode Fuzzy Hash: 4ebcac89412e7efc30e7a2640db87857a87e6e34a58adc62e6712ee0787db7c2
                            • Instruction Fuzzy Hash: D9E13072A0C5D28BD318EF38A8A55BEBBF19B85341F84513BD58DC3A5ACA2CE504CF54
                            APIs
                            • WSAStartup.WS2_32(?,?,?,?,?,?,?,?,?,?,?,00007FF7D9A35B0A), ref: 00007FF7D9A35BD0
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146728696.00007FF7D9A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9A10000, based on PE: true
                            • Associated: 00000000.00000002.2146715400.00007FF7D9A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146835220.00007FF7D9C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146853847.00007FF7D9C29000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C40000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146899907.00007FF7D9C43000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7d9a10000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: Startup
                            • String ID:
                            • API String ID: 724789610-0
                            • Opcode ID: d9a925ab13b5f89ad6467af50c660541581057f2aad2aeabf3dab3806dc53e3c
                            • Instruction ID: b936c774acdbcffabe6fcd89996dfca710bbcd598fdead19f646247118920c72
                            • Opcode Fuzzy Hash: d9a925ab13b5f89ad6467af50c660541581057f2aad2aeabf3dab3806dc53e3c
                            • Instruction Fuzzy Hash: 44216D26F25B64CDF704DFB5A8912BC37B4A718788F84046AEE8D67B59CE3890608720
                            APIs
                              • Part of subcall function 00007FF7D9C01954: HeapAlloc.KERNEL32(?,?,?,00007FF7D9C018B9,?,?,00000000,00007FF7D9BF6A8B,?,?,?,00007FF7D9C004D7,?,?,?,00007FF7D9C003CD), ref: 00007FF7D9C01992
                            • RtlReAllocateHeap.NTDLL(?,?,00000000,00007FF7D9BF6A8B,?,?,?,00007FF7D9C004D7,?,?,?,00007FF7D9C003CD,?,?,00000000,00007FF7D9C007AE), ref: 00007FF7D9C01909
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146728696.00007FF7D9A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9A10000, based on PE: true
                            • Associated: 00000000.00000002.2146715400.00007FF7D9A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146835220.00007FF7D9C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146853847.00007FF7D9C29000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C40000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146899907.00007FF7D9C43000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7d9a10000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: Heap$AllocAllocate
                            • String ID:
                            • API String ID: 2177240990-0
                            • Opcode ID: a07a89cb0b122696095850704bbce82ee04866544705d1835cf35ed82e0b98d6
                            • Instruction ID: 9c2e7e770f151c51011bfc2fbe44a403384e3436cae08bee793a13a091e4d510
                            • Opcode Fuzzy Hash: a07a89cb0b122696095850704bbce82ee04866544705d1835cf35ed82e0b98d6
                            • Instruction Fuzzy Hash: 8E01EC10E1860746FEE47EB2554227DD2B05F457E4FD94733D92D662CAEE2CE5404731
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: AllocVirtual
                            • String ID:
                            • API String ID: 4275171209-0
                            • Opcode ID: e550c5f1444e37c0b1477e103827308c662109d29a65ec8f8fad6b41b1961b1e
                            • Instruction ID: 251b8e02f3a2b925dc00676b0f08ae0c6924386de3889a0ff5d432a66f8cfcc3
                            • Opcode Fuzzy Hash: e550c5f1444e37c0b1477e103827308c662109d29a65ec8f8fad6b41b1961b1e
                            • Instruction Fuzzy Hash: 75012CB5619E8C41FBA9CBA1F464BDA6774E78DB94F40A11ADE0E17B51DF28C20AC304
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: AdjustPrivilege
                            • String ID:
                            • API String ID: 3260937286-0
                            • Opcode ID: 5d6e4b59ff8a6b8225dc495acd6b689647a659c3c95a76a3c66f1975b6b2e2b3
                            • Instruction ID: 006989147f6c0ef173a6ad63e481d54274f3f56e0f4d918a3b7be20be4d5dd86
                            • Opcode Fuzzy Hash: 5d6e4b59ff8a6b8225dc495acd6b689647a659c3c95a76a3c66f1975b6b2e2b3
                            • Instruction Fuzzy Hash: 18F04F3A334F8C81EBE9DB21E85979667A0B74CB98F41A406ED4D43B64CE3DC2158B00
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: Process
                            • String ID:
                            • API String ID: 1235230986-0
                            • Opcode ID: d16e56ca8ceffb6996a770eebb8859cff0112ba79151dc499dea6e218c25d2af
                            • Instruction ID: d652ffa87c38ed1c04ac93e0a0d2335ef1528c7a1f19fbd04ef7ff50280f2555
                            • Opcode Fuzzy Hash: d16e56ca8ceffb6996a770eebb8859cff0112ba79151dc499dea6e218c25d2af
                            • Instruction Fuzzy Hash: 0C018BB271490485EB54CB59E4503AB7371F78DBD8F50A122EF4E87764DF29C256C704
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: MemoryProcessWrite
                            • String ID:
                            • API String ID: 3559483778-0
                            • Opcode ID: 4492a0bf8fcf8f33afd06441f64975728a7ffe302e5029ee3f64efdc84710f0c
                            • Instruction ID: 56856a108c934b35fd8b12db096080665d1aff2e22ecb35535ebb708edeb7d18
                            • Opcode Fuzzy Hash: 4492a0bf8fcf8f33afd06441f64975728a7ffe302e5029ee3f64efdc84710f0c
                            • Instruction Fuzzy Hash: 9101E8B5319E8891FBA9CB52E898386A362A78DBD0F51D1169D0D47768CE2DC109C304
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: MemoryProcessWrite
                            • String ID:
                            • API String ID: 3559483778-0
                            • Opcode ID: a9c6a2df7492c35cbc3cd719515342c8cda296547e204cd9f67484ff88ad8695
                            • Instruction ID: 440d9c2e63d84a318507e4d3145013176a8cc7cafd38941c5fd7eab054e276a3
                            • Opcode Fuzzy Hash: a9c6a2df7492c35cbc3cd719515342c8cda296547e204cd9f67484ff88ad8695
                            • Instruction Fuzzy Hash: 4A013CF5319E8881FBA5CB56E898786A762E78EBD4F41D1168D4D0B768CF3DC109C304
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: MemoryProcessWrite
                            • String ID:
                            • API String ID: 3559483778-0
                            • Opcode ID: 35ffae5299d4c335a8ff36bc6453c7f7216bb7ebbfbf3e1d59d74c353a4e1218
                            • Instruction ID: 24c97e1a4b5bf787aa031fe235fe3c6da918f95ea593df74073bd4adbefb4954
                            • Opcode Fuzzy Hash: 35ffae5299d4c335a8ff36bc6453c7f7216bb7ebbfbf3e1d59d74c353a4e1218
                            • Instruction Fuzzy Hash: 73F03CF5329E9981FBA5CB12EC58786A322F789BD4F41E1168D0D4B768CE2DC2098384
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146728696.00007FF7D9A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9A10000, based on PE: true
                            • Associated: 00000000.00000002.2146715400.00007FF7D9A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146835220.00007FF7D9C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146853847.00007FF7D9C29000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C40000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146899907.00007FF7D9C43000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7d9a10000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: setsockopt
                            • String ID:
                            • API String ID: 3981526788-0
                            • Opcode ID: af89ea1b8ec91a43d788d3702766a00663bf58fa3567b022c96e23f12184821a
                            • Instruction ID: 10484eda8f503f5835054135a225b3c98e7080f6f6248617e196ecf647551ffc
                            • Opcode Fuzzy Hash: af89ea1b8ec91a43d788d3702766a00663bf58fa3567b022c96e23f12184821a
                            • Instruction Fuzzy Hash: 3FF0F935A28A418BE650EF29E84146EB3B0FBC8788FD05126FA9D87718DB3DE0158F14
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146728696.00007FF7D9A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9A10000, based on PE: true
                            • Associated: 00000000.00000002.2146715400.00007FF7D9A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146835220.00007FF7D9C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146853847.00007FF7D9C29000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C40000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146899907.00007FF7D9C43000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7d9a10000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: _invalid_parameter_noinfo
                            • String ID:
                            • API String ID: 3215553584-0
                            • Opcode ID: 2cf6b01025c55fe36bac35e1374138a8c0fdc424bddf6831c527cfc152c669fd
                            • Instruction ID: 71bfa0b051585700a30803afe75ac7344fbb13bae9ba649687dfc0ea54e1076b
                            • Opcode Fuzzy Hash: 2cf6b01025c55fe36bac35e1374138a8c0fdc424bddf6831c527cfc152c669fd
                            • Instruction Fuzzy Hash: B5E0ED25A0B10A8AFE247FA488453BD96709F41305FD28032D50C562C6EF2EA4125731
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146728696.00007FF7D9A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9A10000, based on PE: true
                            • Associated: 00000000.00000002.2146715400.00007FF7D9A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146835220.00007FF7D9C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146853847.00007FF7D9C29000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C40000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146899907.00007FF7D9C43000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7d9a10000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: ioctlsocket
                            • String ID:
                            • API String ID: 3577187118-0
                            • Opcode ID: b0bfba42d1e121afd2aa587a6bf0855246f236eddc80dfa68d8ee748d5dd00b9
                            • Instruction ID: e85b04da8059bc65fa8b96f280c57b6b6f6235733a13c59c32a9d204bed0aa45
                            • Opcode Fuzzy Hash: b0bfba42d1e121afd2aa587a6bf0855246f236eddc80dfa68d8ee748d5dd00b9
                            • Instruction Fuzzy Hash: A7E0A571A28A418BE650EF25E85116EB3B0FBC9788FD05126FA9E93728DF3CD4158F50
                            APIs
                            • VirtualAlloc.KERNELBASE(?,00000000,-00000010,-00000001,00000000,00000000,000001BCEE8603CF), ref: 000001BCEE8605F5
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146085707.000001BCEE860000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001BCEE860000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bcee860000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: AllocVirtual
                            • String ID:
                            • API String ID: 4275171209-0
                            • Opcode ID: 554d3170c60eca2eb45742e049d3fa52307cae005affeb1c7ff9a92fbe018032
                            • Instruction ID: 825a4fe15c5f869f1056b712e98ca4c943be7858c1cd5dd36286b8d55f320faa
                            • Opcode Fuzzy Hash: 554d3170c60eca2eb45742e049d3fa52307cae005affeb1c7ff9a92fbe018032
                            • Instruction Fuzzy Hash: 0A31E97060860ACFE76CDB6CD4556B9B7D1EB88351F20052EE18AC3346EB34D843CB85
                            APIs
                            • HeapAlloc.KERNEL32(?,?,00000000,00007FF7D9C01FBA,?,?,00003F1D5F10EFDC,00007FF7D9BF6DC1,?,?,?,?,00007FF7D9C018D2,?,?,00000000), ref: 00007FF7D9C01A09
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146728696.00007FF7D9A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9A10000, based on PE: true
                            • Associated: 00000000.00000002.2146715400.00007FF7D9A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146835220.00007FF7D9C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146853847.00007FF7D9C29000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C40000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146899907.00007FF7D9C43000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7d9a10000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: AllocHeap
                            • String ID:
                            • API String ID: 4292702814-0
                            • Opcode ID: a86d170df06594815dba4405610f31e691f9023b579b5647a33137061aee6a42
                            • Instruction ID: 73f0f37ea2e694ac8560d79f45feeb55f05180332468d9478503d609bd9ee787
                            • Opcode Fuzzy Hash: a86d170df06594815dba4405610f31e691f9023b579b5647a33137061aee6a42
                            • Instruction Fuzzy Hash: 05F04954B0920745FE957EB299413BDD2B06F49BD0FC84433C90EA6686EE5CA6808331
                            APIs
                            • HeapAlloc.KERNEL32(?,?,?,00007FF7D9C018B9,?,?,00000000,00007FF7D9BF6A8B,?,?,?,00007FF7D9C004D7,?,?,?,00007FF7D9C003CD), ref: 00007FF7D9C01992
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146728696.00007FF7D9A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9A10000, based on PE: true
                            • Associated: 00000000.00000002.2146715400.00007FF7D9A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146835220.00007FF7D9C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146853847.00007FF7D9C29000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C40000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146899907.00007FF7D9C43000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7d9a10000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: AllocHeap
                            • String ID:
                            • API String ID: 4292702814-0
                            • Opcode ID: 59a06c0fe47b61a158d5c0987dd7de93d021d18a07cf429da4402c5438593290
                            • Instruction ID: 26a078a3885789f3f897ccc5ed4e2b8bfc34903a0ffeab75bf307e7aab58ce8a
                            • Opcode Fuzzy Hash: 59a06c0fe47b61a158d5c0987dd7de93d021d18a07cf429da4402c5438593290
                            • Instruction Fuzzy Hash: 83F0FE15B0D20A45FE957EB1584137DD2B15F447E0FD95632DD2EA52CADE1CA4808231
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: ErrorLast$File$Creatememset$memcpywsprintf$CloseHandleSleepWrite$AllocThreadmalloc$InitStringVariantVirtual
                            • String ID: %s\%s$\Microsoft\Windows
                            • API String ID: 1085075972-4137575348
                            • Opcode ID: 8ffd0cab172734a36e43c1cf7f5894ebfd94f3a2633384a290ba864bc3d060c0
                            • Instruction ID: 94de6d573fa0d8927b5bb826392d177512a30fcfd5af4058503230c0fb562cf8
                            • Opcode Fuzzy Hash: 8ffd0cab172734a36e43c1cf7f5894ebfd94f3a2633384a290ba864bc3d060c0
                            • Instruction Fuzzy Hash: EDF17A32701F8985F7A6CF64E8487DD33A4F78DBA8F449215EE9A56694EF38C249C700
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: FromString$CreateInitializeInstance
                            • String ID: :_:$:Y:$:$A::$X:[:$X:^:$Y::$Y:\:$\:[:$\:^:$^:G:
                            • API String ID: 511945936-2205580742
                            • Opcode ID: b21433bbcfd500ff2e1a040f01b86cf70ebae5ae9220c9be1f718c8c064dbea4
                            • Instruction ID: d33754435be79ee62176bbf206138c07fbdd3e121f941c643f14d68da248290d
                            • Opcode Fuzzy Hash: b21433bbcfd500ff2e1a040f01b86cf70ebae5ae9220c9be1f718c8c064dbea4
                            • Instruction Fuzzy Hash: 2291FD73D18BD4CAE311CF7994016EDBB70F799348F14A249EB946A919EB78E684CF00
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: String$Alloc$FromInitVariant
                            • String ID: SYSTEM${4c3d624d-fd6b-49a3-b9b7-09cb3cd3f047}
                            • API String ID: 929278495-107290059
                            • Opcode ID: f90c8e403a0b1249590ad1665be699f9ac10e390f971a03fc807c8f653187a63
                            • Instruction ID: e54bcdf9e92cae3ed311456612b02479e66d2eb3af00e5f4fdd7df8a388e748b
                            • Opcode Fuzzy Hash: f90c8e403a0b1249590ad1665be699f9ac10e390f971a03fc807c8f653187a63
                            • Instruction Fuzzy Hash: 6EB1C236B00B558AEB40DF6AD88829D77B1FB88FA9F559016DE0E57B28DF35C189C300
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                            • String ID:
                            • API String ID: 808467561-0
                            • Opcode ID: e6e2a47d0b7aca8797bf2f78af511f090b7de726a253ea606c4e540f123b5b7a
                            • Instruction ID: 4599084cfb13f8c747939fbc3aba35a6bd4e8a08bbcc0f0b71949d4f47730483
                            • Opcode Fuzzy Hash: e6e2a47d0b7aca8797bf2f78af511f090b7de726a253ea606c4e540f123b5b7a
                            • Instruction Fuzzy Hash: 5FB2E0766022998BE7A7CE69D544BED37A5F78C3C8F509125EA0657B88DF34CB48CB00
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID: ?Vse4"$NtAlpcConnectPort$NtAlpcCreatePort$NtAlpcSetInformation$TpAllocAlpcCompletion$\RPC Control\$ntdll.dll
                            • API String ID: 0-3440571002
                            • Opcode ID: 3e7f587f86fd0b2bf1a8a0d1d2c8b2dcce1149cee181315916f08b714af195f2
                            • Instruction ID: 8c3100648684ed6cf3a6acba9f1e9974d33f54458c7afc613a7cd7d66638faa8
                            • Opcode Fuzzy Hash: 3e7f587f86fd0b2bf1a8a0d1d2c8b2dcce1149cee181315916f08b714af195f2
                            • Instruction Fuzzy Hash: 53124DF5720E9891EF94CBB9E8687C66362F78D798F81A117DE0D57624DE38C20AC700
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146728696.00007FF7D9A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9A10000, based on PE: true
                            • Associated: 00000000.00000002.2146715400.00007FF7D9A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146835220.00007FF7D9C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146853847.00007FF7D9C29000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C40000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146899907.00007FF7D9C43000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7d9a10000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: ErrorLast$bindsocket
                            • String ID:
                            • API String ID: 2672188334-0
                            • Opcode ID: 4f19865bda3b12aa65bde297c8eeb848f29aeb92f68061c147d016fa6e1a1ed0
                            • Instruction ID: d1c192f270ddafd049a0c506ad8544a80724da79f8cbeaac0c9952f84c04e1d5
                            • Opcode Fuzzy Hash: 4f19865bda3b12aa65bde297c8eeb848f29aeb92f68061c147d016fa6e1a1ed0
                            • Instruction Fuzzy Hash: BB812D76A096428AEA54EF25E85066EF7B0FBC4784FD04037E64D83B69DE3CE444CB60
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: ExceptionThrow
                            • String ID: __restrict$__swift_1$__swift_2$__unaligned$call
                            • API String ID: 432778473-3141380587
                            • Opcode ID: 6a396b12831feff5c6f80a323355d14ea9fae3a8da964f50d645d654625ebbdc
                            • Instruction ID: 673e966dcc0d85f334313fac89718d38bf41ed5ef13417959e8c730922fdb805
                            • Opcode Fuzzy Hash: 6a396b12831feff5c6f80a323355d14ea9fae3a8da964f50d645d654625ebbdc
                            • Instruction Fuzzy Hash: 5C627E72701E8882EB86EB25D4583DD27A1FB8EBD4F408125FA5E577A6DF38C649C700
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146728696.00007FF7D9A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9A10000, based on PE: true
                            • Associated: 00000000.00000002.2146715400.00007FF7D9A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146835220.00007FF7D9C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146853847.00007FF7D9C29000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C40000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146899907.00007FF7D9C43000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7d9a10000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID: ?j.
                            • API String ID: 0-2477978973
                            • Opcode ID: 024b7acfd1758d27c6e8c075e34bbad76411bd8d2b3a40a63b342cf025c009fe
                            • Instruction ID: 79ac59ed15d738664ee88dfb99e211046bece22b34276dd32b119839ab6c935b
                            • Opcode Fuzzy Hash: 024b7acfd1758d27c6e8c075e34bbad76411bd8d2b3a40a63b342cf025c009fe
                            • Instruction Fuzzy Hash: 69933172A0C5D24BD329EF34A8A16BEB7F5AB85341FC4523BD58DC7A56CA2CA104CF50
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: _invalid_parameter_noinfo
                            • String ID: gfffffff
                            • API String ID: 3215553584-1523873471
                            • Opcode ID: 2520fe7bf4aaf198221899a8f6838957eb71f23a71b26e0d8cd2dd751d59c1b4
                            • Instruction ID: 7c5b9028af6473dd728daef05391e74bafcea77e80a4e195b251d3550d854208
                            • Opcode Fuzzy Hash: 2520fe7bf4aaf198221899a8f6838957eb71f23a71b26e0d8cd2dd751d59c1b4
                            • Instruction Fuzzy Hash: 869145767057CC86EF97CB2AE4013EDABA5A758BC4F06C022EA5947395DE3DC60AC701
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID: C:\windows\$C:\windows\system32\$WinSta0\Default$taskmgr.exe
                            • API String ID: 0-638001070
                            • Opcode ID: 3c7d1f0fb87f662b2079bad57b09a5afaa48cb8c83d5525282594a227a335d39
                            • Instruction ID: 1bf4e9e1e70513e3816d114cab4aa84c7a719184b3830627372934e1f9606700
                            • Opcode Fuzzy Hash: 3c7d1f0fb87f662b2079bad57b09a5afaa48cb8c83d5525282594a227a335d39
                            • Instruction Fuzzy Hash: 0C8127F5324E9982EF95CBA8F8697D66322F7897D8F80A112CD1E57624DE38D209C704
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID: C:\windows\$C:\windows\system32\$WinSta0\Default$winver.exe
                            • API String ID: 0-1160837885
                            • Opcode ID: 1308d712bd6591429a8d37c48bbd1829232a434116c75b441977ccfa919fa798
                            • Instruction ID: 55855d67a1f766f1614c6ad6b77d44964cb4204ffe99e224a87b86ff19b563fd
                            • Opcode Fuzzy Hash: 1308d712bd6591429a8d37c48bbd1829232a434116c75b441977ccfa919fa798
                            • Instruction Fuzzy Hash: C841A4B5324E9882FF55CB69F8687966322F789BD8F40A116CD5E4B764DE3CC20AC704
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146728696.00007FF7D9A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9A10000, based on PE: true
                            • Associated: 00000000.00000002.2146715400.00007FF7D9A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146835220.00007FF7D9C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146853847.00007FF7D9C29000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C40000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146899907.00007FF7D9C43000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7d9a10000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: ErrorLast
                            • String ID:
                            • API String ID: 1452528299-0
                            • Opcode ID: c3dd4c0e9385bfd57a55dd02cfd5c7f506640c84b3a23a86f047f0916954dca1
                            • Instruction ID: f616db96705a6a914a5c401bae0991eb0545b19cc0f5676b297dfba146b9d6bd
                            • Opcode Fuzzy Hash: c3dd4c0e9385bfd57a55dd02cfd5c7f506640c84b3a23a86f047f0916954dca1
                            • Instruction Fuzzy Hash: 9A736272A085D24FD32CEF7498A16FE77F19B85349F84523BD54DCBA5ACA2CA204CB50
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: memcpy_s
                            • String ID:
                            • API String ID: 1502251526-0
                            • Opcode ID: 4ea583caa57715286bcbaff0c0c248d65fdcd68c244adb70adfc071040c02cb8
                            • Instruction ID: 57088630f82899a46a4f04304140a90d468cb093ad556e4d18a7d8c59b71a2f9
                            • Opcode Fuzzy Hash: 4ea583caa57715286bcbaff0c0c248d65fdcd68c244adb70adfc071040c02cb8
                            • Instruction Fuzzy Hash: 5EC1387671628987EB66CF19E044B9EB791F7987C4F44C125EB4A43B84DB38EA09DB00
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146728696.00007FF7D9A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9A10000, based on PE: true
                            • Associated: 00000000.00000002.2146715400.00007FF7D9A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146835220.00007FF7D9C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146853847.00007FF7D9C29000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C40000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146899907.00007FF7D9C43000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7d9a10000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: ErrorLastRecv
                            • String ID:
                            • API String ID: 904507345-0
                            • Opcode ID: deb7d056b98802d721299dea02c37c7f98589deea631aa3ca4c427b9f49b8a50
                            • Instruction ID: 922441bd251287c7bb55d4cff29d2439b51a1a99da2d0e857d8dd554d43ff499
                            • Opcode Fuzzy Hash: deb7d056b98802d721299dea02c37c7f98589deea631aa3ca4c427b9f49b8a50
                            • Instruction Fuzzy Hash: C2212B36A1C6418BE754EF28E48066EB7B0FB88784F901136EA8D87725DB3CE440CF10
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: _invalid_parameter_noinfo
                            • String ID: 0$ko-KR
                            • API String ID: 3215553584-2196303776
                            • Opcode ID: f96d09346a2f6e77d59369c2194a8b950e6b78dbaa0c336e0d12ce098f52cc8c
                            • Instruction ID: 454ebc8193fa5ca865f8f1965dd2a4e4b4682b0a5584ee5ea9980d899769f2f6
                            • Opcode Fuzzy Hash: f96d09346a2f6e77d59369c2194a8b950e6b78dbaa0c336e0d12ce098f52cc8c
                            • Instruction Fuzzy Hash: 3A71D33521070D82FBFB9A1990807E963A1E74D7C4FA4D126BE49437ABCF35CA4B9705
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID: 0$p
                            • API String ID: 0-2059906072
                            • Opcode ID: e7e5a160b0dc7bf11acf6e058a7a07693b04e0544c402e7120b811fb21f28438
                            • Instruction ID: 3ee67f828506e40d833cc10e170725f94807106ad1cab914bfb00022e22d59fe
                            • Opcode Fuzzy Hash: e7e5a160b0dc7bf11acf6e058a7a07693b04e0544c402e7120b811fb21f28438
                            • Instruction Fuzzy Hash: A731F075605E9D81EB55DF56E894BD62321F388BD8F42A212ED4E0BB24EE3CC15AC700
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: _invalid_parameter_noinfo
                            • String ID:
                            • API String ID: 3215553584-0
                            • Opcode ID: 9a675805437782ecf3217d5187c311e375e8358acccf04f95891004c6cc889dd
                            • Instruction ID: 1f61cd1c6d9a0cc47e5c3170d1c15f4e9de5b8ae94a737795fa3a990e1df4aaf
                            • Opcode Fuzzy Hash: 9a675805437782ecf3217d5187c311e375e8358acccf04f95891004c6cc889dd
                            • Instruction Fuzzy Hash: 0BA1E67231069881EBA3DB66A8047DAA3A0F78DBD4F549526FE9D07BC4DF78C64D8304
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: _clrfp
                            • String ID:
                            • API String ID: 3618594692-0
                            • Opcode ID: 0e21b991dae342f80746e460734db2b0327f033799438967f91080e093b168d9
                            • Instruction ID: 0593f73a9b31075b8e6bf2cb9e383320a294c5aeb291d1da762f6cdddc12ea76
                            • Opcode Fuzzy Hash: 0e21b991dae342f80746e460734db2b0327f033799438967f91080e093b168d9
                            • Instruction Fuzzy Hash: 10B12B73600B88CBEB56CF29C88679C77A0F349B88F19C916EB59877A8CB35C955C701
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: ExceptionThrow
                            • String ID: l section in CAtlBaseModule
                            • API String ID: 432778473-2709337986
                            • Opcode ID: a127ccbb264a5a4aec1e8b8c97d9fa5e153886bac66a3a6cc8a19aedac249b0e
                            • Instruction ID: 3133a5dfd5f79aac6ce2c53f471fbcfe22b2aa6c2a7d5a5a984ae032cb248d46
                            • Opcode Fuzzy Hash: a127ccbb264a5a4aec1e8b8c97d9fa5e153886bac66a3a6cc8a19aedac249b0e
                            • Instruction Fuzzy Hash: 23027C36600E8886EB96DF25E8443DD73A1FB8DBD5F448526EA4E43BA4DF38C648C700
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID: __restrict
                            • API String ID: 0-803856930
                            • Opcode ID: 5745e3cfed15ffb7b3e2fa7717aad80a57a6249b3a0910dbd319ea413861beba
                            • Instruction ID: 2a1f3f8c5416bf1435224dd1e95b651f0a407b08188742a7ac323c2b5a68232f
                            • Opcode Fuzzy Hash: 5745e3cfed15ffb7b3e2fa7717aad80a57a6249b3a0910dbd319ea413861beba
                            • Instruction Fuzzy Hash: DAF15936601F4886EB928F65D8543DC73A5EB8DBC8F548526FE0E47BA4DE78CB498340
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146728696.00007FF7D9A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9A10000, based on PE: true
                            • Associated: 00000000.00000002.2146715400.00007FF7D9A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146835220.00007FF7D9C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146853847.00007FF7D9C29000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C40000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146899907.00007FF7D9C43000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7d9a10000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: InfoSystem
                            • String ID:
                            • API String ID: 31276548-0
                            • Opcode ID: 7b0ed490353ac5753f53b679cf1d633e8f55c468c51ae4daf13fe6cf5aa634ea
                            • Instruction ID: a26a10c7614f7251b2fbc4aa8f8a6794f9a5fb2843fbe755b55e474904f5037d
                            • Opcode Fuzzy Hash: 7b0ed490353ac5753f53b679cf1d633e8f55c468c51ae4daf13fe6cf5aa634ea
                            • Instruction Fuzzy Hash: 1F11EC36A186018BD764DF19E89156EB3B1FBC8748FD05026FA9E87729DA3CE411CF20
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: _invalid_parameter_noinfo
                            • String ID: 0
                            • API String ID: 3215553584-4108050209
                            • Opcode ID: 5f4ddedfd77a8f2be46d5b27c9f7dfb0d5136d7c17e53cee70af679ad4ba4177
                            • Instruction ID: 71f2418fc044250fc616a08c0bb954c8cfb89a1255eab9d4a98bc77a135e3a3b
                            • Opcode Fuzzy Hash: 5f4ddedfd77a8f2be46d5b27c9f7dfb0d5136d7c17e53cee70af679ad4ba4177
                            • Instruction Fuzzy Hash: 5871E235210A0D82FBFB9A29A0407F92392E7487C4F94D016BE46577EACF35CA4B9745
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID: 201ef99a-7fa0-444c-9399-19ba84f12a1a
                            • API String ID: 0-3963691810
                            • Opcode ID: 305143c906e545cbbdba88b15ed8d96aa5c5b1023b370279aab489ed2de4cf70
                            • Instruction ID: f859e3b1c76c282179c02603d62779a177e542a7d14e57d8a75f66858979eba8
                            • Opcode Fuzzy Hash: 305143c906e545cbbdba88b15ed8d96aa5c5b1023b370279aab489ed2de4cf70
                            • Instruction Fuzzy Hash: A54153B1715B9D46EF89CB78D9653A62322FB8C7ACF40A516C90E47765DE38C209C300
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID: ncalrpc
                            • API String ID: 0-2983622238
                            • Opcode ID: 8e139b6873f62461d47cfb06735ed223aa3699eae5bf13dfab6a051279dd2f2d
                            • Instruction ID: 72ca54434e2e545ad87ad6f85711ca4f80c48705b1af1cf0b8a8e1738ac29a0d
                            • Opcode Fuzzy Hash: 8e139b6873f62461d47cfb06735ed223aa3699eae5bf13dfab6a051279dd2f2d
                            • Instruction Fuzzy Hash: 99312FB1721A6952EF49CF78E8687966762F79C794F91E522CE0E4B624DE3CC209C700
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146728696.00007FF7D9A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9A10000, based on PE: true
                            • Associated: 00000000.00000002.2146715400.00007FF7D9A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146835220.00007FF7D9C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146853847.00007FF7D9C29000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C40000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146899907.00007FF7D9C43000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7d9a10000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 84d2a2c5cf828a8c708c3c6e26cc7a7284321eea6bb625a0dda2739eaddb4e08
                            • Instruction ID: 720886922789b3c7942ea0eaedd65c6537183e5502f0ee9290e47f28f7114561
                            • Opcode Fuzzy Hash: 84d2a2c5cf828a8c708c3c6e26cc7a7284321eea6bb625a0dda2739eaddb4e08
                            • Instruction Fuzzy Hash: 8B921032A0C5D28BD318EF74A4A16BEBBF1AB85345F84513BD58DC7A5ACA2CE405CF50
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146728696.00007FF7D9A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9A10000, based on PE: true
                            • Associated: 00000000.00000002.2146715400.00007FF7D9A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146835220.00007FF7D9C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146853847.00007FF7D9C29000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C40000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146899907.00007FF7D9C43000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7d9a10000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2eea02c496926168e0f2016d62dcd4b3212950ef3c49fc117d334fa2024440a6
                            • Instruction ID: 29610d46189a502eb153f5ce9aab794f8fa5fc4f18526c2524b1c694137a0f77
                            • Opcode Fuzzy Hash: 2eea02c496926168e0f2016d62dcd4b3212950ef3c49fc117d334fa2024440a6
                            • Instruction Fuzzy Hash: D082C762D1C9D145E316DF34A8E023EFEB6AF85785FC8833BE18E56515EE2DA142CB10
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3e631ec45a2daf68f48d52614a6345ed429c570a616f22469c908a5fe8b28b5b
                            • Instruction ID: 6d80879f2b6ca484a565809d41c0eb2dabc8ae21e66747f9efe079bfb1bd8c10
                            • Opcode Fuzzy Hash: 3e631ec45a2daf68f48d52614a6345ed429c570a616f22469c908a5fe8b28b5b
                            • Instruction Fuzzy Hash: DA22D177310AA882EB46DB65C0547AC33B6FB48B84F028116FB599B7B1DF38D668C354
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1622125fadd830d72695094e7b85cc31ec002336933b0e724cad098e10e2d7b0
                            • Instruction ID: 946e0dd2bba7b3100fd246393857d7d015b19ff97fe3a12f1d34a5a40530aed8
                            • Opcode Fuzzy Hash: 1622125fadd830d72695094e7b85cc31ec002336933b0e724cad098e10e2d7b0
                            • Instruction Fuzzy Hash: E4E181722046C986EBB2CB15E8943E977A1F78E7D4F84C121EA8A936D5DF78C64DC700
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cfe71d8e7cd50308ca462f153a194306955503b02d46b76410196ab8a6e65239
                            • Instruction ID: c02e86e1f92cc5576d6cd232989999bceb531278b49536794b781076c4770d9c
                            • Opcode Fuzzy Hash: cfe71d8e7cd50308ca462f153a194306955503b02d46b76410196ab8a6e65239
                            • Instruction Fuzzy Hash: BFE1D032708A848AE793CF68E5803DD77B1F74A7D8F548116EA4E57B99DE38C25AC700
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 16ae51d95b1815005dd45d5e3ab8a349bfdaaf9539e2a3891bf7a9a4281af68b
                            • Instruction ID: 207e761d23252ea67ff1337872d1fa257f2b4668b6d9f4a23401ae9418e5b291
                            • Opcode Fuzzy Hash: 16ae51d95b1815005dd45d5e3ab8a349bfdaaf9539e2a3891bf7a9a4281af68b
                            • Instruction Fuzzy Hash: AFB1AB72A10B8886E352CF39D8457DC37A4F389B88F519216EE4D17B66DF35D689CB00
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 30536b62a6d0da437fd114397cfbd3f50a9eae59392f0b1b67c723097f145a58
                            • Instruction ID: 24312ee17ac27d640e5902fdf911b4c821bd108a67df2382ab98bc71ef406521
                            • Opcode Fuzzy Hash: 30536b62a6d0da437fd114397cfbd3f50a9eae59392f0b1b67c723097f145a58
                            • Instruction Fuzzy Hash: C8410672B10A5886EB14CB64F815B9AB3A8F788794F505025DF8E47B68EF3CC156C700
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: bfda2f7c180109932206dffacf20a53aef2a56dc1179a3e9a6f89e125c1a26ad
                            • Instruction ID: 6a73b4ca67aa358b5cca9cf8f50e7addbf38a80432c4fb2377473208703d20e7
                            • Opcode Fuzzy Hash: bfda2f7c180109932206dffacf20a53aef2a56dc1179a3e9a6f89e125c1a26ad
                            • Instruction Fuzzy Hash: 645126E9654B9982EF94DBA9F8693D62322FB497D8F80F112CE1E57724DD38D209C304
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 073128fd360148c17e41ec35af6a18c2df5ced6b4e463a8a16fec66cb74d860e
                            • Instruction ID: b6fa69fb7e3d6089a58b1dc0a55349c666dd73e1d328c0310e1d9ae523244059
                            • Opcode Fuzzy Hash: 073128fd360148c17e41ec35af6a18c2df5ced6b4e463a8a16fec66cb74d860e
                            • Instruction Fuzzy Hash: A351CF32715F8896EB64CB65F94478A73A5F7887C4F54412AEA8E83B28EF3CD119C700
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: de1111058f7c16aa1c110f3b5979ca66c856bb8bda45b3eaebbbd55d773fd606
                            • Instruction ID: 9937fe3f73516922539d469a7d9b5dbd200fa43091dfd9594953e81ca0841af9
                            • Opcode Fuzzy Hash: de1111058f7c16aa1c110f3b5979ca66c856bb8bda45b3eaebbbd55d773fd606
                            • Instruction Fuzzy Hash: 7F51C2B5760E9982EB64CF65E8687D66321FB89BD4F44E126DE0E57B24DE3CC11AC300
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a53c239ed1f9684605d2ef346be0b8bf89de5d156fdc40e0d799da5887b65061
                            • Instruction ID: 211af31c44281ca6c3f3932d9a28d26ed70725301ca9e5a4bb4aa04c7d8998f6
                            • Opcode Fuzzy Hash: a53c239ed1f9684605d2ef346be0b8bf89de5d156fdc40e0d799da5887b65061
                            • Instruction Fuzzy Hash: 25419232310A5886EB85CF6AE954399A391E34CFD4F49D427EE4D97B58DE3CC649C300
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 219bf7831b4ff29649a0959f5cba49ff1e968e7e299094c0451f4ae6976958c1
                            • Instruction ID: 6cb90250f36c561b05bdbfb3a32d9520807f84a022e52005c3b8c35e7831f1c3
                            • Opcode Fuzzy Hash: 219bf7831b4ff29649a0959f5cba49ff1e968e7e299094c0451f4ae6976958c1
                            • Instruction Fuzzy Hash: B54103B3714E4995EB25CF61E86478AB3A5F3887D8F44E126EE4D07A18DF38C246C300
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: eaae997217fc1b3336f25de6e62d34e0746f7d3c2a6a256d0b5f71472e0a0425
                            • Instruction ID: 048e6db2ecfd184872977d7eb727c5e493510e05d032e6f18c4ab6865a9947bf
                            • Opcode Fuzzy Hash: eaae997217fc1b3336f25de6e62d34e0746f7d3c2a6a256d0b5f71472e0a0425
                            • Instruction Fuzzy Hash: B341B37261C6888AF7EB8F15B4847967B91E34E3D0F11C429F94A87691DF79C6888F00
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 59276b993bbd5f607d6d3a9a9acf607f8ad274a0d99c33aa421d3a75b3b8979b
                            • Instruction ID: ea9816badbe891c07a2aded6d1ec92d5857af46983f2473552b7590bc608b90a
                            • Opcode Fuzzy Hash: 59276b993bbd5f607d6d3a9a9acf607f8ad274a0d99c33aa421d3a75b3b8979b
                            • Instruction Fuzzy Hash: 24419D76B20A8886EB14CB65F45479AB365F38CBC4F40912ADE4E53B68DE3CC216C740
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f3a4f3e3c3f40ea96cedb268f2507c4aa92d7cf089ba266e7691892548829ecb
                            • Instruction ID: ff810da637aa1fd401c95da2c6d69315e604f84d2d111450c1a2a7c20e68e2a5
                            • Opcode Fuzzy Hash: f3a4f3e3c3f40ea96cedb268f2507c4aa92d7cf089ba266e7691892548829ecb
                            • Instruction Fuzzy Hash: B941FFB2318F89D6DB54CFA5E4A579A7B61F388788F84901ADE4E47A14DF38C12AC340
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a7caa211d1805da3631b5417297298fbd746491c9ff13b9b06d3acbe089dc0ae
                            • Instruction ID: 1f6bebfb10a220892d2831274fb9d9e41c253fa787b11ea253d3ff134c5c468f
                            • Opcode Fuzzy Hash: a7caa211d1805da3631b5417297298fbd746491c9ff13b9b06d3acbe089dc0ae
                            • Instruction Fuzzy Hash: FF419FB2214F88D2EB54CF55E88478AB7A6F3447C4F94D126EE8D5BA18CF78C15AC740
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9dc054b22e393740934c6599b1190f187be60ae239c821f3ddf288e380813183
                            • Instruction ID: d558cfae5a731fffe16df58c07b62597b32ae423ecf54f032ed4b289fbb168ab
                            • Opcode Fuzzy Hash: 9dc054b22e393740934c6599b1190f187be60ae239c821f3ddf288e380813183
                            • Instruction Fuzzy Hash: 4041D3B2324E4DD2DF48CB15E454B9A7365F748BC8F658216DA4E87768EF39C21AC700
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 711a5f6cc3d39d5f0aef55b7034a878137727931ce5006779a437fec81a29920
                            • Instruction ID: c4b80034388e89da8ffe7b427c8155ba048d36e5b74cf413b7ce4096cc0294b9
                            • Opcode Fuzzy Hash: 711a5f6cc3d39d5f0aef55b7034a878137727931ce5006779a437fec81a29920
                            • Instruction Fuzzy Hash: AC4126B2728E48A2DB14CF25E69878E7762F3443C4F45A206EE4E57328DF39C225C700
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c02ea177d7df7be9d47921f817159e6b389a93a74e3aee8d1a395a9d44e4e98a
                            • Instruction ID: 30f2c0aa2bc627d33595a3753288768bcaf23473739ac437f1ff85fbf168e941
                            • Opcode Fuzzy Hash: c02ea177d7df7be9d47921f817159e6b389a93a74e3aee8d1a395a9d44e4e98a
                            • Instruction Fuzzy Hash: FA31CFB2764E8987EB94CFA4E4657EA3B21F384398F84911BDE4F47A14DE68C01AC341
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c43f2c2cbd10ab131c97a87bfb9a8d77e076664a556218998fa3f3ff93ba8f25
                            • Instruction ID: 42c4d16a0e0d136c5a94160c46d85d5892129638e54f14ca30ac4ff8e229c4e5
                            • Opcode Fuzzy Hash: c43f2c2cbd10ab131c97a87bfb9a8d77e076664a556218998fa3f3ff93ba8f25
                            • Instruction Fuzzy Hash: 65310DF9654B9892EB55DBB8F8697C62322F74D7D8F81B502CE0E27624DE38D209C740
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2bce6376752d693395b932a5d9318ffbe6d4c9bed5557d96fc3b5228a6ed1993
                            • Instruction ID: 91db3ca7ca736f51b2b9f4a1fdda40ff6b442f2c49d3b76bc6f7bd54feb42801
                            • Opcode Fuzzy Hash: 2bce6376752d693395b932a5d9318ffbe6d4c9bed5557d96fc3b5228a6ed1993
                            • Instruction Fuzzy Hash: 2531FBB5314E8481EF99CF66ECA93A66362FB88BE4F54E1168E0F57B64CE3DC1458304
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 11c12f5db1e7ae7d88fc0262756b9d0bf6622ca984ac394aaf837a3336d7d9a4
                            • Instruction ID: b9540b73c02fa2fd8fd9ed4b04a7558bae6bb2522907684b3f8178f982c6447f
                            • Opcode Fuzzy Hash: 11c12f5db1e7ae7d88fc0262756b9d0bf6622ca984ac394aaf837a3336d7d9a4
                            • Instruction Fuzzy Hash: 3F215EF53159A882EB95CF65E8787972322FB49BD8F81E112CD1E57764DE38C209C304
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e74b49f80d6d3cffa9bfb68b489edd80f871d1e69f348bd9d5bedd62bb40d514
                            • Instruction ID: 34ebe62695f2a6a6ea2397927167a92a4784dc70ec7df40509b9419055f8788e
                            • Opcode Fuzzy Hash: e74b49f80d6d3cffa9bfb68b489edd80f871d1e69f348bd9d5bedd62bb40d514
                            • Instruction Fuzzy Hash: 7D31C1F6715A499AEB14CF60E46478AB3A5F3447C8F48E226EA4E47A1CDF78C219C304
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 29ed0da8da41128ee95df92606b628508953cd21a2e597ae56ff743980468b27
                            • Instruction ID: ea228047f8abccb8f34d8cb69d0855da280cee6fe6b78123f25de321abaee775
                            • Opcode Fuzzy Hash: 29ed0da8da41128ee95df92606b628508953cd21a2e597ae56ff743980468b27
                            • Instruction Fuzzy Hash: BD2101B2724E8885EB95CF62E828B9A7361F38CBD4F419126DE4E47B54CE3CC10AC700
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 659e1158283c071cac0272366369d00d1cfa562a966f2f5affa459bf10e8deba
                            • Instruction ID: 6d7058e35041f85eefca8006119c3596d2fa62747ef7dd2be534be946fff4e46
                            • Opcode Fuzzy Hash: 659e1158283c071cac0272366369d00d1cfa562a966f2f5affa459bf10e8deba
                            • Instruction Fuzzy Hash: BB21D5B2764E5892DB59CFB6E864BC63761E759BD4F40A116EE0D57324EE38CA06C300
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 879b8cc6a287b552be2b8c7838c9cf5361018535551b3c5eae2337da7c2a05c9
                            • Instruction ID: 64e956f36281cdf23b4cab459502cafc9c3b83219f603c2a53f066b43bdf7739
                            • Opcode Fuzzy Hash: 879b8cc6a287b552be2b8c7838c9cf5361018535551b3c5eae2337da7c2a05c9
                            • Instruction Fuzzy Hash: 9931A2B2724A49A6DB15CF64D25878E7B62F3443D8F49A206DB0E57628EF39C16AC700
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7643b34bb1144c09516ca8224fed32c138a04b2f755b136cd71388444af2efbb
                            • Instruction ID: 8007ea01a93bf6de8c95f9a16faa5e8d6c04bd6e38d315922757046993a1328b
                            • Opcode Fuzzy Hash: 7643b34bb1144c09516ca8224fed32c138a04b2f755b136cd71388444af2efbb
                            • Instruction Fuzzy Hash: 5F2148F5761EA982EB89CFB5E86979A2321E749BD8F41A112CD0E17724DE2CD6098300
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c104ebe3e0084b9c2d6c68d3b1b1809b1ba36be3a0ef8b7a361271054a232770
                            • Instruction ID: baf3eb62263214422a0973d769ae56c08939dd68f110effc1bb9cb03c9f86de4
                            • Opcode Fuzzy Hash: c104ebe3e0084b9c2d6c68d3b1b1809b1ba36be3a0ef8b7a361271054a232770
                            • Instruction Fuzzy Hash: CE2159F5720AA892EB85CFB4E468BD627A1F74C3A4F81A413DE0D47620EE39C209C300
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f0ba3d73c2f5686b073e58bf77ac5fca37af1a7b10adc11c162e07aac671ca2c
                            • Instruction ID: fb4b37c46674135c9bcda74d3568f44faa2863dc5090cce6e90fb90ae548c0e0
                            • Opcode Fuzzy Hash: f0ba3d73c2f5686b073e58bf77ac5fca37af1a7b10adc11c162e07aac671ca2c
                            • Instruction Fuzzy Hash: 01118EA271498C46FB96DBB4F969BD76322EB4C3A9F80B012DD0D07A55DD3CC24AC700
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0213aaa7a16af12e76c05f13803a6cb1816da3aa76317169f32ff85a43e83aea
                            • Instruction ID: 95480194bb9f6c9ad9d964584a4fad66eb43ce3f3ee230db89eb3e49904c33dd
                            • Opcode Fuzzy Hash: 0213aaa7a16af12e76c05f13803a6cb1816da3aa76317169f32ff85a43e83aea
                            • Instruction Fuzzy Hash: 56210BF2711A5D92EB49DF75D868BD667A2E78CBD4F41E512CD0E5B624DE3CC2098300
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3f85260008f1cca6d719552e34a0840437b2decd6b2aec5b8999dc0ce01bbffe
                            • Instruction ID: 02ba138fbc53fc0a7e206b6c0fccc1f4cb11f22df8a79a790e142c2087e4c986
                            • Opcode Fuzzy Hash: 3f85260008f1cca6d719552e34a0840437b2decd6b2aec5b8999dc0ce01bbffe
                            • Instruction Fuzzy Hash: 48213BB6761A5DC5EF49DF65E868B8A6721F788BD8F41A122CD0E47728DE3CD209C700
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 803c451430e3029bb009500dace81e7bc3217c3b4584f2ef31f91a53a698693d
                            • Instruction ID: 4519c20df033b0754d584584f46a47e9c3f61284702b1b178af72c485ed47193
                            • Opcode Fuzzy Hash: 803c451430e3029bb009500dace81e7bc3217c3b4584f2ef31f91a53a698693d
                            • Instruction Fuzzy Hash: E02160F5714F8482EB45CBB5E8593CA63B1FB897A4F40A506DA4E57A24EE3CD20AC700
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 566796d93a591df3f5db1c38c43d6e1f2c58bb1bf9c844d883f4a478785d6911
                            • Instruction ID: bc53908923a101081ac78a2ff91d1596a8a62396a49556bd27b6b69a29ae519e
                            • Opcode Fuzzy Hash: 566796d93a591df3f5db1c38c43d6e1f2c58bb1bf9c844d883f4a478785d6911
                            • Instruction Fuzzy Hash: 6511E3E262096C82FB59DFA6A869F862332E349BD8F01E123DD5E5B714DD39C10BC300
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3a56065663d7f32470598edd8e4c56aa3322786b1e37be48fd2162c7dda414fd
                            • Instruction ID: 8fbfe2caa4e00eb4ae2a73ae29cd16ebba4a4082f14f5113274d96e794981e6d
                            • Opcode Fuzzy Hash: 3a56065663d7f32470598edd8e4c56aa3322786b1e37be48fd2162c7dda414fd
                            • Instruction Fuzzy Hash: 0721A4B2709A9882EB55CF64E4687977761FB8C798F41A116DE4E47A14EF3DC109C700
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4de039b8aeb4dd7a341e305cb49e7d4a566f2f03f9a363aa92138b342856feec
                            • Instruction ID: 9e59c1c7de84271de07ddad5238888e61d5fae15b8e3d2a62c0818bf1ca1a5d9
                            • Opcode Fuzzy Hash: 4de039b8aeb4dd7a341e305cb49e7d4a566f2f03f9a363aa92138b342856feec
                            • Instruction Fuzzy Hash: 2F1151B5714E9882EB54CB74E46839A6361F7887B8F80A316C92E576E4DF39C10AC744
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b00286fc56aac180519fed44c3472dbbed5625b745e2bf1041001a8241787df3
                            • Instruction ID: 453c13d840d8ab8480c25eabad8a5a4e6cf22c2320a7064174f112572a8564ab
                            • Opcode Fuzzy Hash: b00286fc56aac180519fed44c3472dbbed5625b745e2bf1041001a8241787df3
                            • Instruction Fuzzy Hash: 8E113CE171196846FF89CF65D9697665393EB8C7E4F81E426CE0E8B768ED3CC1098304
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3e6f47147aee9d0c5d2e3a57a73bf876d140cefaec2fbc1aba1964aca6a06b7c
                            • Instruction ID: dcb26d1462b17352493136ca1a284502f5bdb4a1f8be4333a819d013a470b478
                            • Opcode Fuzzy Hash: 3e6f47147aee9d0c5d2e3a57a73bf876d140cefaec2fbc1aba1964aca6a06b7c
                            • Instruction Fuzzy Hash: 3311C2B6624A9E42E709DFF4B424FCA3771E389750F00B517DE4A53510DE38C21AC300
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0e8879920a56ce6d951eaa2299e71384d51284fb55c40a98b48f618b07d76cb7
                            • Instruction ID: 1bcc190078e11d5e3502c0fb8cfdf52a8957de65a2b1b8071e9e04ba3849ecfd
                            • Opcode Fuzzy Hash: 0e8879920a56ce6d951eaa2299e71384d51284fb55c40a98b48f618b07d76cb7
                            • Instruction Fuzzy Hash: 9D1100F5721E9841FB49CB75D4683D66362E788794F80A917CA0F57664DD39C2498340
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 62fa84bd9608fd1e2ded7a46ac84a71bf4807f0703b11cbbff9e650931e748d0
                            • Instruction ID: 81b86e7094c320bcc5e7f926c263843823ab5f04b050e6f3beb40bfc522f2c83
                            • Opcode Fuzzy Hash: 62fa84bd9608fd1e2ded7a46ac84a71bf4807f0703b11cbbff9e650931e748d0
                            • Instruction Fuzzy Hash: 4F114FB5614E9882EB54CB78F4687DA6321F78C798F80B113CD0E57625EE39C21AC340
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 169374a88c9bc48999de202173db2c687a39263e6fb74efa0de97639e935559a
                            • Instruction ID: 58ab01e0f729e006e025e3cd5db47f1a357a7dbbf023e6ea43b04656e7f2b6d0
                            • Opcode Fuzzy Hash: 169374a88c9bc48999de202173db2c687a39263e6fb74efa0de97639e935559a
                            • Instruction Fuzzy Hash: 6A113DB1715E6881EB59CF65E9587866362F74C798F82E122CC4E47728EE39C248C700
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6214b3987fdb11ae9af8bb44ed0752c7393761a47505b246c2a752352195c6b7
                            • Instruction ID: 246bc5305b8913a4d01db227893256f8bf5d597bde7be6eae501e461eb4fa0bc
                            • Opcode Fuzzy Hash: 6214b3987fdb11ae9af8bb44ed0752c7393761a47505b246c2a752352195c6b7
                            • Instruction Fuzzy Hash: A4113CB2711E5C91EB49CF25E868B9A67A1F78CB94F41E526DE0E47768DE3CC209C300
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7a304966c8f6e6c63f3b4d1dc84eaa042215815f68f4f7ed99f7cad32e1286f1
                            • Instruction ID: 91f1bf17694832eb7885352137df2ae2a0c82d5e88c9f87b3bad460dc89f63f9
                            • Opcode Fuzzy Hash: 7a304966c8f6e6c63f3b4d1dc84eaa042215815f68f4f7ed99f7cad32e1286f1
                            • Instruction Fuzzy Hash: 451169F531286D82EB89CF65E929B865322E7487D8F82F112CC0E4B718ED39D109C700
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 214099cfcd0ee3826ed9ef66e5b675abfeddc10177d1ca11de6341e968b0d06b
                            • Instruction ID: 39990edd012c80a11a8c246ade81e0b00b1fb03419df7482220b1a2638345046
                            • Opcode Fuzzy Hash: 214099cfcd0ee3826ed9ef66e5b675abfeddc10177d1ca11de6341e968b0d06b
                            • Instruction Fuzzy Hash: 7E11A5F1330A8886FB95CBB5E8683DA6361E78D7D4F84B012CE0E47765CE28C20AC304
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: dcce50d7d365edf9bc1dcf0723df82f9ff79db8457ccb87dc38c7b0742b08610
                            • Instruction ID: 15f0b12e67b83b815c9156cfa897ef3110cdd404d207d48cd89176b21f2d8fa0
                            • Opcode Fuzzy Hash: dcce50d7d365edf9bc1dcf0723df82f9ff79db8457ccb87dc38c7b0742b08610
                            • Instruction Fuzzy Hash: 06015EB5751E6D82EB89DF75E4697DA2320EB48B94F82B512CC0E57320ED3CDA0AC300
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6f73bb3cb6f5cf5abec075b9014cb563e06a4567c89c5d20f7171c5a4b410b69
                            • Instruction ID: 22dcafcaff4b78d83aaf35a6f31f5da21172cbe544e4bfae6083fdcba81ddec3
                            • Opcode Fuzzy Hash: 6f73bb3cb6f5cf5abec075b9014cb563e06a4567c89c5d20f7171c5a4b410b69
                            • Instruction Fuzzy Hash: 080152F5611E9D82EB45CBB9E8A83D76325E78D7E8F40E1128E0E67625DE38C2098300
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 797ab2e302fecb4ee9151d5ec147357b9b6b8374a5a73c2aa17e4c7710b83c27
                            • Instruction ID: c05fe9916e29f3615726ac8ab40efd06a7f832fe150a5180127c36e0d361f74a
                            • Opcode Fuzzy Hash: 797ab2e302fecb4ee9151d5ec147357b9b6b8374a5a73c2aa17e4c7710b83c27
                            • Instruction Fuzzy Hash: 130125F1652E5E82FB59CBA4E569BC66362EB487D8F40F1179D0D07618EE3CD219C304
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c92cc2c6b8134dcd1d90e81fd4ee0dc0e69cf849aebd7e5d77ccca44f26df776
                            • Instruction ID: c5723c18dcfd40d5e26eb64c6513ed8ad7c8279d3e69258c72aec0d621b19a73
                            • Opcode Fuzzy Hash: c92cc2c6b8134dcd1d90e81fd4ee0dc0e69cf849aebd7e5d77ccca44f26df776
                            • Instruction Fuzzy Hash: 15F06871714A548AEBD5CF2CA44276A77D0F30C3C4FA0C519E68983B04D63D8165CF04
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2146728696.00007FF7D9A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7D9A10000, based on PE: true
                            • Associated: 00000000.00000002.2146715400.00007FF7D9A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146835220.00007FF7D9C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146853847.00007FF7D9C29000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146871649.00007FF7D9C40000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2146899907.00007FF7D9C43000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff7d9a10000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: Handle$AddressCriticalModuleProcSection$CloseConcurrency::cancel_current_taskCountCreateDeleteEventInitializeSpin
                            • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                            • API String ID: 3155888939-3242537097
                            • Opcode ID: 456cf0828f244fa9f043f2ede57b6f3d5d42998ea54c165d75fd4badeee2050d
                            • Instruction ID: 0809b8455941fd61b3d77d31d0f26c3084ff7bcc1e90b407e8141edc94b3b7ae
                            • Opcode Fuzzy Hash: 456cf0828f244fa9f043f2ede57b6f3d5d42998ea54c165d75fd4badeee2050d
                            • Instruction Fuzzy Hash: FD313020F0B60B81FA54BF70A8551BCE2B0AF54794FD94537C99E026E2FE2DB4968330
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: __scrt_fastfail__scrt_is_nonwritable_in_current_image$__scrt_get_show_window_mode__scrt_initialize_crt__scrt_is_managed_app__scrt_release_startup_lock__scrt_uninitialize_crt__security_init_cookie__vcrt_initialize
                            • String ID:
                            • API String ID: 1326835672-0
                            • Opcode ID: 428f1bac40111efcf19b2a06b83d8cc5b337c87ddf82bc9150455d955b8395b0
                            • Instruction ID: 20208a98ab850ec38ed8325cc0af7ea2ed5af357558f35f83d8d5c5aa49ef683
                            • Opcode Fuzzy Hash: 428f1bac40111efcf19b2a06b83d8cc5b337c87ddf82bc9150455d955b8395b0
                            • Instruction Fuzzy Hash: C631923160994C86FBE7BBA5D4523EA2391AB4E3C4F45C425B94A473D7DE28CB4E8350
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: __scrt_fastfail$__scrt_initialize_onexit_tables
                            • String ID: `eh vector vbase constructor iterator'$`local vftable'$`udt returning'$onstructor closure'
                            • API String ID: 2273495996-2419032777
                            • Opcode ID: 371735c951b6f4861318f081dd214222249cf913f5a589c2fbc766e687f75775
                            • Instruction ID: 430d6e6a62d8c94c9c04e7e52013dca82c213aedb955d9ad44379b1780147ad5
                            • Opcode Fuzzy Hash: 371735c951b6f4861318f081dd214222249cf913f5a589c2fbc766e687f75775
                            • Instruction Fuzzy Hash: FF416D35206B4C82FBA79B20E9503EA2361AB4EBD0F54D525E90E477A4DF3CC68E8304
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: _set_statfp
                            • String ID:
                            • API String ID: 1156100317-0
                            • Opcode ID: a2ede21bcdb1ffc6f849cceea62f3b27e54c7ac4f1c2c35b27aa84f998c663a0
                            • Instruction ID: 3b9bd57b40fff3d8961f464b14179896b260d9c17b5d0c480fa0c6cf32fa7499
                            • Opcode Fuzzy Hash: a2ede21bcdb1ffc6f849cceea62f3b27e54c7ac4f1c2c35b27aa84f998c663a0
                            • Instruction Fuzzy Hash: CB117732690A4D01F7E72129D4553F93340AB6D3F4F45C634BA76976D6CE248BC94302
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: _invalid_parameter_noinfo
                            • String ID: *$ko-KR
                            • API String ID: 3215553584-1095117856
                            • Opcode ID: 86bec7efc410530c5bc9a2fbb52b1d77945cde645c424444667ef471f83eee53
                            • Instruction ID: 247b425bc4075f99800c1718c7ffe54540729addd1f222e63731e205efc231c0
                            • Opcode Fuzzy Hash: 86bec7efc410530c5bc9a2fbb52b1d77945cde645c424444667ef471f83eee53
                            • Instruction Fuzzy Hash: B0718F72504E58C6E7FA9F2980443BC3BA0F34DBD8F649216EA4646399DF31CA8AC750
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID:
                            • String ID: __swift_1$__swift_2
                            • API String ID: 0-2914474356
                            • Opcode ID: 032175703d403af43845841e7270c54589e151d9aabe520c8013fad0eb530d90
                            • Instruction ID: e36f902788c0381efdc077c6dc949100de42eee437ea8b415927d241f746463c
                            • Opcode Fuzzy Hash: 032175703d403af43845841e7270c54589e151d9aabe520c8013fad0eb530d90
                            • Instruction Fuzzy Hash: CF618E32300A8882EF96DB29E5447E963A1FB4CBD4F488525EF6D4779ADF38D645C340
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: _invalid_parameter_noinfo
                            • String ID: gfff$o-l1-2-1
                            • API String ID: 3215553584-1082851355
                            • Opcode ID: 12dcbdbdd5235fb1b6ab94a0cc892e5fb23d71a1fe9ba5ecef1039a303d64847
                            • Instruction ID: 4e08fe91d50fd43471445e9309ac5ad4362738dffbe45d8770cad9fb3b789804
                            • Opcode Fuzzy Hash: 12dcbdbdd5235fb1b6ab94a0cc892e5fb23d71a1fe9ba5ecef1039a303d64847
                            • Instruction Fuzzy Hash: 5951F4737147C886E7A78B35E9413997B91E399BD0F48D221EB944BAD6CE38C698C700
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: _invalid_parameter_noinfo
                            • String ID: api-ms-win-core-sysinfo-l1-2-1$synch-l1-2-0
                            • API String ID: 3215553584-688204690
                            • Opcode ID: 0f102de843e7ec0c7a5e751bb160ca61ca373fda3eee5e3f3a8aa3db407457e4
                            • Instruction ID: 9d4985de47fc3aa1ddc341b920f7898ed377652abc42465d74999370fa1411ca
                            • Opcode Fuzzy Hash: 0f102de843e7ec0c7a5e751bb160ca61ca373fda3eee5e3f3a8aa3db407457e4
                            • Instruction Fuzzy Hash: 86418E72705F888AE782CF65E8507CE73A5F7193C8F518126EA9807B99DF38C629C340
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: DestructExceptionObject$__vcrt_getptd_noexit
                            • String ID: csm
                            • API String ID: 3780691363-1018135373
                            • Opcode ID: d49d3c1e60c3354247970e5f405f23988a7ea1f58b6bb3f0a1cf52d8215e401e
                            • Instruction ID: 011c5e600e2baba1b5aebe761702f78806dc8dec4a9d5acc90072a234146c346
                            • Opcode Fuzzy Hash: d49d3c1e60c3354247970e5f405f23988a7ea1f58b6bb3f0a1cf52d8215e401e
                            • Instruction Fuzzy Hash: 40212D76204A4887E7B2DF15E05079E7760F39DBE4F008206EEA943795CF39DA8ACB01
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: __std_exception_copy
                            • String ID: `vector destructor iterator'$nt delete closure'
                            • API String ID: 592178966-1611991873
                            • Opcode ID: 180211b27f776a29354646e6639c5d344605f4a19a09db6ac079198205e274bc
                            • Instruction ID: c8ada3eb98077b3e77d28a4839308a809c4d6d91d1a7368aad5ed78790c858ba
                            • Opcode Fuzzy Hash: 180211b27f776a29354646e6639c5d344605f4a19a09db6ac079198205e274bc
                            • Instruction Fuzzy Hash: 9EE01AB1200B0490DB068F65E8513E873A4EB4CB90F48C032AA5C47354EF38C6A9C301
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2145725831.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                            • Associated: 00000000.00000002.2145703994.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145828066.0000000180119000.00000002.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145850002.000000018011D000.00000004.00001000.00020000.00000000.sdmpDownload File
                            • Associated: 00000000.00000002.2145868582.0000000180121000.00000002.00001000.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_180000000_2024-12-10#U67e5#U9605_uninst.jbxd
                            Similarity
                            • API ID: ExceptionThrowstd::bad_alloc::bad_alloc
                            • String ID: File
                            • API String ID: 932687459-749574446
                            • Opcode ID: 5cc107604c7e858ffc48b5ed233f99d9330b9e91bd1076a405a7e456ecbb9fc9
                            • Instruction ID: 9145d171dbcecb2188c45693134888adfda474ee1ae56853841174419c243042
                            • Opcode Fuzzy Hash: 5cc107604c7e858ffc48b5ed233f99d9330b9e91bd1076a405a7e456ecbb9fc9
                            • Instruction Fuzzy Hash: 49C08C3221488D91EB62EB10E8917DA5330B7A8384F818111F19C824B69F1CC30ECB00